Professional Test Driven Development with C#: Developing Real World Applications with Tdd


James Bender - 2011
    This hands-on guide provides invaluable insight for creating successful test-driven development processes. With source code and examples featured in both C# and .NET, the book walks you through the TDD methodology and shows how it is applied to a real-world application. You'll witness the application built from scratch and details each step that is involved in the development, as well as any problems that were encountered and the solutions that were applied.Clarifies the motivation behind test-driven development (TDD), what it is, and how it works Reviews the various steps involved in developing an application and the testing that is involved prior to implementing the functionality Discusses unit testing and refactoring Professional Test-Driven Development with C# shows you how to create great TDD processes right away.

Advanced Concepts in Operating Systems


Mukesh Singhal - 1994
    Numerous examples are provided to reinforce the concepts and relevant case studies illustrate the concepts and mechanisms described.

Thinking in C++


Bruce Eckel - 1995
    It shows readers how to step back from coding to consider design strategies and attempt to get into the head of the designer.

HTML for the World Wide Web with XHTML and CSS (Visual QuickStart Guide)


Elizabeth Castro - 2002
    The task-based approach teaches readers how to combine HTML and CSS to create sharp and consistent Web pages.

MCTS Self-Paced Training Kit (Exam 70-536): Microsoft® .NET Framework 2.0�Application Development Foundation: Microsoft .NET Framework 2.0--Application Development Foundation


Tony Northrup - 2006
    Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce what you’ve learned by applying your knowledge to real-world case scenarios and labs. This official Microsoft study guide is designed to help you make the most of your study time.Maximize your performance on the exam by learning to:Use system types, collections, and generics to help manage data Validate input, reformat text, and extract data with regular expressions Develop services, application domains, and multithreaded applications Enhance your application by adding graphics and images Implement code access security, role-based security, and data encryption Work with serialization and reflection techniques Instrument your applications with logging and tracing Interact with legacy code using COM Interop and PInvoke Practice TestsAssess your skills with practice tests on CD. You can work through hundreds of questions using multiple testing modes to meet your specific learning needs. You get detailed explanations for right and wrong answers—including a customized learning path that describes how and where to focus your studies.Your kit includes:15% exam discount from Microsoft. (Limited time offer). Details inside. Official self-paced study guide. Practice tests with multiple, customizable testing options and a learning plan based on your results. 450 practice and review questions. Case scenarios and lab exercises. Code samples on CD. 90-day evaluation version of Microsoft Visual Studio 2005 Professional Edition. Fully searchable eBook. A Note Regarding the CD or DVDThe print version of this book ships with a CD or DVD. For those customers purchasing one of the digital formats in which this book is available, we are pleased to offer the CD/DVD content as a free download via O'Reilly Media's Digital Distribution services. To download this content, please visit O'Reilly's web site, search for the title of this book to find its catalog page, and click on the link below the cover image (Examples, Companion Content, or Practice Files). Note that while we provide as much of the media content as we are able via free download, we are sometimes limited by licensing restrictions. Please direct any questions or concerns to booktech@oreilly.com.

Medical Microbiology & Immunology


Warren Levinson - 1989
    The book features case discussions, USMLE-style questions, and a USMLE-style practice exam.

Rootkits: Subverting the Windows Kernel


Greg Hoglund - 2005
    It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks

Teach Yourself C


Herbert Schildt - 1989
    This is a step-by-step foundation text in C, including examples, test-yourself exercises and up-to-date coverage of the C standard library and Windows programming.

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing, Configuring, and Administering Microsoft Windows XP Professional


Walter Glenn - 2005
    Work at your own pace through a system of lessons, hands-on exercises, troubleshooting labs, and review questions.The Readiness Review Suite on CD, featuring advanced technology from MeasureUp, provides 425 challenging questions for in-depth self-assessment and practice. You can choose timed or untimed testing mode, generate random tests, or focus on specific objectives. You get detailed explanations for right and wrong answers--including a customized learning path that describes how and where to focus your studies.Maximize your performance on the exam by learning how to: Perform an installation or upgrade, including remote deploymentConfigure and customize the desktop environmentAdminister disks, device drivers, printers, file systems, and other resourcesManage TCP/IP networking and support remote and mobile usersMonitor, troubleshoot, and tune system performanceNEW!--Administer security settings and services, including the advances in Windows XP Service Pack 2Readiness Review Suite on CD Powered by MeasureUpYour kit includes: NEW--Fully reengineered self-paced study guide with expert exam tips. NEW--Readiness Review Suite featuring 425 questions and multiple testing options. NEW--Case scenarios and troubleshooting labs for real-world expertise. NEW--120-day evaluation version of Windows XP Professional software with Windows XP Service Pack 2.NEW--eBook in PDF format. NEW--Microsoft Encyclopedia of Security eBook. NEW--Microsoft Encyclopedia of Networking, Second Edition eBook.For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook.

Robot Builder's Bonanza


Gordon McComb - 1995
    It provides coverage of Robotix-based Robots, Lego Technic-based Robots, Functionoids with Lego Mindstorms, and Location and Motorized Systems with Servo Motors.

Python: 3 Manuscripts in 1 book: - Python Programming For Beginners - Python Programming For Intermediates - Python Programming for Advanced


Maurice J. Thompson - 2018
    This Box Set Includes 3 Books: Python Programming For Beginners - Learn The Basics Of Python In 7 Days! Python Programming For Intermediates - Learn The Basics Of Python In 7 Days! Python Programming For Advanced - Learn The Basics Of Python In 7 Days! Python Programming For Beginners - Learn The Basics Of Python In 7 Days! Here's what you'll learn from this book: ✓Introduction ✓Understanding Python: A Detailed Background ✓How Python Works ✓Python Glossary ✓How to Download and Install Python ✓Python Programming 101: Interacting With Python in Different Ways ✓How to Write Your First Python Program ✓Variables, Strings, Lists, Tuples, Dictionaries ✓About User-Defined Functions ✓How to Write User-Defined Functions in Python ✓About Coding Style ✓Practice Projects: The Python Projects for Your Practice Python Programming For Intermediates - Learn The Basics Of Python In 7 Days! Here's what you'll learn from this book: ✓ Shallow copy and deep copy ✓ Objects and classes in Python–including python inheritance, multiple inheritances, and so on ✓ Recursion in Python ✓ Debugging and testing ✓ Fibonacci sequence (definition) and Memoization in Python in Python ✓ Arguments in Python ✓ Namespaces in Python and Python Modules ✓ Simple Python projects for Intermediates Python Programming For Advanced - Learn The Basics Of Python In 7 Days! Here's what you'll learn from this book: ✓File management ✓Python Iterator ✓Python Generator ✓Regular Expressions ✓Python Closure ✓Python Property ✓Python Assert, and ✓Simple recap projects Start Coding Now!

Concurrency in Go: Tools and Techniques for Developers


Katherine Cox-Buday - 2017
    If you're a developer familiar with Go, this practical book demonstrates best practices and patterns to help you incorporate concurrency into your systems.Author Katherine Cox-Buday takes you step-by-step through the process. You'll understand how Go chooses to model concurrency, what issues arise from this model, and how you can compose primitives within this model to solve problems. Learn the skills and tooling you need to confidently write and implement concurrent systems of any size.Understand how Go addresses fundamental problems that make concurrency difficult to do correctlyLearn the key differences between concurrency and parallelismDig into the syntax of Go's memory synchronization primitivesForm patterns with these primitives to write maintainable concurrent codeCompose patterns into a series of practices that enable you to write large, distributed systems that scaleLearn the sophistication behind goroutines and how Go's runtime stitches everything together

Pearls of Functional Algorithm Design


Richard S. Bird - 2010
    These 30 short chapters each deal with a particular programming problem drawn from sources as diverse as games and puzzles, intriguing combinatorial tasks, and more familiar areas such as data compression and string matching. Each pearl starts with the statement of the problem expressed using the functional programming language Haskell, a powerful yet succinct language for capturing algorithmic ideas clearly and simply. The novel aspect of the book is that each solution is calculated from an initial formulation of the problem in Haskell by appealing to the laws of functional programming. Pearls of Functional Algorithm Design will appeal to the aspiring functional programmer, students and teachers interested in the principles of algorithm design, and anyone seeking to master the techniques of reasoning about programs in an equational style.

Beautiful Code: Leading Programmers Explain How They Think


Andy OramLincoln Stein - 2007
    You will be able to look over the shoulder of major coding and design experts to see problems through their eyes.This is not simply another design patterns book, or another software engineering treatise on the right and wrong way to do things. The authors think aloud as they work through their project's architecture, the tradeoffs made in its construction, and when it was important to break rules. Beautiful Code is an opportunity for master coders to tell their story. All author royalties will be donated to Amnesty International.

Seven Databases in Seven Weeks: A Guide to Modern Databases and the NoSQL Movement


Eric Redmond - 2012
    As a modern application developer you need to understand the emerging field of data management, both RDBMS and NoSQL. Seven Databases in Seven Weeks takes you on a tour of some of the hottest open source databases today. In the tradition of Bruce A. Tate's Seven Languages in Seven Weeks, this book goes beyond your basic tutorial to explore the essential concepts at the core each technology. Redis, Neo4J, CouchDB, MongoDB, HBase, Riak and Postgres. With each database, you'll tackle a real-world data problem that highlights the concepts and features that make it shine. You'll explore the five data models employed by these databases-relational, key/value, columnar, document and graph-and which kinds of problems are best suited to each. You'll learn how MongoDB and CouchDB are strikingly different, and discover the Dynamo heritage at the heart of Riak. Make your applications faster with Redis and more connected with Neo4J. Use MapReduce to solve Big Data problems. Build clusters of servers using scalable services like Amazon's Elastic Compute Cloud (EC2). Discover the CAP theorem and its implications for your distributed data. Understand the tradeoffs between consistency and availability, and when you can use them to your advantage. Use multiple databases in concert to create a platform that's more than the sum of its parts, or find one that meets all your needs at once.Seven Databases in Seven Weeks will take you on a deep dive into each of the databases, their strengths and weaknesses, and how to choose the ones that fit your needs.What You Need: To get the most of of this book you'll have to follow along, and that means you'll need a *nix shell (Mac OSX or Linux preferred, Windows users will need Cygwin), and Java 6 (or greater) and Ruby 1.8.7 (or greater). Each chapter will list the downloads required for that database.