Python 3 Object Oriented Programming


Dusty Phillips - 2010
    Many examples are taken from real-world projects. The book focuses on high-level design as well as the gritty details of the Python syntax. The provided exercises inspire the reader to think about his or her own code, rather than providing solved problems. If you're new to Object Oriented Programming techniques, or if you have basic Python skills and wish to learn in depth how and when to correctly apply Object Oriented Programming in Python, this is the book for you. If you are an object-oriented programmer for other languages, you too will find this book a useful introduction to Python, as it uses terminology you are already familiar with. Python 2 programmers seeking a leg up in the new world of Python 3 will also find the book beneficial, and you need not necessarily know Python 2.

The Joy of Clojure


Michael Fogus - 2010
    It combines the nice features of a scripting language with the powerful features of a production environment—features like persistent data structures and clean multithreading that you'll need for industrial-strength application development.The Joy of Clojure goes beyond just syntax to show you how to write fluent and idiomatic Clojure code. You'll learn a functional approach to programming and will master Lisp techniques that make Clojure so elegant and efficient. The book gives you easy access to hard soft ware areas like concurrency, interoperability, and performance. And it shows you how great it can be to think about problems the Clojure way. Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book. What's InsideThe what and why of ClojureHow to work with macrosHow to do elegant application designFunctional programming idiomsWritten for programmers coming to Clojure from another programming background—no prior experience with Clojure or Lisp is required.

Strategic Writing for UX: Drive Engagement, Conversion, and Retention with Every Word


Torrey Podmajersky - 2019
    But how do you choose the right words? And how do you know if they work? With this practical book, you'll learn how to write strategically for UX, using tools to build foundational pieces for UI text and UX voice strategy.UX content strategist Torrey Podmajersky provides strategies for converting, engaging, supporting, and re-attracting users. You'll use frameworks and patterns for content, methods to measure the content's effectiveness, and processes to create the collaboration necessary for success. You'll also structure your voice throughout so that the brand is easily recognizable to its audience.Learn how UX content works with the software development lifecycleUse a framework to align the UX content with product principlesExplore content-first design to root UX text in conversationLearn how UX text patterns work with different voicesProduce text that's purposeful, concise, conversational, and clear

Microinteractions: Designing with Details


Dan Saffer - 2013
    With this practical book, you’ll learn how to design effective microinteractions: the small details that exist inside and around features. How can users change a setting? How do they turn on mute, or know they have a new email message?Through vivid, real-world examples from today’s devices and applications, author Dan Saffer walks you through a microinteraction’s essential parts, then shows you how to use them in a mobile app, a web widget, and an appliance. You’ll quickly discover how microinteractions can change a product from one that’s tolerated into one that’s treasured.Explore a microinteraction’s structure: triggers, rules, feedback, modes, and loopsLearn the types of triggers that initiate a microinteractionCreate simple rules that define how your microinteraction can be usedHelp users understand the rules with feedback, using graphics, sounds, and vibrationsUse modes to let users set preferences or modify a microinteractionExtend a microinteraction’s life with loops, such as “Get data every 30 seconds”

The Unearthing


Steve Karmazenuk - 2006
    Before its existence can be concealed, the object unearths itself and news of the discovery is leaked to the international media. As religious leaders strive to reconcile the artifactas existence with their faiths, and governments wrestle over its many secrets and how to exploit them, ordinary men and women around the world struggle to make sense of a perpetual onslaught of live and unfiltered news broadcasts about the object. When a survey team is sent in to examine and explore it, they discover that not only is the artifact still operational, but it is conscious and has been waiting for tens of millions of yearsa]

The Pragmatic Programmer: From Journeyman to Master


Andy Hunt - 1999
    It covers topics ranging from personal responsibility and career development to architectural techniques for keeping your code flexible and easy to adapt and reuse. Read this book, and you'll learn how toFight software rot; Avoid the trap of duplicating knowledge; Write flexible, dynamic, and adaptable code; Avoid programming by coincidence; Bullet-proof your code with contracts, assertions, and exceptions; Capture real requirements; Test ruthlessly and effectively; Delight your users; Build teams of pragmatic programmers; and Make your developments more precise with automation. Written as a series of self-contained sections and filled with entertaining anecdotes, thoughtful examples, and interesting analogies, The Pragmatic Programmer illustrates the best practices and major pitfalls of many different aspects of software development. Whether you're a new coder, an experienced programmer, or a manager responsible for software projects, use these lessons daily, and you'll quickly see improvements in personal productivity, accuracy, and job satisfaction. You'll learn skills and develop habits and attitudes that form the foundation for long-term success in your career. You'll become a Pragmatic Programmer.

The Definitive Guide to Django: Web Development Done Right


Adrian Holovaty - 2007
    In "The Definitive Guide to Django: Web Development Done Right," Adrian Holovaty, one of Django's creators, and Django lead developer Jacob KaplanMoss show you how they use this framework to create awardwinning web sites. Over the course of three parts, they guide you through the creation of a web application reminiscent of chicagocrime.org.The first part of the book introduces Django fundamentals like installation and configuration. You'll learn about creating the components that power a Django-driven web site. The second part delves into the more sophisticated features of Django, like outputting nonHTML content (such as RSS feeds and PDFs), plus caching and user management. The third part serves as a detailed reference to Django's many configuration options and commands. The book even includes seven appendices for looking up configurations options and commands. In all, this book provides the ultimate tutorial and reference to the popular Django framework. What you'll learnThe first half of this book explains in-depth how to build web applications using Django including the basics of dynamic web pages, the Django templating system interacting with databases, and web forms. The second half of this book discusses higher-level concepts such as caching, security, and how to deploy Django. The appendices form a reference for the commands and configurations available in Django. Who this book is forAnyone who wants to use the powerful Django framework to build dynamic web sites quickly and easily! "

Design Systems: A practical guide to creating design languages for digital products


Alla Kholmatova - 2017
    Some can generate coherent user experiences, others produce confusing patchwork designs. Some inspire teams to contribute to them, while others are neglected. Some get better with time, more cohesive and better functioning; others get worse, becoming bloated and cumbersome.Throughout this book, Alla Kholmatova, previously a lead designer at FutureLearn, will share an approach and the key qualities of effective, enduring design systems. It’s based on Alla’s experiences, case-studies from AirBnB, Atlassian, Eurostar, TED, and Sipgate, plus 18 months of research and interviews — all attempting to figure out what works and what doesn’t work in real-life products. It may not answer every question, but it will help you figure out just the right strategy for establishing and evolving a design system in your organization.

WordPress: The Missing Manual


Matthew MacDonald - 2012
    This jargon-free Missing Manual shows you how to use WordPress and its themes, plug-ins, and widgets to build just about any website you can imagine, from a classy blog to a basic e-commerce site.The important stuff you need to know:Create a blog. Get a free WordPress.com account, choose the right theme, and start publishing content.Build a website. Produce a professional-looking business site by customizing a WordPress theme.Add features. Choose from thousands of WordPress widgets and plug-ins to extend your site’s features.Mix in multimedia. Include slideshows, video clips, webcasts, podcasts, and music players.Involve your readers. Let readers leave comments, contribute to your site, and carry on a dialog.Build an audience. Learn search-engine optimization, measure your reader’s favorite pages, and publicize your site.Create a community. Use social media tools such as “Like” and sharing buttons, and provide RSS feeds of your posts.

OAuth 2 in Action


Justin Richer - 2017
    You'll learn how to confidently and securely build and deploy OAuth on both the client and server sides. Foreword by Ian Glazer.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.About the TechnologyThink of OAuth 2 as the web version of a valet key. It is an HTTP-based security protocol that allows users of a service to enable applications to use that service on their behalf without handing over full control. And OAuth is used everywhere, from Facebook and Google, to startups and cloud services.About the BookOAuth 2 in Action teaches you practical use and deployment of OAuth 2 from the perspectives of a client, an authorization server, and a resource server. You'll begin with an overview of OAuth and its components and interactions. Next, you'll get hands-on and build an OAuth client, an authorization server, and a protected resource. Then you'll dig into tokens, dynamic client registration, and more advanced topics. By the end, you'll be able to confidently and securely build and deploy OAuth on both the client and server sides.What's InsideCovers OAuth 2 protocol and designAuthorization with OAuth 2OpenID Connect and User-Managed AccessImplementation risksJOSE, introspection, revocation, and registrationProtecting and accessing REST APIsAbout the ReaderReaders need basic programming skills and knowledge of HTTP and JSON.About the AuthorJustin Richer is a systems architect and software engineer. Antonio Sanso is a security software engineer and a security researcher. Both authors contribute to open standards and open source.Table of ContentsPart 1 - First stepsWhat is OAuth 2.0 and why should you care?The OAuth dance Part 2 - Building an OAuth 2 environmentBuilding a simple OAuth clientBuilding a simple OAuth protected resourceBuilding a simple OAuth authorization serverOAuth 2.0 in the real world Part 3 - OAuth 2 implementation and vulnerabilitiesCommon client vulnerabilitiesCommon protected resources vulnerabilitiesCommon authorization server vulnerabilitiesCommon OAuth token vulnerabilities Part 4 - Taking OAuth furtherOAuth tokensDynamic client registrationUser authentication with OAuth 2.0Protocols and profiles using OAuth 2.0Beyond bearer tokensSummary and conclusions

Flesh Collectors: Their Ghoulish Appetites Drove Them to Crimes that Only Began With Murder


Fred Rosen - 2003
    A friendship grew from their shared lust for sadistic brutality, and once released, they teamed up to hunt human prey. In March, 1998, in Pensacola, Florida, while quietly watching TV, Leighton Smitherman was shot in the back by assailants hiding outside his home. Amazingly, he survived, not knowing that he'd been chosen at random by would-be-thrill-killers. Their next target wasn't so lucky. Justin Livingston, 20, died from multiple stab wounds - some more than six inches deep. The horror peaked on 7 May 1999, when Rodgers went on a date with pretty Jennifer Robinson, 18, with Lawrence tagging along. The young woman was drugged and assaulted first by Rodgers, then Lawrence, before Rodgers shot her execution-style. But the worse was yet to come, an unspeakable act of mutilation that followed in the bloody footsteps of one of the most infamous serial killers of our time...

Pmp Exam Prep Questions, Answers, & Explanations: 1000+ Pmp Practice Questions with Detailed Solutions


Christopher Scordo - 2009
    So why aren't students laser-focused on taking practice exams before attempting the real thing? Reflects the current PMP exam format and the PMBOK(r) Guide - Fifth Edition! The practice tests in this book are designed to help students adjust to the pace, subject matter, and difficulty of the real Project Management Professional (PMP) exam. Geared towards anyone preparing for the exam, all tests include clear solutions to help you understand core concepts. If you plan on passing the PMP exam, it's time to test your knowledge. It's time for PMP Exam Prep - Questions, Answers, & Explanations. Now packed with Over 1,000 realistic PMP sample questions to help you pass the exam on your FIRST try. In this book: 1000+ detailed PMP exam practice questions including 18 condensed PMP mock exams that can be completed in one hour; 11 Targeted PMBOK Knowledge Area tests, and detailed solution sets for all PMP questions which include clear explanations and wording, PMBOK Knowledge Area and page references, and reasoning based on the PMBOK Guide - Fifth Edition. Includes FREE PMP exam formula reference sheet! ** For PMP exams AFTER March 2018 **

Perfect Software--And Other Illusions about Testing


Gerald M. Weinberg - 2008
    Editorial Reviews - Perfect Software

Rocket Surgery Made Easy: The Do-It-Yourself Guide to Finding and Fixing Usability Problems


Steve Krug - 2009
    But with a typical price tag of $5,000 to $10,000 for a usability consultant to conduct each round of tests, it rarely happens. In this how-to companion to Don't Make Me Think: A Common Sense Approach to Web Usability, Steve Krug spells out an approach to usability testing that anyone can easily apply to their own web site, application, or other product. (As he said in Don't Make Me Think, "It's not rocket surgery".)In this new book, Steve explains how to: -Test any design, from a sketch on a napkin to a fully-functioning web site or application-Keep your focus on finding the most important problems (because no one has the time or resources to fix them all)-Fix the problems that you find, using his "The least you can do" approachBy pairing the process of testing and fixing products down to its essentials (A morning a month, that's all we ask ), Rocket Surgery makes it realistic for teams to test early and often, catching problems while it's still easy to fix them. Rocket Surgery Made Easy adds demonstration videos to the proven mix of clear writing, before-and-after examples, witty illustrations, and practical advice that made Don't Make Me Think so popular.

Scalable and Modular Architecture for CSS


Jonathan Snook - 2011
    There is no library within here for you to download or install. SMACSS is a way to examine your design process and as a way to fit those rigid frameworks into a flexible thought process. It is an attempt to document a consistent approach to site development when using CSS. And really, who isn’t building a site with CSS these days?!Get to know Scalable and Modular Architecture for CSS