Book picks similar to
Secure Programming with Static Analysis by Brian Chess
cs-theory
debugging
security
software
Data Structures: A Pseudocode Approach with C
Richard F. Gilberg - 1998
A new four-part organizational structure increases the flexibility of the text, and all material is presented in a straightforward manner accompanied by an array of examples and visual diagrams.
Micro-Isv: From Vision to Reality
Bob Walsh - 2006
As for the latter, are you a programmer and curious about being your own boss? Where do you turn for information? Until now, online and traditional literature havent caught up with the reality of the post-dot com bust.Micro-ISV: From Vision to Reality explains what works and why in today's emerging micro-ISV sector. Currently, thousands of programmers build and deliver great solutions ISV-style, earning success and revenues much larger than you might guess. Written by and for micro-ISVs, with help from some of the leaders of the field, this book takes you beyond just daydreaming to running your own business. It thoroughly explores how it is indeed possible to launch and maintain a small and successful ISV business, and is an ideal read if you're interested in getting started.
Grails in Action
Glen Smith - 2009
Developers are instantly productive, picking up all the benefits of the Ruby-based Rails framework without giving up any of the power of Java.Grails in Action is a comprehensive look at Grails for Java developers. It covers the nuts and bolts of the core Grails components and is jam-packed with tutorials, techniques, and insights from the trenches.The book starts with an overview of Grails and how it can help you get your web dev mojo back. Then it walks readers through a Twitter-style social networking app-built in Grails, of course-where they implement high-interest features like mashups, AJAX/JSON, animation effects, full text search, rounded corners, and lots of visual goodness. The book also covers using Grails with existing Java technology, like Spring, Hibernate, and EJBs.Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.
Hacking Exposed Wireless: Wireless Security Secrets & Solutions
Johnny Cache - 2007
Providing tactical wireless security implementation coverage by showing how to execute the attacks and implement the defenses, this title demonstrates how attackers identify and exploit wireless network weaknesses and covers various wireless technologies - WiFi/802.11, Bluetooth, IRDA, 3G Wireless, and more.
Laravel: Up and Running: A Framework for Building Modern PHP Apps
Matt Stauffer - 2016
This rapid application development framework and its vast ecosystem of tools let you quickly build new sites and applications with clean, readable code. With this practical guide, Matt Stauffer--a leading teacher and developer in the Laravel community--provides the definitive introduction to one of today's most popular web frameworks.The book's high-level overview and concrete examples will help experienced PHP web developers get started with Laravel right away. By the time you reach the last page, you should feel comfortable writing an entire application in Laravel from scratch.Dive into several features of this framework, including:Blade, Laravel's powerful, custom templating toolTools for gathering, validating, normalizing, and filtering user-provided dataLaravel's Eloquent ORM for working with the application's databasesThe Illuminate request object, and its role in the application lifecyclePHPUnit, Mockery, and PHPSpec for testing your PHP codeLaravel's tools for writing JSON and RESTful APIsInterfaces for file system access, sessions, cookies, caches, and searchTools for implementing queues, jobs, events, and WebSocket event publishingLaravel's specialty packages: Scout, Passport, Cashier, Echo, Elixir, Valet, and Socialite
Advanced Software Testing, Volume 1: Guide to the ISTQB Advanced Certification as an Advanced Test Analyst
Rex Black - 2008
With a hands-on, exercise-rich approach, this book teaches you how to define and carry out the tasks required to put a test strategy into action. Learn how to analyze the system, taking into account the user's quality expectations. Additionally, learn how to evaluate system requirements as part of formal and informal reviews, using an understanding of the business domain to determine requirement validity. You will be able to analyze, design, implement, and execute tests, using risk considerations to determine the appropriate effort and priority for tests. You will learn how to report on testing progress and provide necessary evidence to support your evaluations of system quality.
Architecting the Cloud: Design Decisions for Cloud Computing Service Models (Saas, Paas, and Iaas)
Michael J. Kavis - 2013
However, before you can decide on a cloud model, you need to determine what the ideal cloud service model is for your business. Helping you cut through all the haze, Architecting the Cloud is vendor neutral and guides you in making one of the most critical technology decisions that you will face: selecting the right cloud service model(s) based on a combination of both business and technology requirements.Guides corporations through key cloud design considerations Discusses the pros and cons of each cloud service model Highlights major design considerations in areas such as security, data privacy, logging, data storage, SLA monitoring, and more Clearly defines the services cloud providers offer for each service model and the cloud services IT must provide Arming you with the information you need to choose the right cloud service provider, Architecting the Cloud is a comprehensive guide covering everything you need to be aware of in selecting the right cloud service model for you.
Terzetto
M.J. Fields - 2018
Men and women alike fixate on her. Some try to mimic her, some want to be like her, some would give anything to be part of her circle. At fourteen she changed my life, and didn’t know it. She never would. At seventeen, I became the man I wanted to be because of her. She would never know that either. At twenty-five, she wasn’t given a choice but to see the man I was. She came on to me. At twenty-eight, I was ready to be free of her. She wouldn’t allow it. I am Franco Protettore, bodyguard and protector of an Italian socialite. Five foot six, one hundred and thirty pounds, a full c cup, an ass far from slight, and an aura of sex surrounding her, she is in everyone’s radar. She makes my job… hard.
Working with UNIX Processes
Jesse Storimer - 2011
Want to impress your coworkers and write the fastest, most efficient, stable code you ever have? Don't reinvent the wheel. Reuse decades of research into battle-tested, highly optimized, and proven techniques available on any Unix system.This book will teach you what you need to know so that you can write your own servers, debug your entire stack when things go awry, and understand how things are working under the hood.http://www.jstorimer.com/products/wor...
Overworld
Larry J. Kolb - 2004
Larry Kolb was born into a house of spies. Raised all over the world as the son of a high-ranking American spymaster, Kolb was taught by his father to think, look, and listen like a spy. But when Kolb himself was recruited to join the CIA, he declined, choosing instead to pursue a career in business. He became, among other things, Muhammad Ali's agent, a role that turned out to be a circuitous route back to the world of espionage. At Ali's side, Kolb had invitations to the parties, palaces, boardrooms, and bedrooms-especially in the Middle East-of many of the world's wealthiest and most powerful people. At one of those parties, Kolb befriended Adnan Khashoggi, then the richest man in the world, and the world's most prominent arms dealer; Kolb ended up marrying one of his daughters. Kolb's extraordinary access made him irresistible to legendary spymaster and CIA cofounder Miles Copeland. Beginning with secret negotiations with the Ayatollah Khomeini and a covert mission to Beirut with Ali to negotiate the release of an American hostage, Kolb found his way back to the family business, becoming Miles Copeland's eyes and ears and sometimes mouth in Libya, Saudi Arabia, Kuwait, Iraq, Afghanistan, Nicaragua, Peru, the Philippines, and Pakistan. Unlike any book before it, Overworld captures what it genuinely means and feels like to be a spy-from the practical to the emotional, revealing how the world of espionage and covert statecraft actually works-and exposing the dark heart of a life spent betraying confidences. In itself an adventure story of the highest order, Overworld reads like the best of John le Carré-but it's all true.
Adobe Photoshop CC Classroom in a Book (2014 Release)
Andrew Faulkner - 2014
Adobe Photoshop CC Classroom in a Book contains 14 lessons that cover the basics, providing countless tips and techniques to help you become more productive with the program. You can follow the book from start to finish or choose only those lessons that interest you. In addition to learning the key elements of the Photoshop interface, this completely revised CC (2014 release) edition covers new features, including Generator, 3D printing, linked Smart Objects, Blur Gallery, smarter Smart Guides, Perspective Warp, and more. Purchasing this book gives you access to the downloadable lesson files you need to work through the projects in the book, and to electronic book updates covering new features that Adobe releases for Creative Cloud customers. For access, goto www.peachpit.com/redeem and redeem the unique code provided inside this book. "The Classroom in a Book series is by far the best training material on the market. Everything you need to master the software is included: clear explanations of each lesson, step-by-step instructions, and the project files for the students." Barbara Binder, Adobe Certified InstructorRocky Mountain Training