Professional ASP.NET MVC 3


Jon Galloway - 2011
    Book content includes:Getting started with MVC 3, including a rundown of the new project dialog, directory structure and an introduction to NuGet (PowerShell inside Visual Studio 2010)Controllers and Actions View and ViewModelsModels and Databases, including using NuGet to install Entity Framework Code FirstForms and HTML HelpersValidation and Data AnnotationsMembership, Authorization and SecurityAjaxRouting, including routing to Http HandlersNuGet, including using it from the Dialog 'and Package Console, creating a package, custom PowerShell actions and running from both a local repository and the WebDependency InjectionUnit testingExtending ASP.NET MVC with filters and Extensibility pointsWhat's new in MVC 3

Rails Antipatterns: Best Practice Ruby on Rails Refactoring


Chad Pytel - 2010
     Rails(TM) AntiPatterns identifies these widespread Rails code and design problems, explains why they're bad and why they happen--and shows exactly what to do instead.The book is organized into concise, modular chapters--each outlines a single common AntiPattern and offers detailed, cookbook-style code solutions that were previously difficult or impossible to find. Leading Rails developers Chad Pytel and Tammer Saleh also offer specific guidance for refactoring existing bad code or design to reflect sound object-oriented principles and established Rails best practices. With their help, developers, architects, and testers can dramatically improve new and existing applications, avoid future problems, and establish superior Rails coding standards throughout their organizations.This book will help you understand, avoid, and solve problems withModel layer code, from general object-oriented programming violations to complex SQL and excessive redundancy Domain modeling, including schema and database issues such as normalization and serialization View layer tools and conventions Controller-layer code, including RESTful code Service-related APIs, including timeouts, exceptions, backgrounding, and response codes Third-party code, including plug-ins and gems Testing, from test suites to test-driven development processes Scaling and deployment Database issues, including migrations and validations System design for "graceful degradation" in the real world

Programming Pearls


Jon L. Bentley - 1986
    Jon has done a wonderful job of updating the material. I am very impressed at how fresh the new examples seem." - Steve McConnell, author, Code CompleteWhen programmers list their favorite books, Jon Bentley's collection of programming pearls is commonly included among the classics. Just as natural pearls grow from grains of sand that irritate oysters, programming pearls have grown from real problems that have irritated real programmers. With origins beyond solid engineering, in the realm of insight and creativity, Bentley's pearls offer unique and clever solutions to those nagging problems. Illustrated by programs designed as much for fun as for instruction, the book is filled with lucid and witty descriptions of practical programming techniques and fundamental design principles. It is not at all surprising that Programming Pearls has been so highly valued by programmers at every level of experience. In this revision, the first in 14 years, Bentley has substantially updated his essays to reflect current programming methods and environments. In addition, there are three new essays on (1) testing, debugging, and timing; (2) set representations; and (3) string problems. All the original programs have been rewritten, and an equal amount of new code has been generated. Implementations of all the programs, in C or C++, are now available on the Web.What remains the same in this new edition is Bentley's focus on the hard core of programming problems and his delivery of workable solutions to those problems. Whether you are new to Bentley's classic or are revisiting his work for some fresh insight, this book is sure to make your own list of favorites.

The Way to Go: A Thorough Introduction to the Go Programming Language


Ivo Balbaert - 2012
    "

MySQL Crash Course


Ben Forta - 2005
    And this book will teach you all you need to know to be immediately productive with MySQL. By working through 30 highly focused hands-on lessons, your MySQL Crash Course will be both easier and more effective than you'd have thought possible. Learn how to: Retrieve and sort data Filter data using comparisons, regular expressions, full text search, and much more Join relational data Create and alter tables Insert, update, and delete data Leverage the power of stored procedures and triggers Use views and Cursors Manage transactional processing Create user accounts and manage security via access control Ben Forta is Macromedia's Senior Technical Evangelist, and has almost 20 years of experience in the computer industry in product development, support, training, and product marketing. Ben is the author of the best-selling Sams Teach Yourself SQL in 10 Minutes (now in its third edition, and translated into over a dozen languages), ColdFusion Web Application Construction Kit, and Advanced ColdFusion Development (both published by Que Publishing), Sams Teach Yourself Regular Expressions in 10 Minutes, as well as books on SQL, Flash, JSP, HomeSite, WAP, Windows 2000, and other subjects.

Young Einstein: From the Doxerl Affair to the Miracle Year


L. Randles Lagerstrom - 2013
    In 1905 an unknown 26-year-old clerk at the Swiss Patent Office, who had supposedly failed math in school, burst on to the scientific scene and swept away the hidebound theories of the day. The clerk, Albert Einstein, introduced a new and unexpected understanding of the universe and launched the two great revolutions of twentieth-century physics, relativity and quantum mechanics. The obscure origin and wide-ranging brilliance of the work recalled Isaac Newton’s “annus mirabilis” (miracle year) of 1666, when as a 23-year-old seeking safety at his family manor from an outbreak of the plague, he invented calculus and laid the foundations for his theory of gravity. Like Newton, Einstein quickly became a scientific icon--the image of genius and, according to Time magazine, the Person of the Century.The actual story is much more interesting. Einstein himself once remarked that “science as something coming into being ... is just as subjectively, psychologically conditioned as are all other human endeavors.” In this profile, the historian of science L. Randles Lagerstrom takes you behind the myth and into the very human life of the young Einstein. From family rifts and girlfriend troubles to financial hardships and jobless anxieties, Einstein’s early years were typical of many young persons. And yet in the midst of it all, he also saw his way through to profound scientific insights. Drawing upon correspondence from Einstein, his family, and his friends, Lagerstrom brings to life the young Einstein and enables the reader to come away with a fuller and more appreciative understanding of Einstein the person and the origins of his revolutionary ideas.About the cover image: While walking to work six days a week as a patent clerk in Bern, Switzerland, Einstein would pass by the famous "Zytglogge" tower and its astronomical clocks. The daily juxtaposition was fitting, as the relative nature of time and clock synchronization would be one of his revolutionary discoveries in the miracle year of 1905.

Hacking Exposed: Network Security Secrets & Solutions


Joel Scambray - 2003
    Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company, and your country fight cyber-crime." —From the Foreword by Dave DeWalt, President and CEO, McAfee, Inc."For security to be successful in any company, you must ‘think evil' and be attuned to your ‘real risk'...Hacking Expose 6 defines both." —Patrick Heim, CISO, Kaiser Permanente"The definitive resource to understanding the hacking mindset and the defenses against it." —Vince Rossi, CEO & President, St. Bernard Software"Identity theft costs billions every year and unless you understand the threat, you will be destined to be a victim of it. Hacking Exposed 6 gives you the tools you need to prevent being a victim." —Bill Loesch, CTO, Guard ID Systems"This book is current, comprehensive, thoughtful, backed by experience, and appropriately free of vendor-bias-prized features for any security practitioner in need of information." —Kip Boyle, CISO, PEMCO Mutual Insurance Company"The Hacking Exposed series has become the definitive reference for security professionals from the moment it was first released, and the 6th edition maintains its place on my bookshelf," —Jeff Moss, Founder of the popular Black Hat Security ConferenceMeet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal.New and updated material: New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits New wireless and RFID security tools, including multilayered encryption and gateways All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking Fully updated chapters on hacking the Internet user, web hacking, and securing code

The Twelve-Factor App


Adam Wiggins - 2012
    The twelve-factor app is a methodology for building software-as-a-service apps that: - Use declarative formats for setup automation, to minimize time and cost for new developers joining the project; - Have a clean contract with the underlying operating system, offering maximum portability between execution environments; - Are suitable for deployment on modern cloud platforms, obviating the need for servers and systems administration; - Minimize divergence between development and production, enabling continuous deployment for maximum agility; - And can scale up without significant changes to tooling, architecture, or development practices.The twelve-factor methodology can be applied to apps written in any programming language, and which use any combination of backing services (database, queue, memory cache, etc).

Together: A Journey for Survival


Ann Arnold - 2016
    Married to the man of her dreams, mother to two beautiful children, and a member of one of the most respected families in town; she had it all. The year was 1939, and the world was about to change. In a heartbreaking instant, she had to trade her life of security, family, and simple pleasures--for one of unspeakable loneliness, hardship, and danger. Nothing more than hunted prey, she relied on her inner strength and indomitable will to keep her children alive. But would it be enough? How far would she have to go, and did she have the resolve to get there? One thing she knew for sure ...she and her children would live or die one way …. TOGETHER. Manek was six years old when his world began to collapse. At first, his young eyes failed to see it, but reality came quickly into focus, when his loving gentle mother was forced to beat him in order to save his life. That is when he realized the Nazis wanted to kill him. Suddenly thrust into a new role as man of the house, would he be able to help keep his family safe? Was he strong enough to protect them? He knew only one thing ... they would survive if they could stay …TOGETHER. In Together: A Journey for Survival, Ann Arnold shares her family's journey through Poland's countryside as a war of nations thunders around them. The story displays the magnificent strength of a mother's love and the incredible courage of good people during the worst of times. "An important work. Ann Arnold's effort to both tell their tale of her family's survival during the Holocaust while being a part of encouraging the next generation to embrace tolerance is inspiring." -Michael Cohen, The Simon Wiesenthal Center "A fascinating story that takes a reader inside an already wounded family toiling through horrific difficulty in the pursuit of life itself. .. it forces readers to ask themselves if they could endure a struggle or whether they might support another person in a life or death battle. This angle makes the book valuable for teachers to use and beneficial for students to read at the high school level.” -Lawrence M. Glaser, N.J. Commission on Holocaust Education “Incredible Story” –Northern Valley Press "Arnold’s perspective is colored not only by those non-Jews who saved her father’s family but also by her experience visiting Brzostek as an adult." –New Jersey Jewish News

Software Engineering (International Computer Science Series)


Ian Sommerville - 1982
    Restructured into six parts, this new edition covers a wide spectrum of software processes from initial requirements solicitation through design and development.

After Effects Apprentice


Trish Meyer - 2007
    http://69.131.42.194/showpic.php?imag...

Machines that Think: Everything you need to know about the coming age of artificial intelligence (New Scientist Instant Expert)


New Scientist - 2017
    So are we on the edge of an AI-pocalypse, with super-intelligent devices superseding humanity, as predicted by Stephen Hawking? Or will this herald a kind of Utopia, with machines doing a far better job at complex tasks than us? You might not realise it, but you interact with AIs every day. They route your phone calls, approve your credit card transactions and help your doctor interpret results. Driverless cars will soon be on the roads with a decision-making computer in charge. But how do machines actually think and learn? In Machines That Think, AI experts and New Scientist explore how artificial ingence helps us understand human intelligence, machines that compose music and write stories - and ask if AI is really a threat.--