eBooks-it.org Logo
eBooks-IT.org Inner Image

No Starch eBooks Page 6

Download free No Starch eBooks Page 6

Perl One-Liners

130 Programs That Get Things Done
Perl One-Liners Image
Part of the fun of programming in Perl lies in tackling tedious tasks with short, efficient, and reusable code. Often, the perfect tool is the one-liner, a small but powerful program that fits in one line of code and does one thing really well.In Perl One-Liners, author and impatient hacker Peteris Krumins takes you through more than 100 compelling one-liners that do all sorts of handy things, such as manipulate line spacing, tally column values in a table, and get a list of users on a system. This cookbook of useful, customizable, and fun scripts will even help hone your Perl coding skills, as Krumins dissects the code to give you a deeper understanding of the language.You'll find one-liners that:Encode, decode, and convert stringsGenerate random pa...

The Book of F#

Breaking Free with Managed Functional Programming
The Book of F# Image
F# brings the power of functional-first programming to the .NET Framework, a platform for developing software in the Microsoft Windows ecosystem. If you're a traditional .NET developer used to C# and Visual Basic, discovering F# will be a revelation that will change how you code, and how you think about coding. In The Book of F#, Microsoft MVP Dave Fancher shares his expertise and teaches you how to wield the power of F# to write succinct, reliable, and predictable code. As you learn to take advantage of features like default immutability, pipelining, type inference, and pattern matching, you'll be amazed at how efficient and elegant your code can be. You'll also learn how to: Exploit F#'s functional nature using currying, partial application, and de...

Ruby Under a Microscope

An Illustrated Guide to Ruby Internals
Ruby Under a Microscope Image
Ruby is a powerful programming language with a focus on simplicity, but beneath its elegant syntax it performs countless unseen tasks.Ruby Under a Microscope gives you a hands-on look at Ruby's core, using extensive diagrams and thorough explanations to show you how Ruby is implemented (no C skills required). Author Pat Shaughnessy takes a scientific approach, laying out a series of experiments with Ruby code to take you behind the scenes of how programming languages work. You'll even find information on JRuby and Rubinius (two alternative implementations of Ruby), as well as in-depth explorations of Ruby's garbage collection algorithm.Ruby Under a Microscope will teach you:How a few computer science concepts underpin Ruby's complex implementationHow...

The LEGO MINDSTORMS EV3 Discovery Book

A Beginner's Guide to Building and Programming Robots
The LEGO MINDSTORMS EV3 Discovery Book Image
LEGO MINDSTORMS has changed the way we think about robotics by making it possible for anyone to build real, working robots. The latest MINDSTORMS set, EV3, is more powerful than ever, and The LEGO MINDSTORMS EV3 Discovery Book is the complete, beginner-friendly guide you need to get started.Begin with the basics as you build and program a simple robot to experiment with motors, sensors, and EV3 programming. Then you'll move on to a series of increasingly sophisticated robots that will show you how to work with advanced programming techniques like data wires, variables, and custom-made programming blocks. You'll also learn essential building techniques like how to use beams, gears, and connector blocks effectively in your own designs.Master the possib...

Penetration Testing

A Hands-On Introduction to Hacking
Penetration Testing Image
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine-based lab that includes Kali Linux and vulnerable operating systems, you'll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you'll experience the key stages of an actual assessment - including information gathering, finding exploitable vulnerabilities, gaining a...



2007 - 2017 © eBooks-IT.org