Book Watch Archive
Being Agile: Your Roadmap to Successful Adoption of Agile (Apress)
Monday, 23 December 2013

Agile is a ubiquitous watchword in the corporate world, but only a minority of companies understand and practice what they pay lip service to. Veteran agile coach Mario Moreira shows maturing early adopters how to bridge the chasm between going through the motions of doing Agile and genuinely being Agile.

<ASIN:143025839X>

 
The Digital Photography Book Part 2, 2nd Ed (Peachpit)
Saturday, 21 December 2013

Here’s how Scott Kelby describes the premise of this book: “If you and I were out on a shoot and you asked me, ‘When I use my flash, the background behind the person I’m shooting turns black. How do I fix that?’ I wouldn’t give you a lecture on flash ratios, or start a discussion on flash synchronization and rear curtain sync. I’d just say, ‘Lower your shutter speed to 1/60 of a second. That should do it.’

<ASIN:0321948548>

 
PhoneGap 3 Beginner's Guide (Packt)
Friday, 20 December 2013

Guides you through the building blocks of a mobile application that lets users plan a trip and share their trip information while you learn how to work with key PhoneGap tools and APIs, extend the framework’s functionality with plug-ins, and integrate device features such as the camera, contacts, storage, and more. Explores common challenges mobile app developers face and how to solve them.

<ASIN:1782160981>

 
The Art of Unit Testing 2nd Ed (Manning)
Thursday, 19 December 2013

Guides you step by step from writing your first simple tests to developing robust test sets that are maintainable, readable, and trustworthy. Covers frameworks such as Moq, FakeItEasy, and Typemock Isolator. Explores test patterns and organization, working with legacy code, and even "untestable" code. Examples in C#, but book also useful for Java or C++.

<ASIN:1617290890>

 
Introduction to Cyber-Warfare (Syngress)
Wednesday, 18 December 2013

Gives an insider's look into the world of cyber-warfare through the use of recent case studies. Examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific perspectives as well. Learn how cyber-warfare has been performed in the past, why various actors rely on it and what steps can be taken to prevent it.

<ASIN:0124078141>

 
Learning SPARQL 2nd Edition (O'Reilly)
Tuesday, 17 December 2013

Gain hands-on experience with SPARQL, the RDF query language that’s bringing new possibilities to semantic web, linked data, and big data projects. In this updated and expanded edition, Bob DuCharme shows you how to use SPARQL 1.1 with a variety of tools to retrieve, manipulate, and federate data from the public web as well as from private sources.

<ASIN:1449371434>

 
Microsoft SharePoint 2013 Step By Step (Microsoft Press)
Monday, 16 December 2013

Boost team collaboration with SharePoint 2013. This guide shows how to customize your team site’s layout, features, and apps; manage and share ideas, documents, and data; capture and organize content into lists and libraries; automate business processes with built-in workflows; use social features to communicate and collaborate and publish content using enhanced web content management.

<ASIN:0735667039>

 

 
Building Touch Interfaces with HTML5 (Peachpit)
Saturday, 14 December 2013

In the Develop and Design series, shows you how to create interfaces users love. Rather than a simple how-to, this book walks you through the tools and concepts that make touch interfaces feel right. You’ll learn about the limitations and strengths of touch devices, new interface conventions, and how to use CSS, JavaScript, and HTML5 APIs.

<ASIN:0321887654>

 
Expert Android (Apress)
Friday, 13 December 2013

Reduce the time-to-market while creating apps for multiple devices. Gives advanced techniques for customizing views, controls, and layouts. You’ll learn to develop apps in record time using JSON, Advanced Form Processing, and the BaaS (Backend As A Service) platform Parse. The book also covers OpenGL, Search, and Telephony.

<ASIN:1430249501>

 
Secure Coding in C and C++ 2nd Ed (Addison-Wesley)
Thursday, 12 December 2013

Commonly exploited software vulnerabilities are usually caused by avoidable software defects due to a relatively small number of root causes which this book identifies and explains. Encourages programmers to adopt security best practices and to develop a security mindset that can help protect software. Updated for C11 and C++11.

<ASIN:0321822137>

 
«StartPrev11121314151617181920NextEnd»

Page 20 of 135
 

   
RSS feed of all content
I Programmer - full contents
Copyright © 2014 i-programmer.info. All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.