Book Watch Archive
Book Watch Archive
Excel 2016 In Depth (Que)
Thursday, 05 November 2015

Bill Jelen who lauched the website in 1998 brings together insights, techniques, tips, and shortcuts you just won’t find anywhere else to provide the fastest, best way to master Excel 2016’s full power; get comfortable with its interface; and leverage its new tools and futures. See our review of Excel 2013 In Depth, the previous edition.



SVG Colors, Patterns & Gradients (O'Reilly)
Wednesday, 04 November 2015

As a vector graphics format, SVG uses precisely-defined geometric shapes to build an image. But that doesn't mean that SVG graphics have to look like technical drawings. SVG graphics can be shaded, textured, built from partially-transparent overlapping layers, or even filled with photographic images. Amelia Bellamy-Royds and  Kurt Cagle take an in-depth look at the different ways SVG text and shapes can be painted on the screen or page. 


The Life and Work of George Boole (Cork University Press)
Monday, 02 November 2015

Born on November 2, 1815 Boole has been variously described as the founder of pure mathematics, father of computer science and discoverer of symbolic logic. With the subtitle, A Prelude to the Digital Age this biography of George Boole is by Desmond MacHale, Emeritus Professor of Mathematics at University College Cork, where Boole was the first professor of mathematics. Boole is mostly remembered as a mathematician and logician whose work found application in computer science long after his death, but this biography reveals Boole as much more than a mathematical genius.

<ASIN: 1782050043>

Antivirus Hackers Handbook (Wiley)
Thursday, 29 October 2015

Joxean Koret and Elias Bachaalany guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities in order to improve future software design, protect your network, and anticipate attacks that may sneak through your antivirus′ line of defense. You′ll begin building your knowledge by diving into the reverse engineering process, which details how to start from a finished antivirus software program and work your way back through its development using the functions and other key elements of the software.


The Maker's Guide to the Zombie Apocalypse (No Starch Press)
Monday, 26 October 2015

With the subtitle, "Defend Your Base with Simple Circuits, Arduino, and Raspberry Pi" this is designed as a guide to survival after Z-day, when the zombie apocalypse hitsthe earth. Written by hardware hacker and zombie anthropologist Simon Monk, it teaches you how to generate your own electricity, salvage parts, craft essential electronics, and out-survive the undead. For the budding maker to the keen hobbyist this is an essential survival tool.


High Performance Android Apps (O'Reilly)
Thursday, 22 October 2015

Customers are finally realizing that apps have a major role in the performance of their Android devices.With this practical guide, subtitled "Improve Ratings with Speed, Optimizations, and Testing", you’ll learn the major performance issues confronting Android app developers, and the tools you need to diagnose problems early. Author Doug Sillars not only shows you how to use Android-specific testing tools from companies including Google, Qualcomm, and AT&T, but also helps you explore potential remedies. 


Murach's jQuery, 2nd Ed (Murach Books)
Wednesday, 21 October 2015

 jQuery is used in over 60% of the million most-visited websites, and that makes it one of the technologies that every web developer should master. The problem is that jQuery is difficult to learn, especially for those with limited programming experience. But now, this new edition of our jQuery book makes it easier than ever to learn how to use jQuery to create the dynamic user interfaces, fast response times, and special effects that today's users expect.

<ASIN: 189077491X>

Git for Teams (O'Reilly)
Monday, 19 October 2015

You can do more with Git than just build software. In this practical guide Emma Jane Hogbin Westby delivers a unique people-first approach to version control that also explains how using Git as a focal point can help your team work better together. You’ll learn how to plan and pursue a Git workflow that not only ensures that you accomplish project goals, but also fits the immediate needs and future growth of your team.


Network Security Test Lab (Wiley)
Thursday, 15 October 2015

A hands–on, step–by–step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies. Michael Gregg walks you through the security assessment and penetration testing process, and provides the set–up guidance you need to build your own security–testing lab. You′ll look inside the actual attacks to decode their methods, and learn how to run attacks in an isolated sandbox to better understand how attackers target systems, and how to build the defenses that stop them. 


The Architecture of Privacy (O'Reilly)
Wednesday, 14 October 2015

In this practical guide, experts in data analytics, software engineering, security, and privacy policy describe how software teams can make privacy-protective features a core part of product functionality, rather than add them late in the development process. Ideal for software engineers new to privacy, this book helps you examine privacy-protective information management architectures and their foundational components—building blocks that you can combine in many ways. 




Page 19 of 181

RSS feed of all content
I Programmer - full contents
Copyright © 2017 All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.