Book picks similar to
Pro ASP.NET 3.5 in C# 2008: Includes Silverlight 2 by Matthew MacDonald
software-development
technical
work
textbooks
Designing and Managing Programs: An Effectiveness-Based Approach
Peter M. Kettner - 1990
This new edition is written in a deliberate manner that has students following the program planning process in a logical manner. Students will learn to track one phase to the next, resulting in a solid understanding of the issues of internal consistency and planning integrity. The book′s format guides students from problem analysis through evaluation, enabling students to apply these concepts to their own program plans.
C++: How to Program
Harvey Deitel - 2005
It teaches programming by presenting the concepts in the context of full working programs. The fifth edition reflects suggested improvements.
Writing Secure Code
Michael Howard - 2001
You need to assume it will run in the most hostile environments imaginable -- and design, code, and test accordingly. Writing Secure Code, Second Edition shows you how. This edition draws on the lessons learned and taught throughout Microsoft during the firm s massive 2002 Windows Security Push. It s a huge upgrade to the respected First Edition, with new coverage across the board. Michael Howard and David LeBlanc first help you define what security means to your customers -- and implement a three-pronged strategy for securing design, defaults, and deployment. There s especially useful coverage of threat modeling -- decomposing your application, identifying threats, ranking them, and mitigating them. Then, it s on to in-depth coverage of today s key security issues from the developer s standpoint. Everyone knows buffer overruns are bad: Here s a full chapter on avoiding them. You ll learn how to establish appropriate access controls and default to running with least privilege. There s detailed coverage of overcoming attacks on cryptography (for example, avoiding poor random numbers and bit-flipping attacks). You ll learn countermeasures for virtually every form of user input attack, from malicious database updates to cross-site scripting. We ve just scratched the surface: There are authoritative techniques for securing sockets and RPC, protecting against DOS attacks, building safer .NET applications, reviewing and testing code, adding privacy features, and even writing high-quality security documentation. Following these techniques won t just improve security -- it ll dramatically improve robustness and reliability, too. Bill CamardaBill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2000 and Upgrading & Fixing Networks For Dummies®, Second Edition.
The Inclusive Classroom: Strategies for Effective Instruction
Margo A. Mastropieri - 1999
The Inclusive Classroom: Strategies for Effective Instruction provides a wealth of practical and proven strategies for successfully including students with disabilities in general education classrooms. The text is unique for its three-part coverage of fundamentals of teaching students with special needs (including legal and professional issues, and characteristics of students with special needs); effective general teaching practices (including such topics as strategies for behavior management, improving motivation, increasing attention and memory, and improving study skills); and inclusive practices in specific subject areas (including literacy, math, science and social studies, vocational and other areas). This approach allows readers to understand students with special learning needs, effective general practices for inclusive instruction, and content-specific strategies. The overall approach is one of effective instruction, those practices that are most closely aligned with academic success.
Secrets and Lies: Digital Security in a Networked World
Bruce Schneier - 2000
Identity Theft. Corporate Espionage. National secrets compromised. Can anyone promise security in our digital world?The man who introduced cryptography to the boardroom says no. But in this fascinating read, he shows us how to come closer by developing security measures in terms of context, tools, and strategy. Security is a process, not a product – one that system administrators and corporate executives alike must understand to survive.This edition updated with new information about post-9/11 security.
Learn Brazilian Portuguese - Word Power 101
Innovative Language - 2011
This e-book is a completely new way to learn Brazilian Portuguese vocabulary fast - and for free! Start speaking Brazilian Portuguese in minutes with the powerful learning methods you will master in this book.The vocabulary words you’ll find in Learn BrazilianPortuguese - Word Power 101 were hand selected by our Brazilian Portuguese language teachers as the top 101 most frequently used words in the Brazilian Portuguese language. With each entry, you’ll see the word and a vibrant image to help remember the meaning. You’ll hear the word (separate free download) to master the pronunciation. Then you’ll see how the word is actually used in everyday speech with sample sentences and phrases. Learning Brazilian Portuguese vocabulary has never been easier!In this book, you’ll get: - 101 of the most frequently used Brazilian Portuguese vocabulary words - Audio with authentic native Brazilian Portuguese pronunciation *Supplementary mp3 audio files are a separate download - Vibrant photos and images to help memorization - Useful and practical sample sentences and phrases Purchase Learn BrazilianPortuguese - Word Power 101 today to start mastering Brazilian Portuguese vocabulary in the fastest, easiest and most fun way possible!
The Leprechauns of Software Engineering
Laurent Bossavit - 2012
You can think of this problem as a variant of the well known "telephone game", where some trivial rumor is repeated from one person to the next until it has become distorted beyond recognition and blown up out of all proportion.Unfortunately, the objects of this telephone game are generally considered cornerstone truths of the discipline, to the point that their acceptance now seems to hinder further progress.In this short ebook, we will take a look at some of those "ground truths": the claimed 10x variation in productivity between developers; the "software crisis"; the cost-of-change curve; the "cone of uncertainty"; and more. We'll hone our scholarship skills by looking up the original source for these ideas and taking a deep dive in the history of their development. We'll assess the real weight of the evidence behind these ideas.And we'll confront the scary prospect of moving the state of the art forward in a discipline that has had the ground kicked from under it.
How Linux Works: What Every Superuser Should Know
Brian Ward - 2004
Some books try to give you copy-and-paste instructions for how to deal with every single system issue that may arise, but How Linux Works actually shows you how the Linux system functions so that you can come up with your own solutions. After a guided tour of filesystems, the boot sequence, system management basics, and networking, author Brian Ward delves into open-ended topics such as development tools, custom kernels, and buying hardware, all from an administrator's point of view. With a mixture of background theory and real-world examples, this book shows both "how" to administer Linux, and "why" each particular technique works, so that you will know how to make Linux work for you.
Pass Your Amateur Radio General Class Test - The Easy Way: 2019-2023 Edition
Craig Buck K4IA - 2015
The test is multiple choice and the other study guides take you through the 452 possible questions including all four answers for each question. But, three of the four answers are WRONG! You are reading 1,356 wrong answers and that is both confusing and frustrating. The Easy Way is a concise explanation of every question and answer focusing on the right answers. There are also hints and cheats help you remember the correct answer. Which would you rather study: right answers or over 250 pages with three-quarters of the answers wrong? Instructors: This book is perfect for review or weekend courses. Have the students read the narrative before class, then go over the concepts with them rather than slogging through all those wrong answers. You'll be done in no time and the students will be fully prepared to take their tests.
Akka in Action
Raymond Roestenburg - 2012
Akka uses Actors-independently executing processes that communicate via message passing—as the foundation for fault-tolerant applications where individual actors can fail without crashing everything. Perfect for high-volume applications that need to scale rapidly, Akka is an efficient foundation for event-driven systems that want to scale elastically up and out on demand, both on multi-core processors and across server nodes.Akka in Action is a comprehensive tutorial on building message-oriented systems using Akka. The book takes a hands-on approach, where each new concept is followed by an example that shows you how it works, how to implement the code, and how to (unit) test it. You'll learn to test and deploy an actor system and scale it up and out, showing off Akka's fault tolerance. As you move along, you'll explore a message-oriented event-driven application in Akka. You'll also tackle key issues like how to model immutable messages and domain models, and apply patterns like Event Sourcing, and CQRS. The book concludes with practical advice on how to tune and customize a system built with Akka.
Introduction to Robotics: Mechanics and Control
John J. Craig - 1985
This edition features new material on Controls, Computer-Aided Design and Manufacturing, and Off-Line Programming Systems.
Pro JavaScript Design Patterns
Ross Harmes - 2007
But there is more power waiting to be unlockedJavaScript is capable of full objectoriented capabilities, and by applyingobject-oriented principles, best practices, and design patterns to your code, you can make it more powerful, more efficient, and easier to work with alone or as part of a team.With Pro JavaScript Design Patterns, you'll start with the basics of objectoriented programming in JavaScript applicable to design patterns, including making JavaScript more expressive, inheritance, encapsulation, information hiding, and more. With that covered, you can kickstart your JavaScript development in the second part of the book, where you'll find detail on how to implement and take advantage of several design patterns in JavaScript, including composites, decorators, facades, adapters, and many more.Each chapter is packed with realworld examples of how the design patterns are best used and expert advice on writing better code, as well as what to watch out for. Along the way you'll discover how to create your own libraries and APIs for even more efficient coding.Master the basics of objectoriented programming in JavaScript, as they apply to design patterns Apply design patterns to your kickstart your JavaScript development Work through several realworld examples What you'll learn How to apply objectoriented programming techniques in JavaScript How to take advantage of inheritance, interfaces, and encapsulation and information hiding to kickstart your JavaScript development How to implement several design patterns in your JavaScript projects, including factory, facade, bridge, composite, adapter, decorator, flyweight, proxy, command, observer, and chain of responsibility How to make your code easier to manage in a team environment, as well as on your own How to create your own libraries and APIs Who this book is forThis book will be an invaluable learning tool for any experienced JavaScript developer. Table of Contents Expressive JavaScript Interfaces Encapsulation and Information Hiding Inheritance The Singleton Pattern Chaining The Factory Pattern The Bridge Pattern The Composite Pattern The Facade Pattern The Adapter Pattern The Decorator Pattern The Flyweight Pattern The Proxy Pattern The Observer Pattern The Command Pattern The Chain of Responsibility Pattern
Spring Microservices in Action
John Carnell - 2017
Spring Boot and Spring Cloud offer Java developers an easy migration path from traditional monolithic Spring applications to microservice-based applications that can be deployed to multiple cloud platforms. The Spring Boot and Spring Cloud frameworks let you quickly build microservices that are ready to be deployed to a private corporate cloud or a public cloud like Amazon Web Services (AWS) or Pivotal’s CloudFoundry.Spring Microservices in Action teaches you how to use the Spring Boot and Spring Cloud frameworks to build and deploy microservice-based cloud applications. You'll begin with an introduction to the microservice pattern and how to build microservices with Spring Boot and Spring Cloud. Then you'll get hands-on and discover how to configure Spring Boot. Using lots of real-world examples, you'll learn topics like service discovery with Spring Cloud, Netflix Eureka, and Ribbon. Next, you'll find out how to handle potential problems using client-side resiliency patterns with Spring and Netflix Hystrix. This book also covers implementing a service gateway with Spring Cloud and Zuul and event processing in the cloud with Spring Cloud Stream. Finally, you'll learn to deploy and push your application to cloud services, including AWS and CloudFoundry. By the end of this book, you'll not only be able to build your own microservice-based applications, but how operationalize and scale your microservices so they can deployed to a private or public cloud.
Basic Engineering Circuit Analysis
J. David Irwin - 1984
Now in a new Ninth Edition, this reader-friendly book has been completely revised and improved to ensure that the learning experience is enhanced. It's built on the strength of Irwin's problem-solving methodology, providing readers with a strong foundation as they advance in the field.
Mastering Bitcoin: Unlocking Digital Cryptocurrencies
Andreas M. Antonopoulos - 2014
Whether you're building the next killer app, investing in a startup, or simply curious about the technology, this practical book is essential reading.Bitcoin, the first successful decentralized digital currency, is still in its infancy and it's already spawned a multi-billion dollar global economy. This economy is open to anyone with the knowledge and passion to participate. Mastering Bitcoin provides you with the knowledge you need (passion not included).This book includes:A broad introduction to bitcoin--ideal for non-technical users, investors, and business executivesAn explanation of the technical foundations of bitcoin and cryptographic currencies for developers, engineers, and software and systems architectsDetails of the bitcoin decentralized network, peer-to-peer architecture, transaction lifecycle, and security principlesOffshoots of the bitcoin and blockchain inventions, including alternative chains, currencies, and applicationsUser stories, analogies, examples, and code snippets illustrating key technical concepts