Windows Phone 8 Development InternalsDrill into Windows Phone 8 design and architecture - and learn best practices for building a variety of applications. Led by two senior members of the core Windows Phone Developer Platform team, you'll learn the underlying technology that will help you build better apps. Each chapter focuses on a single Windows Phone building block or feature area and shows you how to apply it in your applications - offering you invaluable insights into the Windows Phone platform design and API surface. ...
Hacking Exposed Windows, 3rd EditionMeet the challenges of Windows security with the exclusive Hacking Exposed "attack-countermeasure" approach. Learn how real-world malicious hackers conduct reconnaissance of targets and then exploit common misconfigurations and software flaws on both clients and servers. See leading-edge exploitation techniques demonstrated, and learn how the latest countermeasures in Windows XP, Vista, and Server 2003/2008 can mitigate these attacks. Get practical advice based on the authors and contributors many years as security professionals hired to break into the world's largest IT infrastructures. ...
Hacking Exposed Web 2.0Protect your Web 2.0 architecture against the latest wave of cybercrime using expert tactics from Internet security professionals. Hacking Exposed Web 2.0 shows how hackers perform reconnaissance, choose their entry point, and attack Web 2.0 - based services, and reveals detailed countermeasures and defense techniques. You'll learn how to avoid injection and buffer overflow attacks, fix browser and plug-in flaws, and secure AJAX, Flash, and XML-driven applications. Real-world case studies illustrate social networking site weaknesses, cross-site attack methods, migration vulnerabilities, and IE shortcomings. ...
Hacking Exposed Malware and RootkitsProviding real-world attacks and detailed countermeasures, this new volume is a comprehensive guide to the "black art" of malware and rootkits. You will learn how to identify and defend against malicious software and dangerous hidden scripts. The book includes practical examples, case studies, and risk ratings - all in the bestselling Hacking Exposed format.
Hacking Exposed: Malware & Rootkits walks you through the processes of analyzing malicious software from start to finish. The book covers different kinds of malware and rootkits, methods of infection, and the latest detection and prevention technologies. ...
Test DrivenIn test-driven development, you first write an executable test of what your application code must do. Only then do you write the code itself and, with the test spurring you on, improve your design. In acceptance test-driven development (ATDD), you use the same technique to implement product features, benefiting from iterative development, rapid feedback cycles, and better-defined requirements. TDD and its supporting tools and techniques lead to better software faster. ...
Android in Action, 3rd EditionAndroid in Action, Third Edition takes you far beyond "Hello Android." You'll master the SDK, build WebKit apps using HTML 5, and even learn to extend or replace Android's built-in features. You'll find interesting examples on every page as you explore cross-platform graphics with RenderScript, the updated notification system, and the Native Development Kit. This book also introduces important tablet concepts like drag-and-drop, fragments, and the Action Bar, all new in Android 3. ...
Windows Phone 7 in ActionWindows Phone 7 in Action is a hands-on guide to programming the WP7 platform. It zips through standard phone, text, and email controls and dives head-first into how to build great mobile apps. You'll master the hardware APIs, access web services, and learn to build location and push applications. Along the way, you'll see how to create the stunning visual effects that can separate your apps from the pack.
Written for developers familiar with .NET and Visual Studio. No WP7 or mobile experience is required. ...
Spring Integration in ActionSpring Integration in Action is an introduction and guide to enterprise integration and messaging using the Spring Integration framework. The book starts off by reviewing core messaging patterns, such as those used in transformation and routing. It then drills down into real-world enterprise integration scenarios using JMS, Web Services, filesystems, email, and more. You'll find an emphasis on testing, along with practical coverage of topics like concurrency, scheduling, system management, and monitoring.
This book is accessible to developers who know Java. Experience with Spring and EIP is helpful but not assumed. ...
How Google Tests SoftwareDo you need to get it right, too? Then, learn from Google. Legendary testing expert James Whittaker, until recently a Google testing leader, and two top Google experts reveal exactly how Google tests software, offering brand-new best practices you can use even if you're not quite Google's size... yet!
Discover 100% practical, amazingly scalable techniques for analyzing risk and planning tests; thinking like real users; implementing exploratory, black box, white box, and acceptance testing; getting usable feedback; tracking issues; choosing and creating tools... ...
Programming in Objective-C, 4th EditionProgramming in Objective-C is a concise, carefully written tutorial on the basics of Objective-C and object-oriented programming for Apple's iOS and Mac platforms.
The book makes no assumptions about prior experience with object-oriented programming languages or with the C language (which Objective-C is based upon). Because of this, both beginners and experienced programmers alike can use this book to quickly and effectively learn the fundamentals of Objective-C. ...