Regular Expressions Cookbook, 2nd EditionTake the guesswork out of using regular expressions. With more than 140 practical recipes, this cookbook provides everything you need to solve a wide range of real-world problems. Novices will learn basic skills and tools, and programmers and experienced users will find a wealth of detail. Each recipe provides samples you can use right away.
This revised edition covers the regular expression flavors used by C#, Java, JavaScript, Perl, PHP, Python, Ruby, and VB.NET. You'll learn powerful new tricks, avoid flavor-specific gotchas, and save valuable time with this huge library of practical solutions. ...
Beginning Programming with Java For Dummies, 3rd EditionOne of the most popular beginning programming books, now fully updated.
Java is a popular language for beginning programmers, and earlier editions of this fun and friendly guide have helped thousands get started. Now fully revised to cover recent updates for Java 7.0, Beginning Programming with Java For Dummies, 3rd Edition is certain to put more first-time programmers and Java beginners on the road to Java mastery.
Beginning Programming with Java For Dummies, 3rd Edition offers an easy-to-understand introduction to programming through the popular, versatile Java 7.0 language. ...
Building a Windows IT Infrastructure in the CloudRun your entire corporate IT infrastructure in a cloud environment that you control completely - and do it inexpensively and securely with help from this hands-on book. All you need to get started is basic IT experience.
You'll learn how to use Amazon Web Services (AWS) to build a private Windows domain, complete with Active Directory, enterprise email, instant messaging, IP telephony, automated management, and other services. ...
Programming ASP.NET MVC 4Get up and running with ASP.NET MVC 4, and learn how to build modern server-side web applications. This guide helps you understand how the framework performs, and shows you how to use various features to solve many real-world development scenarios you're likely to face. In the process, you'll learn how to work with HTML, JavaScript, the Entity Framework, and other web technologies.
You'll start by learning core concepts such as the Model-View-Controller architectural pattern, and then work your way toward advanced topics. The authors demonstrate ASP.NET MVC 4 best practices and techniques by building a sample online auction site ("EBuy") throughout the book. ...
Beginning iPhone SDK Programming with Objective-CLearning to develop iPhone applications doesn't need to be an overwhelming undertaking. This book provides an easy-to-follow,example-driven introduction to the fundamentals of the Apple iPhone SDK and offers you a clear understanding of how things are done when programming iPhone applications with Objective-C. As you progress through the exercises featured in each chapter, you will discover the simple logic behind each step required for creating your own iPhone applications. When you reach the end of the book, you will be prepared to confidently tackle your next iPhone programming challenge. ...
Professional Application Lifecycle Management with Visual Studio 2010Written by Microsoft insiders, this nuts-and-bolts guide walks you through the tools, guidelines, and methodologies you'll need for Application Lifecycle Management (ALM) with Visual Studio 2010. It focuses on practical implementation techniques and best practices, while providing you with detailed code samples and case studies. You'll dive into all the new Unified Modeling Language (UML) tools, advanced debugging techniques, manual testing functionality, the new architecture of Team Foundation Server 2010, and much more. By the end of the book, you'll be able to model, design, and coordinate enterprise solutions at every level using Visual Studio. ...
Programming Google App Engine, 2nd EditionGoogle App Engine makes it easy to create a web application that can serve millions of people as easily as serving hundreds, with minimal up-front investment. With Programming Google App Engine, Google engineer Dan Sanderson provides practical guidance for designing and developing your application on Google's vast infrastructure, using App Engine's scalable services and simple development model.
Through clear and concise instructions, you'll learn how to get the most out of App Engine's nearly unlimited computing power. This second edition is fully updated and expanded to cover Python 2.7 and Java 6 support, multithreading, asynchronous service APIs, and the use of frameworks such as Django 1.3 and webapp2. ...
Hacking Exposed Web 2.0Protect your Web 2.0 architecture against the latest wave of cybercrime using expert tactics from Internet security professionals. Hacking Exposed Web 2.0 shows how hackers perform reconnaissance, choose their entry point, and attack Web 2.0 - based services, and reveals detailed countermeasures and defense techniques. You'll learn how to avoid injection and buffer overflow attacks, fix browser and plug-in flaws, and secure AJAX, Flash, and XML-driven applications. Real-world case studies illustrate social networking site weaknesses, cross-site attack methods, migration vulnerabilities, and IE shortcomings. ...
Hacking Exposed Malware and RootkitsProviding real-world attacks and detailed countermeasures, this new volume is a comprehensive guide to the "black art" of malware and rootkits. You will learn how to identify and defend against malicious software and dangerous hidden scripts. The book includes practical examples, case studies, and risk ratings - all in the bestselling Hacking Exposed format.
Hacking Exposed: Malware & Rootkits walks you through the processes of analyzing malicious software from start to finish. The book covers different kinds of malware and rootkits, methods of infection, and the latest detection and prevention technologies. ...
Hacking Exposed Wireless, 2nd EditionProtect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless, second edition reveals how attackers use readily available and custom tools to target, infiltrate, and hijack vulnerable systems. This book discusses the latest developments in Wi-Fi, Bluetooth, ZigBee, and DECT hacking, and explains how to perform penetration tests, reinforce WPA protection schemes, mitigate packet injection risk, and lock down Bluetooth and RF devices. Cutting-edge techniques for exploiting Wi-Fi clients, WPA2, cordless phones, Bluetooth pairing, and ZigBee encryption are also covered in this fully revised guide. ...