Intermediate Perl, 2nd EditionThis book picks up right where Learning Perl leaves off. With Intermediate Perl, you'll graduate from short scripts to much larger programs, using features that make Perl a general-purpose language. This gentle but thorough guide introduces you to modules, complex data structures, and object-oriented programming.
Each chapter is small enough to be read in just an hour or two, ending with exercises to help you practice what you've learned. If you're familiar with the material in Learning Perl and have the ambition to go further, Intermediate Perl will teach you most of the core Perl language concepts you need for writing robust programs on any platform. ...
Programming in GoToday's most exciting new programming language, Go, is designed from the ground up to help you easily leverage all the power of today's multicore hardware. With this guide, pioneering Go programmer Mark Summerfield shows how to write code that takes full advantage of Go's breakthrough features and idioms.
Both a tutorial and a language reference, Programming in Go brings together all the knowledge you need to evaluate Go, think in Go, and write high-performance software with Go. Summerfield presents multiple idiom comparisons showing exactly how Go improves upon older languages, calling special attention to Go's key innovations. Along the way, he explains everything from the absolute basics through Go's lock-free channel-based concurrency and its flexible and unusual duck-typing type-safe approach to object-orientation. ...
HTML5 MediaIf you're a web developer or designer familiar with CSS and JavaScript, this tightly focused introduction shows you how to add HTML5 media elements to your web pages, and how to provide custom controls for letting web visitors interact with the content.
You'll also learn how to provide subtitles and captions, using file formats that work in browsers now. This book includes code samples and downloadable examples to help you take full advantage of audio and video in your web pages. ...
Getting Started with StormEven as big data is turning the world upside down, the next phase of the revolution is already taking shape: real-time data analysis. This hands-on guide introduces you to Storm, a distributed, JVM-based system for processing streaming data. Through simple tutorials, sample Java code, and a complete real-world scenario, you'll learn how to build fast, fault-tolerant solutions that process results as soon as the data arrives.
Discover how easy it is to set up Storm clusters for solving various problems, including continuous data computation, distributed remote procedure calls, and data stream processing. ...
Beginning ASP.NET 4 in C# and VBASP.NET is the part of the .NET Framework that enables you to build rich, dynamic web sites. The latest version - ASP.NET 4 - boasts numerous improvements to the previous iteration, including Web Forms enhancements and jQuery support. This step-by-step book walks you through building rich web sites with ASP.NET 4 and is packed with in-depth examples in both C# and VB. With hands-on exercises that take you right into the action, you'll learn how to build web sites firsthand while you get a good look at what goes on behind the scenes when you view an ASP.NET 4 page in your browser. ...
Professional Visual Basic 2010 and .NET 4Visual Basic 2010 boasts exciting new features and capabilities that cement its position as a true object-oriented language and provide you with access to new and better technologies. This invaluable book covers Visual Basic from start to finish and discusses the new enhancements to Visual Basic 2010. The team of expert authors explains how VB 2010 can be combined with .NET 4 to build applications using Windows Presentation Foundation, Windows Forms, Visual Studio Tools for Office, and apps and libraries based on the Windows Communication Foundation, the Windows Workflow Foundation, and SharePoint. ...
Professional XMPP Programming with JavaScript and jQueryXMPP is a robust protocol used for a wide range of applications, including instant messaging, multi-user chat, voice and video conferencing, collaborative spaces, real-time gaming, data synchronization, and search. This book teaches you how to harness the power of XMPP in your own apps and presents you with all the tools you need to build the next generation of apps using XMPP or add new features to your current apps. Featuring the JavaScript language throughout and making use of the jQuery library, the book contains several XMPP apps of increasing complexity that serve as ideal learning tools. ...
Windows 7 Enterprise Desktop Support TechnicianThis Microsoft Official Academic Course (MOAC) 70-685 Windows 7 Enterprise Desktop Support Technician, Revised First Edition fully prepares your students as they master the necessary skills for their MOAC Windows Server MCTS certification exams. This new edition contains a large number of new labs with an even greater emphasis on the troubleshooting tasks that students will encounter as they learn the skills of a desktop support technician. The labs will continue to support their corresponding textbook lessons and will provide students the opportunity to explore Windows 7 troubleshooting issues in great detail. ...
Photoshop CS3 All-in-One Desk Reference For DummiesGet your picture-perfect guide to using all the cool features of Photoshop CS3.
Whether you're new to Photoshop, want to take your skills up a notch, or want to quickly master the new features and enhancements in Photoshop CS3, you've come to the right place. Nine easy-to-follow minibooks cover Photoshop fundamentals plus the newest tools and techniques. "Putting It Together" exercises give you hands-on experience. This is your one-stop guide to Photoshop. ...
Rootkits For DummiesA rootkit is a type of malicious software that gives the hacker root or administrator access to your network. They are activated before your system's operating system has completely booted up, making them extremely difficult to detect. Rootkits allow hackers to install hidden files, processes, and hidden user accounts. Hackers can use them to open back doors in order to intercept data from terminals, connections, and keyboards. A rootkit hacker can gain access to your systems and stay there for years, completely undetected.
Learn from respected security experts and Microsoft Security MVPs how to recognize rootkits, get rid of them, and manage damage control. ...