 |
|
 RESTful .NET: Build and Consume RESTful Web Services with .NET 3.5
I’ve been working with the Web throughout my entire software engineering career. I started out writing ASP pages and COM components. I then moved into the world of .NET with ASP.NET and ASMX web services.
In 2004, I got involved with BizTalk Server, which pushed me even more into the world of services and XML. I worked with... |  |  DSLs in Action
Your success—and sanity—are closer at hand when you work at a higher level of abstraction, allowing your attention to be on the business problem rather than the details of the programming platform. Domain Specific Languages -- “little languages” implemented on top of conventional programming languages -- give... |  |  C# Programming Language (Covering C# 4.0), The (4th Edition)
The popular C# programming language combines the high productivity of rapid application development languages with the raw power of C and C++. Updated to cover the new features of C# 4.0, including dynamic binding, named and optional parameters, and covariant and contravariant generic types, this release takes the language... |
|
|
 Domain-Specific Languages (Addison-Wesley Signature Series (Fowler))
When carefully selected and used, Domain-Specific Languages (DSLs) may simplify complex code, promote effective communication with customers, improve productivity, and unclog development bottlenecks. In Domain-Specific Languages, noted software development expert Martin Fowler first provides the information software... |  |  ASP.NET MVC 2 Cookbook
Ten years ago, ASP.NET provided software developers with a means to write complex web applications with their existing Windows Forms skillsets. Today, it continues to be a robust framework for writing scalable applications, from small e-Commerce to enterprise-level CRM. But ten years later, with many business critical applications existing... |  |  Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
This book has been developed by and for security professionals who are dedicated to working in an ethical and responsible manner to improve the overall security posture of individuals, corporations, and nations.
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS
Thwart malicious network intrusion... |
|
|
| Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |