NSHipster: Obscure Topics in Cocoa & Objective C


Mattt Thompson - 2013
    In cultivating a deep understanding and appreciation of Objective-C, its frameworks and ecosystem, one is able to create apps that delight and inspire users. Combining articles from NSHipster.com with new essays, this book is the essential guide for modern iOS and Mac OS X developers.

Backtrack 5 Wireless Penetration Testing Beginner's Guide


Vivek Ramachandran - 2011
    Every new attack is described in the form of a lab exercise with rich illustrations of all the steps associated. You will practically implement various attacks as you go along. If you are an IT security professional or a security consultant who wants to get started with wireless testing with Backtrack, or just plain inquisitive about wireless security and hacking, then this book is for you. The book assumes that you have familiarity with Backtrack and basic wireless concepts.

Steve and the Swamp Witch of Endor: The Ultimate Minecraft Comic Book Volume 2 (An Unofficial Minecraft Comic Book)


Herobrine Comics - 2015
     Jump into this epic adventure against zombies, skeletons, creepers, and a surprise enemy at the end. Will Steve and Piggy have the courage to defeat the Swamp Witch of Endor? Buy your copy today and find out! Buy your copy now!

The Fifth Western Novel MEGAPACK ®: 4 Novels of the Old West


Walter A. Tompkins - 2015
    Tompkins ... Fleeing a posse, Cleve Logan boards a riverboat loaded with outlaws. Hands are dealt in a desperate game -- and Death will take the last trick!THE RENEGADE HILLS, by Allan K. Echols ... Saddle up -- and ride hell-bent-for-leather down the trail to a hidden valley -- but keep your guns loose in your holsters, 'cause you're riding to an outlaw showdown in the Renegade Hills!LAST-CHANCE RANGE, by Dean Owen ... Byrd Elkhart called the Territory his private range. He strung his barbed wire across forty miles of it, and the other ranchers just stood by with their tails between their legs. But then a different breed of man showed up in the person of Clay Janner, of Texas -- and he was going to drive his scrawny herd over the range even if he had to turn the whole Territory into a six-gun shambles!POWDER SMOKE, by Jackson Gregory ... "Double pay," Bart Warbuck told his gunmen, "and give hundred more to the one who gets Jeff Cody!" -- It was as simple as that if you were Warbuck, had 30 killers on your payroll, and made the law whatever you wanted it to be. But it was hard to take if you were young Cody, and if the only gun you could rely on was the one in your belt. And if you alone could stop Bart Warbuck!If you enjoy this volume of classic Westerns, don't forget to search your favorite ebook store for "Wildside Press Megapack" to see the 220+ other entries in this series, including not just historical fiction, but mysteries, adventure, science fiction, fantasy, horror -- and much, much more!

The REST API Design Handbook


George Reese - 2012
    The RESTful approach to web services design is rapidly become the approach of choice. Unfortunately, too few people have truly solid REST API design skills, and discussions of REST can become bogged down in dry theory.The REST API Design Handbook is a simple, practical guide to aid software engineers and software architects create lasting, scalable APIs based on REST architectural principles. The book provides a sound foundation in discussing the constraints that define a REST API. It quickly goes beyond that into the practical aspects of implementing such an API in the real world.Written by cloud computing expert George Reese, The REST API Design Handbook reflects hands on work in consuming many different third party APIs as well the development of REST-based web services APIs. It addresses all of the debates the commonly arise while creating these APIs. Subjects covered include:* REST architectural constraints* Using HTTP methods and response codes in an API* Authenticating RESTful API calls* Versioning* Asynchronous Operations* Pagination and Streaming* Polling and Push Notifications* Rate Limiting

AWS Lambda: A Guide to Serverless Microservices


Matthew Fuller - 2016
    Lambda enables users to develop code that executes in response to events - API calls, file uploads, schedules, etc - and upload it without worrying about managing traditional server metrics such as disk space, memory, or CPU usage. With its "per execution" cost model, Lambda can enable organizations to save hundreds or thousands of dollars on computing costs. With in-depth walkthroughs, large screenshots, and complete code samples, the reader is guided through the step-by-step process of creating new functions, responding to infrastructure events, developing API backends, executing code at specified intervals, and much more. Introduction to AWS Computing Evolution of the Computing Workload Lambda Background The Internals The Basics Functions Languages Resource Allocation Getting Set Up Hello World Uploading the Function Working with Events AWS Events Custom Events The Context Object Properties Methods Roles and Permissions Policies Trust Relationships Console Popups Cross Account Access Dependencies and Resources Node Modules OS Dependencies OS Resources OS Commands Logging Searching Logs Testing Your Function Lambda Console Tests Third-Party Testing Libraries Simulating Context Hello S3 Object The Bucket The Role The Code The Event The Trigger Testing When Lambda Isn’t the Answer Host Access Fine-Tuned Configuration Security Long-Running Tasks Where Lambda Excels AWS Event-Driven Tasks Scheduled Events (Cron) Offloading Heavy Processing API Endpoints Infrequently Used Services Real-World Use Cases S3 Image Processing Shutting Down Untagged Instances Triggering CodeDeploy with New S3 Uploads Processing Inbound Email Enforcing Security Policies Detecting Expiring Certificates Utilizing the AWS API Execution Environment The Code Pipeline Cold vs. Hot Execution What is Saved in Memory Scaling and Container Reuse From Development to Deployment Application Design Development Patterns Testing Deployment Monitoring Versioning and Aliasing Costs Short Executions Long-Running Processes High-Memory Applications Free Tier Calculating Pricing CloudFormation Reusable Template with Minimum Permissions Cross Account Access CloudWatch Alerts AWS API Gateway API Gateway Event Creating the Lambda Function Creating a New API, Resource, and Method Initial Configuration Mapping Templates Adding a Query String Using HTTP Request Information Within Lambda Deploying the API Additional Use Cases Lambda Competitors Iron.io StackHut WebTask.io Existing Cloud Providers The Future of Lambda More Resources Conclusion

Professional Android 4 Application Development


Reto Meier - 2012
    If you're anexperienced developer, you can start creating robust mobile Androidapps right away with this professional guide to Android 4application development. Written by one of Google's lead Androiddeveloper advocates, this practical book walks you through a seriesof hands-on projects that illustrate the features of the AndroidSDK. That includes all the new APIs introduced in Android 3 and 4, including building for tablets, using the Action Bar, Wi-Fi Direct, NFC Beam, and more.Shows experienced developers how to create mobile applicationsfor Android smartphones and tabletsRevised and expanded to cover all the Android SDK releasesincluding Android 4.0 (Ice Cream Sandwich), including all updatedAPIs, and the latest changes to the Android platform.Explains new and enhanced features such as drag and drop, fragments, the action bar, enhanced multitouch support, newenvironmental sensor support, major improvements to the animationframework, and a range of new communications techniques includingNFC and Wi-Fi direct.Provides practical guidance on publishing and marketing yourapplications, best practices for user experience, and moreThis book helps you learn to master the design, lifecycle, andUI of an Android app through practical exercises, which you canthen use as a basis for developing your own Android apps.

The Busy Coder's Guide To Android Development


Mark L. Murphy - 2012
    "Java Programming & Application Development for Google/Open Handset Alliance Mobile Phones & Internet Devices."

Rage of the Mountain Man / Betrayal of the Mountain Man (Mountain Man, #13, 34)


William W. Johnstone - 2008
    His Name Is Smoke Jensen: Mountain Man...Smoke Jensen is the most powerful man on the Sugarloaf frontier--and he's all that stands between a greedy group of Eastern slickers and their schemes for a criminal empire in the Rockies. When Smoke heads back to Boston with his wife, it gives his enemies the opening they'd been waiting for: to kill the mountain man and take over the West.But even on the unfamiliar turf of back alleys and teeming docks, Smoke is more than most men can handle...until his wife is kidnapped. Now Smoke is in a fury and in this fight all the way from Boston back to Dodge City and up to Yellowstone, where a brutal showdown with a gang of hired guns awaits...and where, in a blazing hail of bullets and blood, the legend of the big man is about to grow even bigger... There's Nothing A Man Won't Do To Clear His Name They called him fastest gun alive, but Smoke Jensen is determined to stay on the right side of the law. That is, until he's jumped by six low-life robbers who steal his shirt--and his identity. Smoke's tried for robbery and murder, and sentenced to hang in morning. Someone's out to frame the Mountain Man . . . someone who's made a big mistake. Justice--Mountain Man Style Barely managing to escape on the morning of his hanging, Smoke's going after the desperados who've set him up. The gang thinks they have nothing to fear; they've already divided up the loot and gone their separate ways. But Smoke's going to hunt them down one by one. Because nobody frames the Mountain Man. Nobody who plans on staying alive, that is...

Dogman, Bigfoot, and Something More, Volume 1: A Brief Collection of Encounters


P.D. King - 2020
    

Implementing Domain-Driven Design


Vaughn Vernon - 2013
    Vaughn Vernon couples guided approaches to implementation with modern architectures, highlighting the importance and value of focusing on the business domain while balancing technical considerations.Building on Eric Evans’ seminal book, Domain-Driven Design, the author presents practical DDD techniques through examples from familiar domains. Each principle is backed up by realistic Java examples–all applicable to C# developers–and all content is tied together by a single case study: the delivery of a large-scale Scrum-based SaaS system for a multitenant environment.The author takes you far beyond “DDD-lite” approaches that embrace DDD solely as a technical toolset, and shows you how to fully leverage DDD’s “strategic design patterns” using Bounded Context, Context Maps, and the Ubiquitous Language. Using these techniques and examples, you can reduce time to market and improve quality, as you build software that is more flexible, more scalable, and more tightly aligned to business goals.

Programming Entity Framework: Code First


Julia Lerman - 2011
    With this concise book, you’ll work hands-on with examples to learn how Code First can create an in-memory model and database by default, and how you can exert more control over the model through further configuration.Code First provides an alternative to the database first and model first approaches to the Entity Data Model. Learn the benefits of defining your model with code, whether you’re working with an existing database or building one from scratch. If you work with Visual Studio and understand database management basics, this book is for you.Learn exactly what Code First does—and does not—enable you to doUnderstand how property attributes, relationships, and database mappings are inferred from your classes by Code FirstUse Data Annotations and the Fluent API to configure the Code First data modelPerform advanced techniques, such as controlling the database schema and overriding the default model cachingThis book is a continuation of author Julia Lerman’s Programming Entity Framework, widely recognized as the leading book on the topic.

Training Kit (Exam 70-461): Querying Microsoft SQL Server 2012


Itzik Ben-Gan - 2012
    Work at your own pace through a series of lessons and practical exercises, and then assess your skills with practice tests on CD—featuring multiple, customizable testing options.Maximize your performance on the exam by learning how to:Create database objectsWork with dataModify dataTroubleshoot and optimize queriesYou also get an exam discount voucher—making this book an exceptional value and a great career investment.

Go in Practice


Matt Butcher - 2015
    Following a cookbook-style Problem/Solution/Discussion format, this practical handbook builds on the foundational concepts of the Go language and introduces specific strategies you can use in your day-to-day applications. You'll learn techniques for building web services, using Go in the cloud, testing and debugging, routing, network applications, and much more.

Ejb 3 in Action


Debu Panda - 2007
    This book builds on the contributions and strengths of seminal technologies like Spring, Hibernate, and TopLink.EJB 3 is the most important innovation introduced in Java EE 5.0. EJB 3 simplifies enterprise development, abandoning the complex EJB 2.x model in favor of a lightweight POJO framework. The new API represents a fresh perspective on EJB without sacrificing the mission of enabling business application developers to create robust, scalable, standards-based solutions.EJB 3 in Action is a fast-paced tutorial, geared toward helping you learn EJB 3 and the Java Persistence API quickly and easily. For newcomers to EJB, this book provides a solid foundation in EJB. For the developer moving to EJB 3 from EJB 2, this book addresses the changes both in the EJB API and in the way the developer should approach EJB and persistence.