Continuous Integration – setting up the stage for a DevOps culture
About This Book
Explore continuous integration and automation, along with how to manage and configure Jenkins
Discover the process of using Jenkins to build, test, and package Java applications
Debug It!: Find, Repair, and Prevent Bugs in Your Code I’ve always been mystified why so few books are available on debugging. You can buy any number on every other aspect of software engineering such as design, code construction, requirements capture, methodologies... the list is endless. And yet, for some reason, debugging has been almost (not quite but very nearly) ignored by authors and... F# Deep Dives
F# Deep Dives presents a collection of real-world F# techniques, each written by expert practitioners. Each chapter presents a new use case where you'll read how the author used F# to solve a complex problem more effectively than would have been possible using a traditional approach. You'll...
Compilers: Principles, Techniques, and Tools (2nd Edition)
In the time since the 1986 edition of this book, the world of compiler design
has changed significantly. Programming languages have evolved to present new
compilation problems. Computer architectures offer a variety of resources of
which the compiler designer must take advantage. Perhaps most interestingly,
the venerable technology of...
Going to War: Creating Computer War Games
Do you want to learn how to create computer war games, but don't know how to get started or don't have any experience with game programming? "Going to War: Creating Computer War Games" shows you how to use the drag-and-drop game engine, Multimedia Fusion 2, to make your very own computer war games to play and share. After an...
Buffer Overflow Attacks Buffer overflows. In most information technology circles these days, the term buffer overflows has become synonymous with vulnerabilities or in some cases, exploits. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly, and have...
|Result Page: 19 18 17 16 15 14 13 12 11 10 |