IT eBooks
Download, Read, Use
Reliable JavaScript
Reliable JavaScript

Reliable JavaScript demonstrates how to create test-driven development for large-scale JavaScript applications that will stand the test of time and stay accurate through long-term use and maintenance. Taking a test-first approach to software architecture, this book walks you through several patterns and practices and explains what they are supposed to do by having you write unit tests. Write the code to pass the unit tests, so you not only develop your technique for structuring large-scale applications, but you also learn how to test your work. You'll come away with hands-on practice that results in code that is correct from the start, and has the test coverage to ensure that it stays correct during subsequent maintenance. All code is provided both in the text and on the web, so you can immediately get started designing more complete, robust applications. JavaScript has graduated from field-validation scripts to full-scale applications, but many developers still approach their work ...
Agile Performance Improvement
Agile Performance Improvement

Agile Performance Improvement demonstrates the mutual benefits that accrue to the worlds of performance consulting and agile software development when the values and principles of both are blended synergistically under the guidance of practitioners skilled in both. The agile performance improvement model blends the principles of human performance technology with the frameworks and practices of Agile. The result is an approach that maximizes the value of interactions among the consultant, the work team, and the customer. Unlike traditional end-to-end waterfall processes, agile performance improvement delivers value continuously and in small increments, relentlessly focusing on outcomes of value to the customer. Building on structures of Agile that are used in software development, such as Scrum, the agile performance improvement model considers the human component of holistic solutions in establishing a continuous stream of value. ...
ArcGIS for JavaScript Developers by Example
ArcGIS for JavaScript Developers by Example

The book starts by explaining the basics of the ArcGIS web mapping ecosystem. The book walks you through the development of six major applications, covering a wide variety of topics such as querying, rendering, advanced data visualization and performing map analytics. It also emphasizes on writing modular code using pure dojo, which is the preferred platform for developing web GIS applications using ArcGIS JavaScript API. By the end of the book, you will have gained enough practical experience to architect a robust and visually powerful mapping application using the API. ...
Expert Python Programming, 2nd Edition
Expert Python Programming, 2nd Edition

Python is a dynamic programming language, used in a wide range of domains by programmers who find it simple, yet powerful. Even if you find writing Python code easy, writing code that is efficient and easy to maintain and reuse is a challenge. The focus of the book is to familiarize you with common conventions, best practices, useful tools and standards used by python professionals on a daily basis when working with code. You will begin with knowing new features in Python 3.5 and quick tricks for improving productivity. Next, you will learn advanced and useful python syntax elements brought to this new version. Using advanced object-oriented concepts and mechanisms available in python, you will learn different approaches to implement metaprogramming. You will learn to choose good names, write packages, and create standalone executables easily. You will also be using some powerful tools such as buildout and vitualenv to release and deploy the code on remote servers for producti ...
The Web Startup Success Guide
The Web Startup Success Guide

The Web Startup Success Guide is your one-stop shop for all of the answers you need today to build a successful web startup in these challenging economic times. It covers everything from making the strategic platform decisions as to what kind of software to build, to understanding and winning the Angel and venture capital funding game, to the modern tools, apps and services that can cut months off development and marketing cycles, to how startups today are using social networks like Twitter and Facebook to create real excitement and connect to real customers. ...
Android UI Design
Android UI Design

This book seeks to redress this balance by showing you how to get your PM to start treating the design phase of your project seriously. This book is focused entirely on the development of UI features, and you'll be able to practically implementing the design practices that we extol throughout the book. Starting by briefly outlining some of the factors you need to keep in mind when building a UI, you'll learn the concepts of Android User Interface from scratch. We then move on to formulate a plan on how to implement these concepts in various applications. We will deep dive into how UI features are implemented in real-world applications where UIs are complex and dynamic. This book offers near complete coverage of UI-specific content including, views, fragments, the wireframing process, and how to add in splash screens—everything you need to make professional standard UIs for modern applications. It will then cover material design and show you how to implement Google's design aest ...
Hacking Exposed Mobile
Hacking Exposed Mobile

Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures - so they can leverage the power of mobile platforms while ensuring that security risks are contained. Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile: Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems. ...
Information Security The Complete Reference, 2nd Edition
Information Security The Complete Reference, 2nd Edition

Today's complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information Security: The Complete Reference, 2nd Edition is the only comprehensive book that offers vendor-neutral details on all aspects of information protection, with an eye toward the evolving threat landscape. Thoroughly revised and expanded to cover all aspects of modern information security—from concepts to details—this edition provides a one-stop reference equally applicable to the beginner and the seasoned professional. Find out how to build a holistic security program based on proven methodology, risk analysis, compliance, and business needs. You'll learn how to successfully protect data, networks, computers, and applications. In-depth chapters cover data protection, encryption, information rights management, network security, intrusion detection and prevention, Unix and Windows security, virtual and cloud security, secure applicat ...
Hacking Exposed Web Applications, 3rd Edition
Hacking Exposed Web Applications, 3rd Edition

Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures. Find out how to reinforce authentication and authorization, plug holes in Firefox and IE, reinforce against injection attacks, and secure Web 2.0 features. Integrating security into the Web development lifecycle (SDL) and into the broader enterprise information security program is also covered in this comprehensive resource. ...
An Introduction to Network Programming with Java, 3rd Edition
An Introduction to Network Programming with Java, 3rd Edition

Since the second edition of this text, the use of the Internet and networks generally has continued to expand at a phenomenal rate. This has led to both an increase in demand for network software and to improvements in the technology used to run such networks, with the latter naturally leading to changes in the former. During this time, the Java libraries have been updated to keep up with the new developments in network technology, so that the Java programming language continues to be one of the mainstays of network software development. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2026