Learning SAS by Example: A Programmer's Guide


Ron Cody - 2007
    In an instructive and conversational tone, Cody clearly explains how to program SAS, illustrating with one or more real-life examples and giving a detailed description of how the program works.

Thinking in C++


Bruce Eckel - 1995
    It shows readers how to step back from coding to consider design strategies and attempt to get into the head of the designer.

Go in Practice


Matt Butcher - 2015
    Following a cookbook-style Problem/Solution/Discussion format, this practical handbook builds on the foundational concepts of the Go language and introduces specific strategies you can use in your day-to-day applications. You'll learn techniques for building web services, using Go in the cloud, testing and debugging, routing, network applications, and much more.

Ejb 3 in Action


Debu Panda - 2007
    This book builds on the contributions and strengths of seminal technologies like Spring, Hibernate, and TopLink.EJB 3 is the most important innovation introduced in Java EE 5.0. EJB 3 simplifies enterprise development, abandoning the complex EJB 2.x model in favor of a lightweight POJO framework. The new API represents a fresh perspective on EJB without sacrificing the mission of enabling business application developers to create robust, scalable, standards-based solutions.EJB 3 in Action is a fast-paced tutorial, geared toward helping you learn EJB 3 and the Java Persistence API quickly and easily. For newcomers to EJB, this book provides a solid foundation in EJB. For the developer moving to EJB 3 from EJB 2, this book addresses the changes both in the EJB API and in the way the developer should approach EJB and persistence.

An Introduction to APIs


Brian Cooksey - 2016
    We start off easy, defining some of the tech lingo you may have heard before, but didn’t fully understand. From there, each lesson introduces something new, slowly building up to the point where you are confident about what an API is and, for the brave, could actually take a stab at using one.

React Design Patterns and Best Practices


Michele Bertoli - 2017
    What You Will Learn - Write clean and maintainable code - Create reusable components applying consolidated techniques - Use React effectively in the browser and node - Choose the right styling approach according to the needs of the applications - Use server-side rendering to make applications load faster - Build high-performing applications by optimizing components In Detail Taking a complete journey through the most valuable design patterns in React, this book demonstrates how to apply design patterns and best practices in real-life situations, whether that's for new or already existing projects. It will help you to make your applications more flexible, perform better, and easier to maintain - giving your workflow a huge boost when it comes to speed without reducing quality. We'll begin by understanding the internals of React before gradually moving on to writing clean and maintainable code. We'll build components that are reusable across the application, structure applications, and create forms that actually work. Then we'll style React components and optimize them to make applications faster and more responsive. Finally, we'll write tests effectively and you'll learn how to contribute to React and its ecosystem. By the end of the book, you'll be saved from a lot of trial and error and developmental headaches, and you will be on the road to becoming a React expert. Style and approach The design patterns in the book are explained using real-world, step-by-step examples. For each design pattern, there are hints about when to use it and when to look for something more suitable. This book can also be used as a practical guide, showing you how to leverage design patterns.

Web Hacking 101


Peter Yaworski
    With few exceptions, existing books are overly technical, only dedicate a single chapter to website vulnerabilities or don't include any real world examples. This book is different.Using publicly disclosed vulnerabilities, Web Hacking 101 explains common web vulnerabilities and will show you how to start finding vulnerabilities and collecting bounties. With over 30 examples, the book covers topics like:HTML InjectionCross site scripting (XSS)Cross site request forgery (CSRF)Open RedirectsRemote Code Execution (RCE)Application Logicand more...Each example includes a classification of the attack, a report link, the bounty paid, easy to understand description and key takeaways. After reading this book, your eyes will be opened to the wide array of vulnerabilities that exist and you'll likely never look at a website or API the same way.

Async in C# 5.0


Alex Davies - 2012
    Along with a clear introduction to asynchronous programming, you get an in-depth look at how the async feature works and why you might want to use it in your application.Written for experienced C# programmers—yet approachable for beginners—this book is packed with code examples that you can extend for your own projects.Write your own asynchronous code, and learn how async saves you from this messy choreDiscover new performance possibilities in ASP.NET web server codeExplore how async and WinRT work together in Windows 8 applicationsLearn the importance of the await keyword in async methodsUnderstand which .NET thread is running your code—and at what points in the programUse the Task-based Asynchronous Pattern (TAP) to write asynchronous APIs in .NETTake advantage of parallel computing in modern machinesMeasure async code performance by comparing it with alternatives

XML in a Nutshell


Elliotte Rusty Harold - 2001
    But you don't need to commit every XML syntax, API, or XSLT transformation to memory; you only need to know where to find it. And if it's a detail that has to do with XML or its companion standards, you'll find it--clear, concise, useful, and well-organized--in the updated third edition of XML in a Nutshell.With XML in a Nutshell beside your keyboard, you'll be able to: Quick-reference syntax rules and usage examples for the core XML technologies, including XML, DTDs, Xpath, XSLT, SAX, and DOM Develop an understanding of well-formed XML, DTDs, namespaces, Unicode, and W3C XML Schema Gain a working knowledge of key technologies used for narrative XML documents such as web pages, books, and articles technologies like XSLT, Xpath, Xlink, Xpointer, CSS, and XSL-FO Build data-intensive XML applications Understand the tools and APIs necessary to build data-intensive XML applications and process XML documents, including the event-based Simple API for XML (SAX2) and the tree-oriented Document Object Model (DOM) This powerful new edition is the comprehensive XML reference. Serious users of XML will find coverage on just about everything they need, from fundamental syntax rules, to details of DTD and XML Schema creation, to XSLT transformations, to APIs used for processing XML documents. XML in a Nutshell also covers XML 1.1, as well as updates to SAX2 and DOM Level 3 coverage. If you need explanation of how a technology works, or just need to quickly find the precise syntax for a particular piece, XML in a Nutshell puts the information at your fingertips.Simply put, XML in a Nutshell is the critical, must-have reference for any XML developer.

A Slice Of Life: Every Person Has A Story


Smita Das Jain - 2021
    An enthralling read!’- Shraddha Sahi, Author of Anamika Khanna Falls in Love & The Case of the Counterfeit CurrencyEvery human wears a mask. Behind the cheerful facade lies faith, hope, trust, love, despair, confidence, insecurity, et al. Everyone has a story. A DINK couple finding Work From Home a challenge... The Couple who wasn’t one... A rigid person who deviates from a lifelong habit... Two people who remain in touch for 35 years, without talking... A daughter who has sacrificed her dreams for her mother… A fictional potpourri of extraordinary narratives of ordinary people who have more to their everyday lives beneath the surface, these stories reflect myriad hues of human behaviour.From the author of the suspense thriller ‘The Lost Identity’ comes an anthology that touches the human heart. ‘The story is so well crafted that it keeps the reader intrigued from start to end, eager to know what happens next!’ - Review for Smita’s First Book ‘The Lost Identity’

Principles of Electronic Communication Systems


Louis E. Frenzel - 1997
    Requiring only basic algebra and trigonometry, the new edition is notable for its readability, learning features and numerous full-color photos and illustrations. A systems approach is used to cover state-of-the-art communications technologies, to best reflect current industry practice. This edition contains greatly expanded and updated material on the Internet, cell phones, and wireless technologies. Practical skills like testing and troubleshooting are integrated throughout. A brand-new Laboratory & Activities Manual provides both hands-on experiments and a variety of other activities, reflecting the variety of skills now needed by technicians. A new Online Learning Center web site is available, with a wealth of learning resources for students. An Instructor Productivity Center CD-ROM features solutions to all problems, PowerPoint lessons, and ExamView test banks for each chapter.

John McAfee's Last Stand


Joshua Davis - 2012
    The tech entrepreneur made a fortune from the antivirus software that bears his name, but he also spent years as a cocaine addict, spiritual guru and yoga expert. In 2009, after losing millions in the stock market crash, he decided to retire to the tiny Central American nation of Belize. That's when things really got weird. He started hanging out with killers, prostitutes, and pimps. He fell in love with a 17-year-old and surrounded his tropical compound with armed guards. In November 2012 his neighbor was found murdered. McAfee, who professed his innocence, fled the police and went into hiding.WIRED's Joshua Davis had months of exclusive access to McAfee before his disappearance and was virtually the only journalist McAfee had contact with when he went on the lam. In this fascinating profile, Davis takes readers into McAfee's heart of darkness, a harrowing and jaw-dropping tale of ambition, paranoia, sex, and madness.From:http://www.amazon.com/gp/product/B00A...

McSweeney's #54: The End of Trust


Dave Eggers - 2018
    Meanwhile, we wade through an unprecedented amount of disinformation and deception. Fake news and Russian-purchased propaganda are woven into our media diets, and anonymity on the internet leaves us ever suspicious.In the face of this, rather than seek privacy where we can, we eagerly offer up our remaining details to social media, craving the surveillance and scrutiny of our peers. We're unsure of how all of this is affecting the moral development of a generation coming of age in this new culture of surveillance, but we continue on. It leads us to wonder if we've reached the end of trust, and if we even care.

More Effective C#: 50 Specific Ways to Improve Your C#


Bill Wagner - 2008
    If you are serious about developing with the C# language, you need this book." -Bill Craun, Principal Consultant, Ambassador Solutions, Inc. "More Effective C# is an opportunity to work beside Bill Wagner. Bill leverages his knowledge of C# and distills his expertise down to some very real advice about programming and designing applications that every serious Visual C# user should know. More Effective C# is one of those rare books that doesn't just regurgitate syntax, but teaches you how to use the C# language." -Peter Ritchie, Microsoft MVP: Visual C# "More Effective C# is a great follow-up to Bill Wagner's previous book. The extensive C# 3.0 and LINQ coverage is extremely timely!" -Tomas Restrepo, Microsoft MVP: Visual C++, .NET, and Biztalk Server "As one of the current designers of C#, it is rare that I learn something new about the language by reading a book. More Effective C# is a notable exception. Gently blending concrete code and deep insights, Bill Wagner frequently makes me look at C# in a fresh light-one that really makes it shine. More Effective C# is at the surface a collection of very useful guidelines. Look again. As you read through it, you'll find that you acquire more than just the individual pieces of advice; gradually you'll pick up on an approach to programming in C# that is thoughtful, beautiful, and deeply pleasant. While you can make your way willy-nilly through the individual guidelines, I do recommend reading the whole book-or at least not skipping over the chapter introductions before you dive into specific nuggets of advice. There's perspective and insight to be found there that in itself can be an important guide and inspiration for your future adventures in C#." -Mads Torgersen, Program Manager, Visual C#, Microsoft "Bill Wagner has written an excellent book outlining the best practices for developers who work with the C# language. By authoring More Effective C#, he has again established himself as one of the most important voices in the C# community. Many of us already know how to use C#. What we need is advice on how to hone our skills so that we can become wiser programmers. There is no more sophisticated source of information on how to become a first-class C# developer than Bill Wagner's book. Bill is intelligent, thoughtful, experienced, and skillful. By applying the lessons from this book to your own code, you will find many ways to polish and improve the work that you produce." -Charlie Calvert, Community Program Manager, Visual C#, Microsoft In More Effective C#, Microsoft C# MVP and Regional Director Bill Wagner introduces fifty brand-new ways to write more efficient and more robust software. This all-new book follows the same format as Wagner's best-selling Effective C# (Addison-Wesley, 2005), providing clear, practical explanations, expert tips, and plenty of realistic code examples. Wagner shows how to make the most of powerful innovations built into Microsoft's new C# 3.0 and .NET Framework 3.5, as well as advanced C# language capabilities not covered in his previous book. Drawing on his unsurpassed C# experience, the author reveals new best practices for working with LINQ, generics, metaprogramming, and many other features. He also uncovers practices that compromise performance or reliability and shows exactly how to avoid them. More Effective C# shows how to Use generics to express your design intent more effectively Master advanced generics techniques, such as constraints, method constraints, and generic specialization Use the multithreaded techniques you'll need to work with the .NET framework every day Express modern design idioms using the rich palette of C# language features Successfully mix object oriented and functional programming constructs Create composable interfaces and avoid confusion in public interfaces Use extension methods to separate contracts from implementation Program successfully with C# closures and anonymous types Write more effective LINQ queries Make the most of LINQ Lazy Evaluation Queries and Lambda Expressions Distinguish and convert between delegates and expression trees Efficiently utilize nullable types and partial classes Use implicit properties for mutable, nonserializable data You're already a successful C# programmer-this book can help you become an outstanding one.

Invasion


P.P. Corcoran - 2017
    A secret past. A past that the K’tai didn’t reckon on. Humanity, previously dependent on the K'Tai for its Redlazore, discovers vast resources of the most valuable mineral in the galaxy on Agate and are now free to expand across the stars: Redlazore is also the key component to faster-than-light travel. The planet Agate is, however, the human colony-world which lies perilously close to the K'Tai Imperium and the K'Tai resolve to put the upstart humans back in their place. The K'Tai Imperium invades Agate. On the ground, in the midst of the whirlwind conflict is the Carter family: Dave a mid-level exec is working in downtown Gemini City, Sue his wife, a high school teacher and their teenage twins, Jodee and Chris are on a school trip to a Redlazore mine. In space, the League Border Patrol face overwhelming odds as the K'Tai fleet advance. The K'Tai soldiers of the infamous Black Legion descend on Agate, opposed by the meagre, poorly-armed militia and a sprinkling of regular marines. The planet and those upon it are engulfed in the flames of war. The K'Tai, however, did not count on the Carters. For the Carters have a secret. A secret which will cost the K'Tai Imperium dearly. The Carters are Agate's human population's only hope.