Home | Amazing | Today | Tags | Publishers | Years | Search 
JavaScript at Scale
JavaScript at Scale

Build web applications that last, with scaling insights from the front-line of JavaScript development

About This Book

  • Design and implement JavaScript application architectures that scale from a number of perspectives, such as addressability, configurability, and performance
  • Understand...
Fail Fast or Win Big: The Start-Up Plan for Starting Now
Fail Fast or Win Big: The Start-Up Plan for Starting Now

Entrepreneurs have long been taught that to be successful, they need to spend months perfecting a business plan and finding investors before they can finally launch their business. But with the marketplace changing at lightning speed, this notion is not only outdated - it's costly. There's no point to building a business in a bubble....

Network Tutorial
Network Tutorial
This text is written for those trying to get up to speed or stay current with the complex challenges of designing, constructing, maintaining, upgrading, and managing the network infrastructure.

Network Tutorial delivers insight and understanding about network technology to managers and executives trying to get up to speed or stay...

Mastering Perl
Mastering Perl
This is the third in O'Reilly's series of landmark Perl tutorials, which started with Learning Perl, the bestselling introduction that taught you the basics of Perl syntax, and Intermediate Perl, which taught you how to create re-usable Perl software. Mastering Perl pulls everything together to show you how to bend Perl...
Software Fault Tolerance Techniques and Implementation (Artech House Computer Security Series)
Software Fault Tolerance Techniques and Implementation (Artech House Computer Security Series)
The scope, complexity, and pervasiveness of computer-based and controlled systems continue to increase dramatically. The consequences of these systems failing can range from the mildly annoying to catastrophic, with serious injury occurring or lives lost, human-made and natural systems destroyed, security breached, businesses failed, or...
Beginning Programming For Dummies
Beginning Programming For Dummies

New techniques make programming easier and more fun

Discover principles and best practices that let you program in many languages

So you always thought programmers were superior beings from another galaxy? Surprise! Programming isn't all that difficult when you know how. Here's the fun and easy route to writing programs that work...

J2EE and XML Development
J2EE and XML Development
Geared toward experienced developers, this reference demonstrates how Java 2 Platform, Enterprise Edition (J2EE), and XML technologies can be used together to create more robust distributed applications and software systems. The use of XML technology to extend and enhance the capabilities of the J2EE platform is covered in detail. Discussed...
Jakarta Pitfalls: Time-Saving Solutions for Struts, Ant, JUnit, and Cactus
Jakarta Pitfalls: Time-Saving Solutions for Struts, Ant, JUnit, and Cactus
Escape from common coding pitfalls with this detailed book of proven Jakarta missteps and solutions

The dangers of Jakarta pitfalls are everywhere and countless developers have already been trapped. These mistakes have delayed schedules, allowed major bugs to get into the users’ hands, or led to numerous rewrites in maintenance. Luckily,...

Planning Extreme Programming
Planning Extreme Programming

The hallmarks of Extreme Programming--constant integration and automated testing, frequent small releases that incorporate continual customer feedback, and a teamwork approach--make it an exceptionally flexible and effective approach to software development. Once considered radical, Extreme Programming (XP) is rapidly becoming
...
Intrusion Detection and Correlation: Challenges and Solutions
Intrusion Detection and Correlation: Challenges and Solutions

Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts produced. This volume discusses the role of intrusion detection in the realm of network security with comparisons to traditional methods such as firewalls and...

Master Humphrey's Clock
Master Humphrey's Clock
THE reader must not expect to know where I live. At present, it is true, my abode may be a question of little or no import to anybody; but if I should carry my readers with me, as I hope to do, and there should spring up between them and me feelings of homely affection and regard attaching something of interest to matters ever so slightly connected...
Outsourcing for Radical Change: A Bold Approach to Enterprise Transformation
Outsourcing for Radical Change: A Bold Approach to Enterprise Transformation

If you’re looking for a serious infusion of life-blood into your company, transformational outsourcing could be the answer. This new, bold approach is not just about handing off non-core functions in order to cut costs. It’s about transforming the entire operating model—to boost a company’s stock price, increase its...

Result Page: 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy