eBooks-it.org Logo
eBooks-IT.org Inner Image

Addison Wesley eBooks Page 43

Download free Addison Wesley eBooks Page 43

Java Software Solutions

Foundations of Program Design
Java Software Solutions Image
4th Edition
This book takes an early object oriented approach to Java Embracing Java 5.0 topics, including the new standard Scanner class for simplified keyboard input and parsing, enumerated types, autoboxing, variable length parameter lists, the enhanced for loop, and generic types. This new edition has an earlier evolution of object concepts, developed in a way that capitalizes on the power of objects without overwhelming beginning programmers. It includes all new Java 5 topics, including Scanner class, enumerated types, autoboxing, variable length parameter lists, the enhanced for loop, and generic types. This is in depth coverage on GUI applications. This b...

The C# Programming Language

The C# Programming Language Image
C# is the most exciting new language since Java. It is simple, modern, object oriented, and type-safe. It combines the high productivitiy of Rapid Application Development languages such as Visual Basic with the raw power of C++. While the specification is available online, many people find the printed version to be useful, as we have seen with The Java Language Specification and The C++ Annotated Reference Manual. Microsoft Press published the specification for the beta version of C#, and then revised that for version 1.0. The printed books, however, were nothing more than the spec printed out with covers bound on. This new version should sell much better, because of several factors....

Ajax Security

Ajax Security Image
The Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly moving to the Web via Ajax. But, all too often, this transition is being made with reckless disregard for security. If Ajax applications aren't designed and coded properly, they can be susceptible to far more dangerous security vulnerabilities than conventional Web or desktop software. Ajax developers desperately need guidance on securing their applications: knowledge that's been virtually impossible to find, until now. Ajax Security systematically debunks today's most dangerous myths about Ajax security, illustrating key points with detailed case studie...

PHP and MySQL Web Development

PHP and MySQL Web Development Image
4th Edition
PHP and MySQL Web Development, Fourth Edition The definitive guide to building database-drive Web applications with PHP and MySQL PHP and MySQL are popular open-source technologies that are ideal for quickly developing database-driven Web applications. PHP is a powerful scripting language designed to enable developers to create highly featured Web applications quickly, and MySQL is a fast, reliable database that integrates well with PHP and is suited for dynamic Internet-based applications. PHP and MySQL Web Development shows how to use these tools together to produce effective, interactive Web applications. It clearly describes the basics ...

Hacker's Delight

Hacker's Delight Image
A collection useful programming advice the author has collected over the years; small algorithms that make the programmer's task easier. * At long last, proven short-cuts to mastering difficult aspects of computer programming * Learn to program at a more advanced level than is generally taught in schools and training courses, and much more advanced than can be learned through individual study/experience. * An instant cult classic for programmers! Computer programmers are often referred to as hackers -- solitary problem solvers engrossed in a world of code as they seek elegant solutions to building better software. While many view these unique individuals as "madmen," the truth is that much of the computer programmer's job involves a healthy...



2007 - 2017 © eBooks-IT.org