Book picks similar to
Pro WPF: Windows Presentation Foundation in .NET 3.0 by Matthew MacDonald
wpf
consultazione
non-letti
software
Google Hacks: Tips & Tools for Finding and Using the World's Information
Rael Dornfest - 2003
But few people realize that Google also gives you hundreds of cool ways to organize and play with information.Since we released the last edition of this bestselling book, Google has added many new features and services to its expanding universe: Google Earth, Google Talk, Google Maps, Google Blog Search, Video Search, Music Search, Google Base, Google Reader, and Google Desktop among them. We've found ways to get these new services to do even more.The expanded third edition of Google Hacks is a brand-new and infinitely more useful book for this powerful search engine. You'll not only find dozens of hacks for the new Google services, but plenty of updated tips, tricks and scripts for hacking the old ones. Now you can make a Google Earth movie, visualize your web site traffic with Google Analytics, post pictures to your blog with Picasa, or access Gmail in your favorite email client. Industrial strength and real-world tested, this new collection enables you to mine a ton of information within Google's reach. And have a lot of fun while doing it:Search Google over IM with a Google Talk bot Build a customized Google Map and add it to your own web site Cover your searching tracks and take back your browsing privacy Turn any Google query into an RSS feed that you can monitor in Google Reader or the newsreader of your choice Keep tabs on blogs in new, useful ways Turn Gmail into an external hard drive for Windows, Mac, or Linux Beef up your web pages with search, ads, news feeds, and more Program Google with the Google API and language of your choice For those of you concerned about Google as an emerging Big Brother, this new edition also offers advice and concrete tips for protecting your privacy. Get into the world of Google and bend it to your will!
The Enterprise and Scrum
Ken Schwaber - 2007
However, with Scrum's lack of prescribed rules, the friction of change can be challenging as people struggle to break from old project management habits. In this book, agile-process revolution leader Ken Schwaber takes you through change management--for your organizational and interpersonal processes--explaining how to successfully adopt Scrum across your entire organization.A cofounder of Scrum, Ken draws from decades of experience, answering your questions through case studies of proven practices and processes. With them, you'll learn how to adopt--and adapt--Scrum in the enterprise. And gain profound levels of transparency into your development processes.Discover how to:Evaluate the benefits of adopting Scrum in any size organization Initiate an enterprise transition project Implement a single, prioritized Product Backlog Organize effective Scrum teams using a top-down approach Adapt and apply solutions for integrating engineering practices across multiple teams Shorten release times by managing high-value increments Refine your Scrum practices and help reduce the length of Sprints
Algorithms in a Nutshell
George T. Heineman - 2008
Algorithms in a Nutshell describes a large number of existing algorithms for solving a variety of problems, and helps you select and implement the right algorithm for your needs -- with just enough math to let you understand and analyze algorithm performance. With its focus on application, rather than theory, this book provides efficient code solutions in several programming languages that you can easily adapt to a specific project. Each major algorithm is presented in the style of a design pattern that includes information to help you understand why and when the algorithm is appropriate. With this book, you will:Solve a particular coding problem or improve on the performance of an existing solutionQuickly locate algorithms that relate to the problems you want to solve, and determine why a particular algorithm is the right one to useGet algorithmic solutions in C, C++, Java, and Ruby with implementation tipsLearn the expected performance of an algorithm, and the conditions it needs to perform at its bestDiscover the impact that similar design decisions have on different algorithmsLearn advanced data structures to improve the efficiency of algorithmsWith Algorithms in a Nutshell, you'll learn how to improve the performance of key algorithms essential for the success of your software applications.
Regular Expression Pocket Reference: Regular Expressions for Perl, Ruby, PHP, Python, C, Java and .NET
Tony Stubblebine - 2007
Ideal as a quick reference, Regular Expression Pocket Reference covers the regular expression APIs for Perl 5.8, Ruby (including some upcoming 1.9 features), Java, PHP, .NET and C#, Python, vi, JavaScript, and the PCRE regular expression libraries. This concise and easy-to-use reference puts a very powerful tool for manipulating text and data right at your fingertips. Composed of a mixture of symbols and text, regular expressions can be an outlet for creativity, for brilliant programming, and for the elegant solution. Regular Expression Pocket Reference offers an introduction to regular expressions, pattern matching, metacharacters, modes and constructs, and then provides separate sections for each of the language APIs, with complete regex listings including:Supported metacharacters for each language API Regular expression classes and interfaces for Ruby, Java, .NET, and C# Regular expression operators for Perl 5.8 Regular expression module objects and functions for Python Pattern-matching functions for PHP and the vi editor Pattern-matching methods and objects for JavaScript Unicode Support for each of the languages With plenty of examples and other resources, Regular Expression Pocket Reference summarizes the complex rules for performing this critical text-processing function, and presents this often-confusing topic in a friendly and well-organized format. This guide makes an ideal on-the-job companion.
Artificial Intelligence: A Modern Approach
Stuart Russell - 1994
The long-anticipated revision of this best-selling text offers the most comprehensive, up-to-date introduction to the theory and practice of artificial intelligence. *NEW-Nontechnical learning material-Accompanies each part of the book. *NEW-The Internet as a sample application for intelligent systems-Added in several places including logical agents, planning, and natural language. *NEW-Increased coverage of material - Includes expanded coverage of: default reasoning and truth maintenance systems, including multi-agent/distributed AI and game theory; probabilistic approaches to learning including EM; more detailed descriptions of probabilistic inference algorithms. *NEW-Updated and expanded exercises-75% of the exercises are revised, with 100 new exercises. *NEW-On-line Java software. *Makes it easy for students to do projects on the web using intelligent agents. *A unified, agent-based approach to AI-Organizes the material around the task of building intelligent agents. *Comprehensive, up-to-date coverage-Includes a unified view of the field organized around the rational decision making pa
Write Great Code: Volume 1: Understanding the Machine
Randall Hyde - 2004
A dirty little secret assembly language programmers rarely admit to, however, is that what you really need to learn is machine organization, not assembly language programming. Write Great Code Vol I, the first in a series from assembly language expert Randall Hyde, dives right into machine organization without the extra overhead of learning assembly language programming at the same time. And since Write Great Code Vol I concentrates on the machine organization, not assembly language, the reader will learn in greater depth those subjects that are language-independent and of concern to a high level language programmer. Write Great Code Vol I will help programmers make wiser choices with respect to programming statements and data types when writing software, no matter which language they use.
The Design of Design: Essays from a Computer Scientist
Frederick P. Brooks Jr. - 2010
But what do we really know about the design process? What leads to effective, elegant designs? The Design of Design addresses these questions. These new essays by Fred Brooks contain extraordinary insights for designers in every discipline. Brooks pinpoints constants inherent in all design projects and uncovers processes and patterns likely to lead to excellence. Drawing on conversations with dozens of exceptional designers, as well as his own experiences in several design domains, Brooks observes that bold design decisions lead to better outcomes. The author tracks the evolution of the design process, treats collaborative and distributed design, and illuminates what makes a truly great designer. He examines the nuts and bolts of design processes, including budget constraints of many kinds, aesthetics, design empiricism, and tools, and grounds this discussion in his own real-world examples--case studies ranging from home construction to IBM's Operating System/360. Throughout, Brooks reveals keys to success that every designer, design project manager, and design researcher should know.
Specification by Example: How Successful Teams Deliver the Right Software
Gojko Adzic - 2011
In this book, author Gojko Adzic distills interviews with successful teams worldwide, sharing how they specify, develop, and deliver software, without defects, in short iterative delivery cycles.About the Technology Specification by Example is a collaborative method for specifying requirements and tests. Seven patterns, fully explored in this book, are key to making the method effective. The method has four main benefits: it produces living, reliable documentation; it defines expectations clearly and makes validation efficient; it reduces rework; and, above all, it assures delivery teams and business stakeholders that the software that's built is right for its purpose.About the Book This book distills from the experience of leading teams worldwide effective ways to specify, test, and deliver software in short, iterative delivery cycles. Case studies in this book range from small web startups to large financial institutions, working in many processes including XP, Scrum, and Kanban.This book is written for developers, testers, analysts, and business people working together to build great software.Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.What's InsideCommon process patterns How to avoid bad practices Fitting SBE in your process 50+ case studies For additional resources go to specificationbyexample.com.
Game Programming Gems
Mark DeLoura - 2000
But instead of spending hours and hours trying to develop your own answers, now you can find out how the pros do it! Game Programming Gems is a hands-on, comprehensive resource packed with a variety of game programming algorithms written by experts from the game industry and edited by Mark DeLoura, former software engineering lead for Nintendo of America, Inc. and now the newly appointed editor-in-chief of Game Developer magazine. From animation and artificial intelligence to Z-buffering, lighting calculations, weather effects, curved surfaces, mutliple layer Internet gaming, to music and sound effects, all of the major techniques needed to develop a competitive game engine are covered. Game Programming Gems is written in a style accessible to individuals with a range of expertise levels. All of the source code for each algorithm is included and can be used by advanced programmers immediately. For aspiring programmers, there is a detailed tutorial to work through before attempting the code, and suggestions for possible modifications and optimizations are included as well.
Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses
Edward Skoudis - 2005
I asked other people and they didn't seem to know how these things work, or at least they couldn't explain them in a way that I could understand. Counter Hack Reloaded is the clearest explanation of these tools I have ever seen. Thank you!" --Stephen Northcutt, CEO, SANS Institute "Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a 'must-have' and a 'must-read' for anyone remotely associated with computers and computer security." --Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery "Ed Skoudis is a rare individual. He knows the innards of all the various systems, knows all the latest exploits and defenses, and yet is able to explain everything at just the right level. The first edition of Counter Hack was a fascinating read. It's technically intriguing and very clear. . . . A book on vulnerabilities, though, will get out of date, and so we definitely needed this updated and significantly rewritten second edition. This book is a wonderful overview of the field." --From the Foreword by Radia Perlman, series editor, The Radia Perlman Series in Computer Networking and Security; author of Interconnections; and coauthor of Network Security: Private Communications in a Public World "What a great partnership! Ed Skoudis and Tom Liston share an uncanny talent for explaining even the most challenging security concepts in a clear and enjoyable manner. Counter Hack Reloaded is an indispensable resource for those who want to improve their defenses and understand the mechanics of computer attacks." --Lenny Zeltser, coauthor of Malware: Fighting Malicious Code "Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a 'must-have' and a 'must-read' for anyone remotely associated with computers and computer security." --Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery "In addition to having breadth of knowledge about and probing insights into network security, Ed Skoudis's real strength is in his ability to show complex topics in an understandable form. By the time he's done, what started off as a hopeless conglomeration of acronyms starts to sound comfortable and familiar. This book is your best source for understanding attack strategies, attack tools, and the defenses against both." --William Stearns, network security expert, www.stearns.org "This book is a must-have for anyone in the Internet security game. It covers everything from the basic principles to the fine details of online attack methods and counter-strategies and is very engagingly written." --Warwick Ford, coauthor of Secure Electronic Commerce For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security expert Ed Skoudis, with Tom Liston, has thoroughly updated this best-selling guide, showing how to defeat today's newest, most sophisticated, and most destructive attacks.For this second edition, more than half the content is new and updated, including coverage of the latest hacker techniques for scanning networks, gaining and maintaining access, and preventing detection. The authors walk you through each attack and demystify every tool and tactic. You'll learn exactly how to establish effective defenses, recognize attacks in progress, and respond quickly and effectively in both UNIX/Linux and Windows environments.Important features of this new edition includeAll-new "anatomy-of-an-attack" scenarios and tools An all-new section on wireless hacking: war driving, wireless sniffing attacks, and more Fully updated coverage of reconnaissance tools, including Nmap port scanning and "Google hacking" New coverage of tools for gaining access, including uncovering Windows and Linux vulnerabilities with Metasploit New information on dangerous, hard-to-detect, kernel-mode rootkits
Minecraft Diary of a Zombie Hunter Player Team 'The Skull Kids' - Book 1: Unofficial Minecraft Books for Kids, Teens, & Nerds - Adventure Fan Fiction Diary ... Hunter Skull Kids Hunting Herobrine)
Skeleton Steve - 2016
They're three Minecraft players who hop from world to world, hunting zombies and searching for the elusive Herobrine--the ghost in the machine. Teleporting down into a new world, the group is surprised to find that the game has changed once again, rendering almost ALL of their technology and mods useless. And when two of the Skull Kids are starving and distracted by exploring a desert village on Day 1 of their new adventure, the whole group is in danger when the sun goes down! Will the Skull Kids survive? Love Minecraft adventure?? Read Book 1 of the Zombie Hunter Player Team - The Skull Kids - NOW! Join the Skeleton Steve Club! Check out my main website for details--it's in the book. (Get free Minecraft goodies, tips, books, maps, skins, seeds, and more!) Author's Note: This is an unofficial Minecraft book. Minecraft is a registered trademark of, and owned by, Mojang AB, and its respective owners, which do not approve, endorse, sponsor, or authorize this book. Minecraft®/TM & © 2009-2016 Mojang AB/Notch *** Tags: Minecraft Book, game fiction, Minecraft Books for Kids and Teens, minecraft games, game stories, game books, game story books, minecraft tips, minecraft secrets handbook, Minecraft Stories, kids books, minecraft free, minecraft xbox, minecraft story mode, minecraft handbook free, minecraft creepypasta, minecraft diary of a wimpy, game fanfiction, minecraft game, minecraft story book, Minecraft Steve series, minecraft journal book, minecraft comics, free kids books, Minecraft Kids Book, minecraft books for kids, Minecraft Villagers, Minecraft Creeper, herobrine, Minecraft Skeleton Steve, minecraftales, minecraft fanfiction, minecraft diaries, minecraft tales, minecraft short stories, minecraft gift, minecraft short story.
The Swift Programming Language
Apple Inc. - 2014
Swift builds on the best of C and Objective-C, without the constraints of C compatibility. Swift adopts safe programming patterns and adds modern features to make programming easier, more flexible, and more fun. Swift’s clean slate, backed by the mature and much-loved Cocoa and Cocoa Touch frameworks, is an opportunity to reimagine how software development works.
Programming in Python 3: A Complete Introduction to the Python Language
Mark Summerfield - 2008
It brings together all the knowledge needed to write any program, use any standard or third-party Python 3 library, and create new library modules of your own.
Hunter Killer
Harry McCallion - 1998
Their leader, Braxton, is keen to put him off their trail before he learns too much…Fraser is confused and in danger, Galbraith is unsure of who to trust and Braxton is desperate and dangerous: a lethal combination.When the three collide, there’s no knowing what will happen or who will come out alive…And can Fraser ever figure out who he really is? A born ‘Hunter Killer’?Born in Glasgow, Harry McCallion joined the army after leaving school. In a varied and exciting military career he served with the Parachute Regiment, South Africa’s elite Recce Commandos and 22 SAS. After leaving the army in 1985 he joined the RUC, but left in 1990 after a near-fatal car crash. Subsequent to this he studied law and was called to the Bar. Now a working barrister and writer he has recently received his Master’s Degree in International Relations. His autobiography Killing Zone was an immediate bestseller. Follow us on Twitter: @EndeavourPress and on Facebook via http://on.fb.me/1HweQV7. We are always interested in hearing from our readers. Endeavour Press believes that the future is now.
Road To Love
Leah Atwood - 2017
Sing Me Home by Belle Calhoune: Rain Santos and her best friends are embarking on a ten-week road trip. The first destination is Nashville, where Rain hopes to explore her lifelong singing aspirations. When she comes face to face with her country singer ex-boyfriend, Luke Avery, Rain has to deal with their painful past. Luke Avery is seeking redemption for the pain he caused Rain in their relationship. As the two reconnect and Luke helps Rain with her singing aspirations, they find themselves falling into familiar rhythms. Can true love conquer all? Hitched In Hot Springs by Kristen Ethridge: Bridget Vaughan left a childhood of abuse behind and used the adversity to make her stronger, becoming a multi-millionaire small business coach in the years since she left Treasure Harbor. James Cromberg would do just about anything to help his mom, including leaving the military career he loved in order to come home and help her run her family's historic business and take care of his ailing father. When a woman running away from her past connects with a man who fears his own future, is there a way for them to find their way to a present happily-ever-after? Romancing the Storm by Patrica Pacjac Carroll: Lark Morgan is drifting through life. Even though her father’s advice of trust the Lord and enjoy the journey sounds fun, she’s lost the joy not to mention her job. Cody Merrill has amends to make, but he’s a new man and determined to set things right. As the owner of Storm Rangers, he takes people on adventures to see tornadoes. He loves the storms, but something is missing. Or maybe it’s someone. Journey to Her Past by Angel Moore: Jessica Stinson wants to find the man who left her eight years ago with no explanation. Griffin Renfroe’s world turned upside down when he learned he’d been stolen from the hospital on the day he was born. He made decisions he’s come to regret. When Jessica shows up in Amarillo, he knows convincing her of his love will be almost impossible in the face of his new name – and identity. Can Jessica trust the love she still holds for a man who no longer exists? Restore My Heart: Cassidy Frey’s life falls to pieces in the aftermath of her father’s political scandal. Out of a job and ostracized from her current friends, she jumps at the chance for a road trip with her childhood friends. Joel Kingston’s dream of owning a motel along Route 66 is threatened by a shortage of money, but his discouragement doesn’t stop him from helping a group of stranded motorists. Could a broken-down SUV lead to restoration—of hearts and motels?