Book Watch Archive
Makers at Work (O'Reilly)
Saturday, 28 December 2013

What do you get when you combine an electronics hobbyist, hacker, garage mechanic, kitchen table inventor, tinkerer, and entrepreneur? A “maker,” of course. Steve Osborn interviews with 21 of the Folks Reinventing the World One Object or Idea at a Time.

<ASIN:1430259922>

 
ZeroMQ: Messaging for Many Applications (O'Reilly)
Friday, 27 December 2013

ØMQ (aka ZeroMQ), is socket library that  provides message-based concurrency for applications and is a flexible networking tool for exchanging messages among clusters, the cloud, and other multi-system environments. In this guide ØMQ maintainer Pieter Hintjens explores real-world applications, using extended examples in C to help you work with ØMQ’s API, sockets, and patterns.

<ASIN:1449334067>

 
The Digital Crown (Morgan Kaufmann)
Thursday, 26 December 2013

With the subtitle Winning at Content on the Web, Ahava Leibtag walks you through the essentials of crafting great content: the fundamentals of branding, messaging, business goal alignment, and creating portable, mobile content that is future-ready. She also reveals seven critical rules to align your internal and external content processes.

<ASIN:0124076742>

 
Hacking Raspberry Pi (Que)
Wednesday, 25 December 2013

Raspberry Pi is taking off like a rocket! You can use this amazing, dirt-cheap, credit card-sized computer to learn powerful hardware hacking techniques as you build incredibly creative and useful projects! This complete, full-color guide requires absolutely no experience with either hardware hacking or computer programming.

<ASIN:0789751569>

 
A Tour of C++ (Addison-Wesley)
Tuesday, 24 December 2013

In this slim volume from the C++ In-Depth series, Bjarne Stroustrup, the designer and original implementer of C++, excerpts the overview chapters from his complete reference, expanding and enhancing them to give an experienced programmer a clear idea of what constitutes modern C++.

<ASIN:0321958314>

 
Being Agile: Your Roadmap to Successful Adoption of Agile (Apress)
Monday, 23 December 2013

Agile is a ubiquitous watchword in the corporate world, but only a minority of companies understand and practice what they pay lip service to. Veteran agile coach Mario Moreira shows maturing early adopters how to bridge the chasm between going through the motions of doing Agile and genuinely being Agile.

<ASIN:143025839X>

 
The Digital Photography Book Part 2, 2nd Ed (Peachpit)
Saturday, 21 December 2013

Here’s how Scott Kelby describes the premise of this book: “If you and I were out on a shoot and you asked me, ‘When I use my flash, the background behind the person I’m shooting turns black. How do I fix that?’ I wouldn’t give you a lecture on flash ratios, or start a discussion on flash synchronization and rear curtain sync. I’d just say, ‘Lower your shutter speed to 1/60 of a second. That should do it.’

<ASIN:0321948548>

 
PhoneGap 3 Beginner's Guide (Packt)
Friday, 20 December 2013

Guides you through the building blocks of a mobile application that lets users plan a trip and share their trip information while you learn how to work with key PhoneGap tools and APIs, extend the framework’s functionality with plug-ins, and integrate device features such as the camera, contacts, storage, and more. Explores common challenges mobile app developers face and how to solve them.

<ASIN:1782160981>

 
The Art of Unit Testing 2nd Ed (Manning)
Thursday, 19 December 2013

Guides you step by step from writing your first simple tests to developing robust test sets that are maintainable, readable, and trustworthy. Covers frameworks such as Moq, FakeItEasy, and Typemock Isolator. Explores test patterns and organization, working with legacy code, and even "untestable" code. Examples in C#, but book also useful for Java or C++.

<ASIN:1617290890>

 
Introduction to Cyber-Warfare (Syngress)
Wednesday, 18 December 2013

Gives an insider's look into the world of cyber-warfare through the use of recent case studies. Examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific perspectives as well. Learn how cyber-warfare has been performed in the past, why various actors rely on it and what steps can be taken to prevent it.

<ASIN:0124078141>

 
«StartPrev11121314151617181920NextEnd»

Page 20 of 135
 

   
RSS feed of all content
I Programmer - full contents
Copyright © 2014 i-programmer.info. All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.