I still remember deploying my first Microsoft Access application 10 years ago for a head hunting agency.
They had a user base of about 200 users (I can already hear some of you groan) and they needed a
system to manage job applicants and the companies that want to hire them. And they tossed my meager
development team of two an...
Going Corporate: A Geek's Guide shows technology workers how to gain the understanding and skills necessary for becoming an effective, promotable manager or sought-after consultant or freelancer.
Technology professionals typically dive deeply into small pieces of technology—like lines of code or the design of...
Programming is a fascinating and challenging subject. Unfortunately, it is rarely presented as such. Most often it is taught by "induction": features of some famous programming languages are given operational meaning (e.g. a loop "goes round and round"), a number of examples are shown, and by induction, we are asked to...
This course is the official courseware for the Security Certified Program SC0-451
certification exam. The Tactical Perimeter Defense course is designed to provide
network administrators and certification candidates with hands-on tasks on the
most fundamental perimeter security technologies. The network perimeter is often
the first...
WELCOME TO THE FOURTH EDITION OF C++ Programming: Program Design Including Data
Structures. Designed for a two semester (CS1 and CS2) C++ course, this text will provide a breath
of fresh air to you and your students. The CS1 and CS2 courses serve as the cornerstone of the
Computer Science curriculum. My primary goal is to motivate and...
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are...
The Rhomobile Beginner's guide will speak to every developer's mind, and especially to the technocrats looking for a reliable cross-platform framework encouraging them to explore and try out these wonderful products by Rhomobile. This book guides you step by step to build an enterprise mobile application from scratch, through to...
Knowledge of problem solving and programming concepts is necessary for those who
develop applications for users. Unfortunately, many students have greater difficulty
with problem solving than they do with the syntax of computer languages. The art of
programming is learning multiple techniques and applying those techniques to specific...
Welcome dear reader to this Magento theming book. In this book, we are going to discover
how to modify or create Magento themes from scratch. As you are reading this book, I
assume you already know how great a tool this open source solution is. Though we will go
through some of the basics, like installing and some theoretical concepts,...
Concurrent processes can exhibit extremely complicated behavior, and
neither informal reasoning nor testing is reliable enough to establish their
correctness. In this thesis, we develop a new technique for the verification
of parallel programs. The technique is stated in terms of axioms and inference
rules, and it is used to prove...
When computer software succeeds—when it meets the needs of the people who use
it, when it performs flawlessly over a long period of time, when it is easy to modify
and even easier to use—it can and does change things for the better. But when software
fails—when its users are dissatisfied, when it is error prone, when...
Cisco® Nexus switches and the new NX-OS operating system are rapidly becoming the new de facto standards for data center distribution/aggregation layer networking. NX-OS builds on Cisco IOS to provide advanced features that will be increasingly crucial to efficient data center operations. NX-OS and Cisco...