Marknadens största urval
Snabb leverans

Böcker utgivna av O'Reilly Media

Filter
Filter
Sortera efterSortera Populära
  • av Brett D Mclaughlin
    659,-

    Helps to use the APIs, tools, and tricks of XML to build real-world applications. This book focuses on using XML from your Java applications. It gives an approach to managing information that touches various things from configuration files to web sites.

  • Spara 20%
    - The Best Introduction to Object Orientated Programming
    av David Wood
    605

    Shows you how to analyze, design, and write serious object-oriented software. This work helps you learn how to: use OO principles like encapsulation and delegation to build applications that are flexible; apply the Open-Closed Principle (OCP) and the Single Responsibility Principle (SRP) to promote reuse of your code; among others.

  • Spara 17%
    av Rick Lehtinen
    403

    For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, this book offers an overview of the security concepts you need to know, including access controls, malicious software, security policy, cryptography, biometrics, as well as government regulations and standards.

  • av Jeff Sedayao
    599,-

    This text focuses on a critical aspect of the Cisco IOS - access lists, which are central to securing routers and networks. It covers intranets, firewalls, and the Internet and focuses on practical instructions for setting router access policies.

  • av Dr. Robert Thompson
    489,-

    Do you relish viewing and identifying celestial objects? Whether you're a first timer or an advanced hobbyist, this hacks makes a cosmic companion. Turn computers and handheld devices into tools for an out-of-this-world experience. It brings space dreams to life making the book essential for anyone who wants memorable celestial adventures.

  • av Damian Conway
    399,-

    Many programmers code by instinct, relying on convenient habits or a "e;style"e; they picked up early on. They aren't conscious of all the choices they make, like how they format their source, the names they use for variables, or the kinds of loops they use. They're focused entirely on problems they're solving, solutions they're creating, and algorithms they're implementing. So they write code in the way that seems natural, that happens intuitively, and that feels good.But if you're serious about your profession, intuition isn't enough. Perl Best Practices author Damian Conway explains that rules, conventions, standards, and practices not only help programmers communicate and coordinate with one another, they also provide a reliable framework for thinking about problems, and a common language for expressing solutions. This is especially critical in Perl, because the language is designed to offer many ways to accomplish the same task, and consequently it supports many incompatible dialects.With a good dose of Aussie humor, Dr. Conway (familiar to many in the Perl community) offers 256 guidelines on the art of coding to help you write better Perl code--in fact, the best Perl code you possibly can. The guidelines cover code layout, naming conventions, choice of data and control structures, program decomposition, interface design and implementation, modularity, object orientation, error handling, testing, and debugging.They're designed to work together to produce code that is clear, robust, efficient, maintainable, and concise, but Dr. Conway doesn't pretend that this is the one true universal and unequivocal set of best practices. Instead, Perl Best Practices offers coherent and widely applicable suggestions based on real-world experience of how code is actually written, rather than on someone's ivory-tower theories on howsoftware ought to be created.Most of all, Perl Best Practices offers guidelines that actually work, and that many developers around the world are already using. Much like Perl itself, these guidelines are about helping you to get your job done, without getting in the way.Praise for Perl Best Practices from Perl community members:"e;As a manager of a large Perl project, I'd ensure that every member of my team has a copy of Perl Best Practices on their desk, and use it as the basis for an in-house style guide."e;-- Randal Schwartz"e;There are no more excuses for writing bad Perl programs. All levels of Perl programmer will be more productive after reading this book."e;-- Peter Scott"e;Perl Best Practices will be the next big important book in the evolution of Perl. The ideas and practices Damian lays down will help bring Perl out from under the embarrassing heading of "e;scripting languages"e;. Many of us have known Perl is a real programming language, worthy of all the tasks normally delegated to Java and C++. With Perl Best Practices, Damian shows specifically how and why, so everyone else can see, too."e;-- Andy Lester"e;Damian's done what many thought impossible: show how to build large, maintainable Perl applications, while still letting Perl be the powerful, expressive language that programmers have loved for years."e;-- Bill Odom"e;Finally, a means to bring lasting order to the process and product of real Perl development teams."e;-- Andrew Sundstrom"e;Perl Best Practices provides a valuable education in how to write robust, maintainable Perl, and is a definitive citation source when coaching other programmers."e;-- Bennett Todd"e;I've been teaching Perl for years, and find the same question keeps being asked: Where can I find a reference for writing reusable, maintainable Perl code? Finally I have a decent answer."e;-- Paul Fenwick"e;At last a well researched, well thought-out, comprehensive guide to Perl style. Instead of each of us developing our own, we can learn good practices from one of Perl's most prolific and experienced authors. I recommend this book to anyone who prefers getting on with the job rather than going back and fixing errors caused by syntax and poor style issues."e;-- Jacinta Richardson"e;If you care about programming in any language read this book. Even if you don't intend to follow all of the practices, thinking through your style will improve it."e;-- Steven Lembark"e;The Perl community's best author is back with another outstanding book. There has never been a comprehensive reference on high quality Perl coding and style until Perl Best Practices. This book fills a large gap in every Perl bookshelf."e;-- Uri Guttman

  • av Adam Goldstein
    415,-

    A beginner's guide to learning the Macintosh's scripting tool: AppleScript. Through dozens of hands-on scripting examples, this comprehensive guide ensures that anyone including novices can learn how to control Mac applications in timesaving and innovative ways.

  • av Rob Griffiths
    359,-

    Creator and editor of the Mac OS X Hints Web site, Rob Griffiths lifts the hood on the Formula-One-powered operating system and delivers over 500 high-octane secrets for finding easier, faster and better ways of using Panther and the programs that come with it. He includes chapters on Unix, the engine under Mac OS X's hood.

  • av Chris Shiflett
    409,-

    Security demands attention, given the frequency of attacks on web sites. This work explains the common types of attacks and how to write code that isn't susceptible to them. It covers such topics as preventing cross-site scripting (XSS) vulnerabilities; protecting against SQL injection attacks; and, complicating session hijacking attempts.

  • av Joseph D. Sloan
    545,-

    This new guide covers everything you need to plan, build, and deploy a high-performance Linux cluster. You'll learn about planning, hardware choices, bulk installation of Linux on multiple systems, and other basic considerations. Learn about the major free software projects and how to choose those that are most helpful.

  • av Alex Ferrara
    399,-

    This comprehensive tutorial teaches programmers the skills they need to develop XML Web services hosted on the Microsoft .NET platform. It also shows you how to consume these services on both Microsoft and non-Windows clients, and how to weave them into well-designed and scalable applications.

  • av Kim Topley
    545,-

    This guide to J2ME offers the extra security needed when venturing into programming for cell phones, PDAs and other consumer electronic devices. It is a solid reference to the "alphabet soup" of micro edition programming, covering the CLDC, CDC, KVM and MIDP APIs.

  • av Scott Oaks
    735

    Looking at all of Java's security mechanisms, this text explains how to work them. It discusses class loaders, security managers, access lists, digital signatures and authentication. It covers in depth the security model of Java 2, version 1.3, including the two new security APIs: JAAS and JSSE.

  • av Elliotte Harold
    789,-

    All of Java's Input/Output (I/O) facilities are based on streams, which provide simple ways to read and write data of different types. Focusing on Java 5.0 APIs, this book tells you about streams shows you how to control number formatting, use characters aside from the standard ASCII character set, and write multilingual software.

  • av Lori A. Macvittie
    309,-

    Covers how to design user interfaces and .NET applications that take advantage of Windows Presentation Foundation (WPF). This title presents prerequisites such as Microsoft's unified build system, MSBuild, and core XAML constructs and syntax-including shortcuts with examples.

  • av Bruce Perry
    415,-

    A collection of 100 insider tips and tricks, this title covers the finer points of Asynchronous JavaScript and XML, or Ajax as it's known. It teaches you tasks like how to display Weather.com data, scrape stock quotes, fetch postal codes and more.

  • - 100 Industrial Tip & Tools
    av Dru Lavigne
    375,-

    In the world of Unix operating systems, the various BSDs come with a long heritage of high-quality software and well-designed solutions, making them a favorite OS of a wide range of users. Among budget-minded users who adopted BSD early on to developers of some of today's largest Internet sites, the popularity of BSD systems continues to grow. If you use the BSD operating system, then you know that the secret of its success is not just in its price tag: practical, reliable, extraordinarily stable and flexible, BSD also offers plenty of fertile ground for creative, time-saving tweaks and tricks, and yes, even the chance to have some fun."e;Fun?"e; you ask. Perhaps "e;fun"e; wasn't covered in the manual that taught you to install BSD and administer it effectively. But BSD Hacks, the latest in O'Reilly's popular Hacks series, offers a unique set of practical tips, tricks, tools--and even fun--for administrators and power users of BSD systems.BSD Hacks takes a creative approach to saving time and getting more done, with fewer resources. You'll take advantage of the tools and concepts that make the world's top Unix users more productive. Rather than spending hours with a dry technical document learning what switches go with a command, you'll learn concrete, practical uses for that command.The book begins with hacks to customize the user environment. You'll learn how to be more productive in the command line, timesaving tips for setting user-defaults, how to automate long commands, and save long sessions for later review. Other hacks in the book are grouped in the following areas:Customizing the User EnvironmentDealing with Files and FilesystemsThe Boot and Login EnvironmentsBacking UpNetworking HacksSecuring the SystemGoing Beyond the BasicsKeeping Up-to-DateGrokking BSDIf you want more than your average BSD user--you want to explore and experiment, unearth shortcuts, create useful tools, and come up with fun things to try on your own--BSD Hacks is a must-have. This book will turn regular users into power users and system administrators into super system administrators.

  • - 100 Industrial-Strength Tips & Tools
    av Sid Steward
    269,-

    PDF--to most of the world it stands for that rather tiresome format used for documents downloaded from the web. Slow to load and slower to print, hopelessly unsearchable, and all but impossible to cut and paste from, the Portable Document Format doesn't inspire much affection in the average user. But PDFs done right is another story. Those who know the ins and outs of this format know that it can be much more than electronic paper. Flexible, compact, interactive, and even searchable, PDF is the ideal way to present content across multiple platforms.PDF Hacks unveils the true promise of Portable Document Format, going way beyond the usual PDF as paged output mechanism. PDF expert Sid Steward draws from his years of analyzing, extending, authoring, and embellishing PDF documents to present 100 clever hacks--tools, tips, quick-and-dirty or not-so-obvious solutions to common problems. PDF Hacks will show you how to create PDF documents that are far more powerful than simple representations of paper pages. The hacks in the book cover the full range of PDF functionality, from the simple to the more complex, including generating, manipulating, annotating, and consuming PDF information. You'll learn how to manage content in PDF, navigate it, and reuse it as necessary. Far more than another guide to Adobe Acrobat, the book covers a variety of readily available tools for generating, deploying, and editing PDF. The little-known tips and tricks in this book are ideal for anyone who works with PDF on a regular basis, including web developers, pre-press users, forms creators, and those who generate PDF for distribution. Whether you want to fine-tune and debug your existing PDF documents or explore the full potential the format offers, PDF Hacks will turn you into a PDF power user.

  • av Hugh E Williams
    675,-

    This text is based around the rich offerings of PEAR. Several of these, including the Template package and the database-independent query API, are fully integrated into examples and thoroughly described in the text. In addition, through a complex sample application all the important techniques of dynamic content are introduced.

  • av Thuan L. Thai
    445

    Fully updated for version 1.1 of the .NET Framework, this overview of the Microsoft .NET Framework for developing web applications and services is written for intermediate to advanced VB, C/C++, Java, and Delphi developers, .It is also useful to system architects and leaders who are assessing tools for future projects.

  • av Sean M. Burke
    125,-

    Rich Text Format, or RTF, is the internal markup language used by Microsoft Word and understood by dozens of other word processors. RTF is a universal file format that pervades practically every desktop. Because RTF is text, it's much easier to generate and process than binary .doc files. Any programmer working with word processing documents needs to learn enough RTF to get around, whether it's to format text for Word (or almost any other word processor), to make global changes to an existing document, or to convert Word files to (or from) another format.RTF Pocket Guide is a concise and easy-to-use tutorial and quick-reference for anyone who occasionally ends up mired in RTF files. As the first published book to cover the RTF format in any detail, this small pocket guide explains the syntax of RTF with examples throughout, including special sections on Unicode RTF and MSHelp RTF, and several full programs that demonstrate how to work in RTF effectively.Most word processors produce RTF documents consisting of arcane and redundant markup. This book is the first step to finding order in the disorder of RTF.

  • - A Desktop Quick Reference
    av James Duncan Davidson & Michael Beam
    615,-

    Cocoa is more than just a collection of classes, and is certainly more than a simple framework. Cocoa is a complete API set, class library, framework, and development environment for building applications and tools to run on Mac OS X. With over 240 classes, Cocoa is divided into two essential frameworks: Foundation and Application Kit. Above all else, Cocoa is a toolkit for creating Mac OS X application interfaces, and it provides access to all of the standard Aqua interface components such as menus, toolbars, windows, buttons, to name a few.Cocoa in a Nutshell begins with a complete overview of Cocoa's object classes. It provides developers who may be experienced with other application toolkits the grounding they'll need to start developing Cocoa applications. Common programming tasks are described, and many chapters focus on the larger patterns in the frameworks so developers can understand the larger relationships between the classes in Cocoa, which is essential to using the framework effectively.Cocoa in a Nutshell is divided into two parts, with the first part providing a series of overview chapters that describe specific features of the Cocoa frameworks. Information you'll find in Part I includes:An overview of the Objective-C languageCoverage of the Foundation and Application Kit frameworksOverviews of Cocoa's drawing and text handling classesNetwork services such as hosts, Rendezvous URL services, sockets, and file handlingDistributed notifications and distributed objects for interapplication communicationExtending Cocoa applications with other frameworks, including the AddressBook, DiscRecording, and Messaging frameworksThe second half of the book is a detailed quick reference to Cocoa's Foundation and Application Kit (AppKit) classes. A complement to Apple's documentation, Cocoa in a Nutshell is the only reference to the classes, functions, types, constants, protocols, and methods that make up Cocoa's Foundation and Application Kit frameworks, based on the Jaguar release (Mac OS X 10.2). Peer-reviewed and approved by Apple's engineers to be part of the Apple Developer Connection (ADC) Series, Cocoa in a Nutshell is the book developers will want close at hand as they work. It's the desktop quick reference they can keep by their side to look something up quickly without leaving their work.Cocoa in a Nutshell is the book developers will want close at hand as they work. It's the desktop quick reference they can keep by their side to look something up quickly without leaving their work.

  • - Store Objects with Ease
    av David Jordan & Craig Russell
    545,-

    Java Data Objects revolutionizes the way Java developers interact with databases and other datastores. JDO allows you to store and retrieve objects in a way that's natural to Java programmers. Instead of working with JDBC or EJB's container-managed persistence, you work directly with your Java objects. You don't have to copy data to and from database tables or issue SELECTs to perform queries: your JDO implementation takes care of persistence behind-the-scenes, and you make queries based on the fields of your Java objects, using normal Java syntax.The result is software that is truly object-oriented: not code that is partially object-oriented, with a large database-shaped lump on the back end. JDO lets you save plain, ordinary Java objects, and does not force you to use different data models and types for dealing with storage. As a result, your code becomes easier to maintain, easier to re-use, and easier to test. And you're not tied to a specific database vendor: your JDO code is entirely database-independent. You don't even need to know whether the datastore is a relational database, an object database, or just a set of files.This book, written by the JDO Specification Lead and one of the key contributors to the JDO Specification, is the definitive work on the JDO API. It gives you a thorough introduction to JDO, starting with a simple application that demonstrates many of JDO's capabilities. It shows you how to make classes persistent, how JDO maps persistent classes to the database, how to configure JDO at runtime, how to perform transactions, and how to make queries. More advanced chapters cover optional features such as nontransactional access and optimistic transactions. The book concludes by discussing the use of JDO in web applications and J2EE environments.Whether you only want to read up on an interesting new technology, or are seriously considering an alternative to JDBC or EJB CMP, you'll find that this book is essential. It provides by far the most authoritative and complete coverage available.

  • Spara 10%
    av James Tisdall
    389,-

    With its highly developed capacity to detect patterns in data, Perl has become one of the most popular languages for biological data analysis. But if you're a biologist with little or no programming experience, starting out in Perl can be a challenge. Many biologists have a difficult time learning how to apply the language to bioinformatics. The most popular Perl programming books are often too theoretical and too focused on computer science for a non-programming biologist who needs to solve very specific problems.Beginning Perl for Bioinformatics is designed to get you quickly over the Perl language barrier by approaching programming as an important new laboratory skill, revealing Perl programs and techniques that are immediately useful in the lab. Each chapter focuses on solving a particular bioinformatics problem or class of problems, starting with the simplest and increasing in complexity as the book progresses. Each chapter includes programming exercises and teaches bioinformatics by showing and modifying programs that deal with various kinds of practical biological problems. By the end of the book you'll have a solid understanding of Perl basics, a collection of programs for such tasks as parsing BLAST and GenBank, and the skills to take on more advanced bioinformatics programming. Some of the later chapters focus in greater detail on specific bioinformatics topics. This book is suitable for use as a classroom textbook, for self-study, and as a reference.The book covers:Programming basics and working with DNA sequences and strings Debugging your codeSimulating gene mutations using random number generatorsRegular expressions and finding motifs in dataArrays, hashes, and relational databasesRegular expressions and restriction mapsUsing Perl to parse PDB records, annotations in GenBank, and BLAST output

  • Spara 17%
    - Virus Protection for Windows
    av Roger A. Grimes
    405

    Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, experts worried mostly about computer viruses that spread only through executable files, not data files, and certainly not through email exchange. The Melissa virus and the Love Bug proved the experts wrong, attacking Windows computers when recipients did nothing more than open an email. Today, writing programs is easier than ever, and so is writing malicious code. The idea that someone could write malicious code and spread it to 60 million computers in a matter of hours is no longer a fantasy.The good news is that there are effective ways to thwart Windows malicious code attacks, and author Roger Grimes maps them out inMalicious Mobile Code: Virus Protection for Windows. His opening chapter on the history of malicious code and the multi-million dollar anti-virus industry sets the stage for a comprehensive rundown on today's viruses and the nuts and bolts of protecting a system from them. He ranges through the best ways to configure Windows for maximum protection, what a DOS virus can and can't do, what today's biggest threats are, and other important and frequently surprising information. For example, how many people know that joining a chat discussion can turn one's entire computer system into an open book?Malicious Mobile Code delivers the strategies, tips, and tricks to secure a system against attack. It covers:The current state of the malicious code writing and cracker communityHow malicious code works, what types there are, and what it can and cannot doCommon anti-virus defenses, including anti-virus softwareHow malicious code affects the various Windows operating systems, and how to recognize, remove, and prevent itMacro viruses affecting MS Word, MS Excel, and VBScriptJava applets and ActiveX controlsEnterprise-wide malicious code protectionHoaxesThe future of malicious mobile code and how to combat such codeThese days, when it comes to protecting both home computers and company networks against malicious code, the stakes are higher than ever.Malicious Mobile Code is the essential guide for securing a system from catastrophic loss.

  • av Charlie Scott
    545,-

    A guide to setting up systems that can utilize the Internet to access and send information from one network to another, yet remain secure from unauthorized viewers. Four specific solutions are treated, including Layer two tunneling through PPTP or L2TP.

  • av Debra Cameron
    199,-

    This text is a companion volume to "Learning GNU Emacs". It covers Emacs version 20, providing a handy reference guide to the basic elements of this powerful editor, and presenting the Emacs commands in an easy-to-use tabular format.

  • av Paul Raines
    545,-

    The Tcl language and Tk graphical toolkit are powerful building blocks for applications that feature a variety of commands with a wealth of options in each command. This quick reference briefly describes every command and option in the core of Tcl/Tk distribution.

  • - Technology on Your Time
     
    249

    Focuses on cool things you can do to make technology work the way you want it to. This work is packed with projects to help you make the most of the technology in your life. It is useful for a geek or hacker who delights in creating new uses for technology.

  • av Sarah Milstein
    375,-

    Sure, you know how to "Google it" when you're searching for something on the Web. But did you know how much more you could achieve by clicking beyond the "Google Search" button? Our fully updated and expanded edition to 'Google: The Missing Manual' covers everything you need to know to become a Google guru.

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.