Friday, 28 March 2025 |
This book starts at the beginner level and shows how to use Flutter to create apps. Kevin Moore shows how to develop a movie app with animations, a movie API to get the latest movie information, and uses Firebase to store user information. The app connects to the internet, saves data locally, and uses Firebase to handle user accounts and send notifications. Readers will learn how to make the app work on websites and computers, respond to user actions, and add extra features from Flutter's package library. The final steps cover testing, making it run faster, and getting it ready for users to download.
|
Wednesday, 26 March 2025 |
This book shows how to handle errors, inefficiencies, and outdated paradigms by exploring the most common mistakes you'll find in production C++ code. Rich Yonts reveals the problems you'll inevitably encounter as you write new C++ code and diagnose legacy applications, along with practical techniques you need to resolve them. It covers C++ 98 through 23, with an emphasis on diagnosing and improving legacy code.
|
Monday, 24 March 2025 |
This book provides a unified overview of concepts and features of a comprehensive variety of rule-based programming languages. Thom Frühwirth presents formalisms including multiset transformation, term rewriting systems, colored Petri nNets and logical algorithms. Frühwirth also introduces rule-based systems including production rules, event-condition-action rules and datalog, as well as rule-based programming languages for functional orogramming, constraint logic programming and concurrent constraint programming.
|
Friday, 21 March 2025 |
This book is aimed at young coders, and breaks down complex programming concepts into easy-to-understand chunks, relating them to real-life examples that resonate with young minds. Starting with the absolute basics, Anand Pandey gradually progresses through 16 chapters packed with clear explanations, vibrant illustrations, and interactive activities. Each chapter concludes with a review quiz to reinforce learning and ensure mastery of the material.
|
Wednesday, 19 March 2025 |
This book looks at how Quarkus lets you live-reload your Java code, deliver continuous background testing, and automatically provide database instances. Martin Štefanko and Jan Martiška bring readers up to speed with Quarkus by building a real-world business application. The authors are Red Hat engineers who are both active contributors to the Quarkus project, and explain how Quarkus works, how you can integrate it into your stack for more productive Java development, and what makes Quarkus different from classic enterprise Java frameworks.
|
Monday, 17 March 2025 |
This is the fifth edition of a guide to building modern web APIs with Django & Django REST Framework. It is suitable for beginners who have never built an API before, as well as professional programmers looking for a fast-paced introduction to Django API fundamentals and best practices. William S. Vincent shows how to set up a new project properly, create and customize RESTful APIs, and integrate a Vue.js front-end. Three separate projects are built from scratch with progressively more advanced features, including a Library API, Todo API, and Blog API. User authentication, permissions, documentation, viewsets, and routers are all covered.
|
Friday, 14 March 2025 |
In this book, Chris Dixon argues that the internet has undergone three distinct eras, starting with the "read" era, in which early networks democratized information. In the "read-write" era, corporate networks democratized publishing. We are now in the midst of the "read-write-own" era, sometimes called web3, in which blockchain networks are granting power and economic benefits to communities of users, not just corporations.
|
Wednesday, 12 March 2025 |
This book shows how to write effective multithreaded and asynchronous software in C#. Nir Dobovizki demonstrates practical techniques, real-world examples, and useful code samples to cut through the confusion around async/await and help you write rapid, reliable, and bug-free code. The book focuses on the practical use of the C# async-await feature to simplify asynchronous tasks. It teaches how to avoid common pitfalls, addresses classic multithreading issues like deadlocks and race conditions, and advanced topics such as controlling thread of execution and using thread-safe collections.
|
Monday, 10 March 2025 |
This book has been fully updated for the latest version of Office 365, and covers coding basics and syntax for writing simple or complex macros that can automate routine Excel tasks. Dick Kusleika shows how to automate data management, user forms, and pivot tables. The book also teaches how to control the security settings for macros and save macros to use across files and apps. Plus updated coverage of Copilot AI integration.
|
Friday, 07 March 2025 |
In this book, subtitled "Hard Power, Soft Belief, and the Future of the West", Alexander C. Karp and Nicholas W. Zamiska, co-founder and his deputy at Palantir argue that timid leadership, intellectual fragility, and an unambitious view of technology’s potential in Silicon Valley have made the U.S. vulnerable in an era of mounting global threats.
|
Wednesday, 05 March 2025 |
This book demonstrates how to interact with the hardware using Linux drivers and via Gpio5, a new open source IoT library created by Harry Fairhead that provides direct access to the Pi 5’s hardware. As the Pi 5 uses the RP1 chip to implement its peripherals, it does not work with the usual IoT libraries such as Wiring Pi, bcm2835, pigpio and so on. Gpio5, is designed to replace them and provide direct access to GPIO, PWM, I2C, SPI and more. This makes the Pi 5 much more capable of IoT applications.
|
Monday, 03 March 2025 |
This book is a practical guide to spotting the parts of a dataset that deviate from the norm, even when they're hidden or intertwined among the expected data points. Brett Kennedy explains how outlier detection is a vital tool for modern business, whether it's discovering new products, expanding markets, or flagging fraud and other suspicious activities. This guide presents the core tools for outlier detection, as well as techniques utilizing the Python data stack familiar to data scientists.
|
|
|