Book picks similar to
Effective Software Maintenance and Evolution: A Reuse-Based Approach by Stanislaw Jarzabek
maintenance
programming
software-upkeep
all
The Stronger Half
Jeff Coleman - 2018
It was after his identical twin Bill suffered the traumatic brain injury that left him crippled and unable to speak. George would see the man sitting on a bench at the mall, or at the store standing by the magazines. But he never seemed to notice George, not even when he tried to communicate. Twenty years later, after dropping out of college to care for Bill, George has become a junior high school janitor. Between his struggling with debt, working a physically demanding job, and taking care of Bill’s needs, life has not been easy. But George doesn’t know the meaning of difficult until the man finally acknowledges him, triggering a terrifying series of supernatural events that leaves George and Bill running for their lives. And as George struggles to protect his twin from an otherworldly evil, he discovers a startling secret about Bill—one that leaves him questioning decades-old assumptions and wondering which of them truly is the stronger half.
Building Cloud Apps with Microsoft Azure: Best Practices for DevOps, Data Storage, High Availability, and More (Developer Reference)
Scott Guthrie - 2014
The patterns apply to the development process as well as to architecture and coding practices. The content is based on a presentation developed by Scott Guthrie and delivered by him at the Norwegian Developers Conference (NDC) in June of 2013 (part 1, part 2), and at Microsoft Tech Ed Australia in September 2013 (part 1, part 2). Many others updated and augmented the content while transitioning it from video to written form. Who should read this book Developers who are curious about developing for the cloud, are considering a move to the cloud, or are new to cloud development will find here a concise overview of the most important concepts and practices they need to know. The concepts are illustrated with concrete examples, and each chapter includes links to other resources that provide more in-depth information. The examples and the links to additional resources are for Microsoft frameworks and services, but the principles illustrated apply to other web development frameworks and cloud environments as well. Developers who are already developing for the cloud may find ideas here that will help make them more successful. Each chapter in the series can be read independently, so you can pick and choose topics that you're interested in. Anyone who watched Scott Guthrie's "Building Real World Cloud Apps with Windows Azure" presentation and wants more details and updated information will find that here. Assumptions This ebook expects that you have experience developing web applications by using Visual Studio and ASP.NET. Familiarity with C# would be helpful in places.
How to Count (Programming for Mere Mortals, #1)
Steven Frank - 2011
unsigned numbers- Floating point and fixed point arithmeticThis short, easily understood book will quickly get you thinking like a programmer.
RHCSA/RHCE Red Hat Linux Certification Study Guide (Exams EX200 & EX300), 6th Edition (Certification Press)
Michael Jang - 2011
100 complete coverage of all official objectives for Exams EX200 and EX300 Exam Readiness Checklist-youre ready for the exam when all objectives on the list are checked off Inside the Exam sections in every chapter highlight key exam topics covered Two-Minute Drills for quick review 100 lab questions-two full lab-based RHCSA exams and two full lab-based RHCE exams-match the format, tone, topics, and difficulty of the real exam Covers all the exam topics, including Virtual Machines and Automated Installations Fundamental Command Line Skills RHCSA-Level Security Options The Boot Process Linux Filesystem Administration Package Management User Administration RHCSA-Level System Administration RHCE Security System Services and SELinux RHCE Administration Mail Servers Samba File Sharing DNS, FTP, and Logging CD-ROM includes Complete lab-based exam preparation, featuring Two full RHCSA practice exams Two full RHCE practice exams Lab-based chapter self tests In-depth answer explanations for all labs RHCSA and RHCE Glossary PDF copy of the book for studying on the go Michael Jang, RHCE, LPIC-2, UCP, LCP, MCP, is the author of three previous bestselling editions of RHCE Red Hat Certified Engineer Linux Study Guide and several other books on Linux and professional certification.
The Waite Group's Turbo C Programming for the PC
Robert Lafore - 1987
Assuming no prior knowledge of C, this introductory-level book demonstrates and explains how to write useful and marketable programs in Turbo C on the IBM PC, XT, AT, and PC/Z computers.
Facebook Marketing: An Hour a Day
Chris Treadaway - 2010
Its ability to target users who have provided real data about themselves and their interests makes Facebook the ideal platform for marketers, and marketers everywhere recognize the importance of Facebook and are eager to successfully tap Facebook's potential. This book shows you how.Quickly get up to speed on today's Facebook conventions and demographics, and then gain an understanding of the various strategic and implementation issues you must consider from start to finish.Guides you through crafting a successful presence on Facebook and takes you through each step for developing an overall marketing strategy Explains each step for setting realistic goals, defining metrics, developing reports, and acquiring corporate buy-in Shows how to execute your strategy while incorporating all of Facebook's relevant features Addresses Facebook's pay-per-click platform, Facebook Connect, and more Packed with tips and tactics not documented anywhere else, the book serves as the ultimate step-by-step guide to developing a winning Facebook marketing campaign.
AngularJS: Up and Running: Enhanced Productivity with Structured Web Apps
Shyam Seshadri - 2014
By the end of the book, you'll understand how to develop a large, maintainable, and performant application with AngularJS.Guided by two engineers who worked on AngularJS at Google, you'll learn the components needed to build data-driven applications, using declarative programming and the Model-view-controller pattern. You'll also learn how to conduct unit tests on each part of your application.Learn how to use controllers for moving data to and from viewsUnderstand when to use AngularJS services instead of controllersCommunicate with the server to store, fetch, and update data asynchronouslyKnow when to use AngularJS filters for converting data and values to different formatsImplement single-page applications, using ngRoute to select views and navigationDive into basic and advanced directives for creating reusable componentsWrite an end-to-end test on a live version of your entire applicationUse best practices, guidelines, and tools throughout the development cycle
Assembly Language Programming And Organization Of The Ibm Pc
Andrew B.C. Yu - 1992
This text includes coverage of I/O control, video/graphics control, text display, and OS/2. Its also illustrates examples of structured programming.
Absolute Beginner's Guide to C
Greg Perry - 1993
This bestseller talks to readers at their level, explaining every aspect of how to get started and learn the C language quickly. Readers also find out where to learn more about C. This book includes tear-out reference card of C functions and statements, a hierarchy chart, and other valuable information. It uses special icons, notes, clues, warnings, and rewards to make understanding easier. And the clear and friendly style presumes no programming knowledge.
Pearls of Functional Algorithm Design
Richard S. Bird - 2010
These 30 short chapters each deal with a particular programming problem drawn from sources as diverse as games and puzzles, intriguing combinatorial tasks, and more familiar areas such as data compression and string matching. Each pearl starts with the statement of the problem expressed using the functional programming language Haskell, a powerful yet succinct language for capturing algorithmic ideas clearly and simply. The novel aspect of the book is that each solution is calculated from an initial formulation of the problem in Haskell by appealing to the laws of functional programming. Pearls of Functional Algorithm Design will appeal to the aspiring functional programmer, students and teachers interested in the principles of algorithm design, and anyone seeking to master the techniques of reasoning about programs in an equational style.
What's New in Java 7?
Madhusudhan Konda - 2011
Madhusudhan Konda provides an overview of these, including strings in switch statements, multi-catch exception handling, try-with-resource statements, the new File System API, extensions of the JVM, support for dynamically-typed languages, and the fork and join framework for task parallelism.
Monster Girl Defense Force
Simon Archer - 2020
They've carved out a small niche in an otherwise desolate and harsh world, and for the moment, all seems well. But trouble is on the horizon, and to stop it, they'll need something they haven't had in a long time.A man.
Computer Graphics with OpenGL
Donald Hearn - 2003
The text converts all programming code into the C++ language.
Big Ideas... For Small Businesses: Simple, Practical Tools and Tactics to Help Your Small Business Grow
John Lamerton - 2017
HERE’S HOW Are you struggling to find marketing ideas for your small business? Does your business plan consist of a few scribbles on the back of a napkin? Does the thought of learning “online marketing” scare you? Do you find traditional business books dull, or uninspiring? Have you read business biographies of the poster boys (Richard Branson, Bill Gates, Warren Buffett, Alan Sugar, Elon Musk, Steve Jobs etc), only to feel a sense of overwhelm, and a complete disconnect between what they achieved, and where you are right now? Do you want to grow your small business, without having to learn complex marketing strategies, and without being told to simply “work harder than everyone else”? If so, then “Big Ideas... for Small Businesses” could be the “lightbulb moment” you’ve been waiting for... Former civil servant John Lamerton has run more than 60 small businesses since 2000, making millions of pounds, and thousands of mistakes along the way. This book is a collection of the lessons and successes that he uses to coach and mentor hundreds of small business owners, teaching them to think bigger, work less, and design their business around the lifestyle they want. SOME OF THE “BIG IDEAS” THAT YOU WILL DISCOVER: - Why the “Dragons” hate lifestyle businesses, and why you should love them - How almost anyone could become a millionaire in their lifetime, given just £200 a month. - Why John blames Richard Branson for his early failures - How to get clarity on your business strategy, and bring that into your daily routine. - How to sell a dozen eggs for over £500 - The ONE thing that truly transformed John’s business - How to find, hire, (and fire!) your first employee. - Why every Luke Skywalker needs a Yoda. - EXACTLY how he made over £100k from ONE marketing campaign. - The five magic ingredients for success in almost any given field. JOHN LAMERTON is a lazy entrepreneur and investor. He balances running an ambitious lifestyle business with raising two young children. A former “hustler”, he now earns more money “working” 20 to 25 hours a week than he used to pulling all-nighters and “grinding” for 100+ hours per week. He now mentors fellow ambitious lifestyle business owners, teaching them how to design their business around their lifestyle.
Managing Risk and Information Security: Protect to Enable
Malcolm Harkins - 2012
Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologiessuch as social media and the huge proliferation of Internet-enabled deviceswhile minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context. Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies. The book contains eye-opening security insights that are easily understood, even by the curious layman. Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities. Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) The mandate of the information security function is being completely rewritten. Unfortunately most heads of security havent picked up on the change, impeding their companies agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come. Dr. Jeremy Bergsman, Practice Manager, CEB The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be.