Marknadens största urval
Snabb leverans

Böcker utgivna av O'Reilly Media

Filter
Filter
Sortera efterSortera Populära
  • av George Reese
    547

    When creating complex Java enterprise applications, do you spend a lot of time thumbing through a myriad of books and other resources searching for what you hope will be the API that's right for the project at hand?Java Database Best Practices rescues you from having to wade through books on each of the various APIs before figuring out which method to use! This comprehensive guide introduces each of the dominant APIs (Enterprise JavaBeans, Java Data Objects, the Java Database Connectivity API (JDBC) as well as other, lesser-known options), explores the methodology and design components that use those APIs, and then offers practices most appropriate for different types and makes of databases, as well as different types of applications.Java Database Practices also examines database design, from table and database architecture to normalization, and offers a number of best practices for handling these tasks as well. Learn how to move through the various forms of normalization, understand when to denormalize, and even get detailed instructions on optimizing your SQL queries to make the best use of your database structure. Through it all, this book focuses on practical application of these techniques, giving you information that can immediately be applied to your own enterprise projects.Enterprise applications in today's world are about data-- whether it be information about a product to buy, a user's credit card information, or the color that a customer prefers for their auto purchases. And just as data has grown in importance, the task of accessing that data has grown in complexity. Until now, you have been left on your own to determine which model best suits your application, and how best to use your chosen API. Java Database Practices is the one stop reference book to help you determine what's appropriate for your specific project at hand. Whether it's choosing between an alphabet soup of APIs and technologies--EJB, JDO, JDBC, SQL, RDBMS, OODBMS, and more on the horizon, this book is an indispensable resource you can't do without.

  • av Chuck Cavaness
    251

    This is a quick reference to all the core features of the Jakarta Struts framework and contains detailed information on the extensive Struts tag libraries, it also provides convenient coverage of the following: new features in Struts 1.1; configuration; action classes; and action forms.

  • - C++ Syntax and Fundamentals
    av Kyle Loudon
    271

    C++ is a complex language with many subtle facets. This is especially true when it comes to object-oriented and template programming. The C++ Pocket Reference is a memory aid for C++ programmers, enabling them to quickly look up usage and syntax for unfamiliar and infrequently used aspects of the language. The book's small size makes it easy to carry about, ensuring that it will always be at-hand when needed. Programmers will also appreciate the book's brevity; as much information as possible has been crammed into its small pages.In the C++ Pocket Reference, you will find:Information on C++ types and type conversionsSyntax for C++ statements and preprocessor directivesHelp declaring and defining classes, and managing inheritanceInformation on declarations, storage classes, arrays, pointers, strings, and expressionsRefreshers on key concepts of C++ such as namespaces and scopeMore!C++ Pocket Reference is useful to Java and C programmers making the transition to C++, or who find themselves occasionally programming in C++. The three languages are often confusingly similar. This book enables programmers familiar with C or Java to quickly come up to speed on how a particular construct or concept is implemented in C++.Together with its companion STL Pocket Reference, the C++ Pocket Reference forms one of the most concise, easily-carried, quick-references to the C++ language available.

  • - Team-Based Software Development
    av Chromatic
    211

    Extreme Programming (XP) is a radical new approach to software development that has been accepted quickly because its core practices--the need for constant testing, programming in pairs, inviting customer input, and the communal ownership of code--resonate with developers everywhere. Although many developers feel that XP is rooted in commonsense, its vastly different approach can bring challenges, frustrations, and constant demands on your patience.Unless you've got unlimited time (and who does these days?), you can't always stop to thumb through hundreds of pages to find the piece of information you need. The Extreme Programming Pocket Guide is the answer. Concise and easy to use, this handy pocket guide to XP is a must-have quick reference for anyone implementing a test-driven development environment.The Extreme Programming Pocket Guide covers XP assumptions, principles, events, artifacts, roles, and resources, and more. It concisely explains the relationships between the XP practices. If you want to adopt XP in stages, the Extreme Programming Pocket Guide will help you choose what to apply and when. You'll be surprised at how much practical information is crammed into this slim volume.O'Reilly's Pocket Guides have become a favorite among developers everywhere. By providing a wealth of important details in a concise, well-organized format, these handy books deliver just what you need to complete the task at hand. When you've reached a sticking point in your work and need to get to a solution quickly, the new Extreme Programming Pocket Guide is the book you'll want to have beside your keyboard.

  • av Adam Freeman
    677

    This is a comprehensive tutorial and reference that contains numerous practical examples using C# and VB.NET.

  • - C Syntax and Fundamentals
    av Ulla Kirch-Prinz & Peter Prinz
    261

    C is one of the oldest programming languages and still one of the most widely used. Whether you're an experienced C programmer or you're new to the language, you know how frustrating it can be to hunt through hundreds of pages in your reference books to find that bit of information on a certain function, type or other syntax element. Or even worse, you may not have your books with you. Your answer is the C Pocket Reference. Concise and easy to use, this handy pocket guide to C is a must-have quick reference for any C programmer. It's the only C reference that fits in your pocket and is an excellent companion to O'Reilly's other C books.Ideal as an introduction for beginners and a quick reference for advanced programmers, the C Pocket Reference consists of two parts: a compact description of the C language and a thematically structured reference to the standard library. The representation of the language is based on the ANSI standard and includes extensions introduced in 1999. An index is included to help you quickly find the information you need.This small book covers the following:C language fundamentalsData typesExpressions and operatorsC statementsDeclarationsFunctionsPreprocessor directivesThe standard libraryO'Reilly's Pocket References have become a favorite among programmers everywhere. By providing a wealth of important details in a concise, well-organized format, these handy books deliver just what you need to complete the task at hand. When you've reached a sticking point in your work and need to get to a solution quickly, the new C Pocket Reference is the book you'll want to have.

  • av William C.R. Crawford
    661

    This publication introduces the concepts behind the patterns, as well as examining the pitfalls of using design patterns, especially the real-world trade-offs that Java developers wrestle with as they build enterprise applications from scratch.

  • av Erik T. Ray
    391

    This second edition of the bestselling Learning XML provides web developers with a concise but grounded understanding of XML (the Extensible Markup Language) and its potential-- not just a whirlwind tour of XML.The author explains the important and relevant XML technologies and their capabilities clearly and succinctly with plenty of real-life projects and useful examples. He outlines the elements of markup--demystifying concepts such as attributes, entities, and namespaces--and provides enough depth and examples to get started. Learning XML is a reliable source for anyone who needs to know XML, but doesn't want to waste time wading through hundreds of web sites or 800 pages of bloated text.For writers producing XML documents, this book clarifies files and the process of creating them with the appropriate structure and format. Designers will learn what parts of XML are most helpful to their team and will get started on creating Document Type Definitions. For programmers, the book makes syntax and structures clear. Learning XML also discusses the stylesheets needed for viewing documents in the next generation of browsers, databases, and other devices.Learning XML illustrates the core XML concepts and language syntax, in addition to important related tools such as the CSS and XSL styling languages and the XLink and XPointer specifications for creating rich link structures. It includes information about three schema languages for validation: W3C Schema, Schematron, and RELAX-NG, which are gaining widespread support from people who need to validate documents but aren't satisfied with DTDs. Also new in this edition is a chapter on XSL-FO, a powerful formatting language for XML. If you need to wade through the acronym soup of XML and start to really use this powerful tool, Learning XML, will give you the roadmap you need.

  • Spara 18%
    av John Viega
    667

    Because secure code is more essential than ever, this new cookbook covers the full range of computer security needs with more than 200 ready-made solutions. It's a valuable asset for anyone who develops software with these highly popular programming languages.

  • av Daniel J Barrett
    391

    Computer security is an ongoing process, a relentless contest between system administrators and intruders. This is a series of easy-to-follow recipes - short, focused pieces of code that administrators can use to improve security and perform common tasks securely.

  • - Solutions & Examples for Perl Programmers
    av Nathan Torkington & Tom Christiansen
    501

    Find a Perl programmer, and you'll find a copy of Perl Cookbook nearby. Perl Cookbook is a comprehensive collection of problems, solutions, and practical examples for anyone programming in Perl. The book contains hundreds of rigorously reviewed Perl "e;recipes"e; and thousands of examples ranging from brief one-liners to complete applications.The second edition of Perl Cookbook has been fully updated for Perl 5.8, with extensive changes for Unicode support, I/O layers, mod_perl, and new technologies that have emerged since the previous edition of the book. Recipes have been updated to include the latest modules. New recipes have been added to every chapter of the book, and some chapters have almost doubled in size.Covered topic areas include:Manipulating strings, numbers, dates, arrays, and hashesPattern matching and text substitutionsReferences, data structures, objects, and classesSignals and exceptionsScreen addressing, menus, and graphical applicationsManaging other processesWriting secure scriptsClient-server programmingInternet applications programming with mail, news, ftp, and telnetCGI and mod_perl programmingWeb programmingSince its first release in 1998, Perl Cookbook has earned its place in the libraries of serious Perl users of all levels of expertise by providing practical answers, code examples, and mini-tutorials addressing the challenges that programmers face. Now the second edition of this bestselling book is ready to earn its place among the ranks of favorite Perl books as well.Whether you're a novice or veteran Perl programmer, you'll find Perl Cookbook, 2nd Edition to be one of the most useful books on Perl available. Its comfortable discussion style and accurate attention to detail cover just about any topic you'd want to know about. You can get by without having this book in your library, but once you've tried a few of the recipes, you won't want to.

  • av Mark Gurry
    161

    One of the most important challenges faced by Oracle database administrators and Oracle developers is the need to tune SQL statements so that they execute efficiently. Poorly tuned SQL statements are one of the leading causes of substandard database performance and poor response time. SQL statements that perform poorly result in frustration for users, and can even prevent a company from serving its customers in a timely manner.In this book, Mark Gurry shares his in-depth knowledge of Oracle's SQL statement optimizers. Mark's knowledge is the result of many hard-fought tuning battles during his many years of providing Oracle tuning services to clients. Mark provides insights into the workings of the rule-based optimizer that go well beyond what the rules tell you. Mark also provides solutions to many common problems that occur with both the rule-based and cost-based optimizers. In addition to the specific problem/solution scenarios for the optimizers, Mark provides a number of handy SQL tuning tips. He discusses the various optimizer hints, telling you when they can be used to good effect. Finally, Mark discusses the use of the DBMS_STATS package to manage database statistics, and the use of outlines to specify execution plans for SQL statements in third-party applications that you can't otherwise modify.

  • av Bill Rosenblatt
    401

    The Korn Shell is an interactive command and scripting language for accessing Unixr and other computer systems. This work shows how to use the Korn Shell as a user interface and as a programing environment.

  • av Jacob Babbin, Simon Biles & Angela Orebaugh
    547

    If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential--but often overwhelming--challenge. Snort, the defacto open source standard of intrusion detection tools, is capable of performing real-time traffic analysis and packet logging on IP network. It can perform protocol analysis, content searching, and matching. Snort can save countless headaches; the new Snort Cookbook will save countless hours of sifting through dubious online advice or wordy tutorials in order to leverage the full power of SNORT.Each recipe in the popular and practical problem-solution-discussion O'Reilly cookbook format contains a clear and thorough description of the problem, a concise but complete discussion of a solution, and real-world examples that illustrate that solution. The Snort Cookbook covers important issues that sys admins and security pros will us everyday, such as:installationoptimizationloggingalertingrules and signaturesdetecting virusescountermeasuresdetecting common attacksadministrationhoneypotslog analysisBut the Snort Cookbook offers far more than quick cut-and-paste solutions to frustrating security issues. Those who learn best in the trenches--and don't have the hours to spare to pore over tutorials or troll online for best-practice snippets of advice--will find that the solutions offered in this ultimate Snort sourcebook not only solve immediate problems quickly, but also showcase the best tips and tricks they need to master be security gurus--and still have a life.

  • av Tom Stafford
    361

    The brain is a fearsomely complex information-processing environment--one that often eludes our ability to understand it. At any given time, the brain is collecting, filtering, and analyzing information and, in response, performing countless intricate processes, some of which are automatic, some voluntary, some conscious, and some unconscious.Cognitive neuroscience is one of the ways we have to understand the workings of our minds. It's the study of the brain biology behind our mental functions: a collection of methods--like brain scanning and computational modeling--combined with a way of looking at psychological phenomena and discovering where, why, and how the brain makes them happen.Want to know more? Mind Hacks is a collection of probes into the moment-by-moment works of the brain. Using cognitive neuroscience, these experiments, tricks, and tips related to vision, motor skills, attention, cognition, subliminal perception, and more throw light on how the human brain works. Each hack examines specific operations of the brain. By seeing how the brain responds, we pick up clues about the architecture and design of the brain, learning a little bit more about how the brain is put together.Mind Hacks begins your exploration of the mind with a look inside the brain itself, using hacks such as "e;Transcranial Magnetic Stimulation: Turn On and Off Bits of the Brain"e; and "e;Tour the Cortex and the Four Lobes."e; Also among the 100 hacks in this book, you'll find:Release Eye Fixations for Faster ReactionsSee Movement When All is StillFeel the Presence and Loss of AttentionDetect Sounds on the Margins of CertaintyMold Your Body SchemaTest Your HandednessSee a Person in Moving LightsMake Events Understandable as Cause-and-EffectBoost Memory by Using ContextUnderstand Detail and the Limits of AttentionSteven Johnson, author of "e;Mind Wide Open"e; writes in his foreword to the book, "e;These hacks amaze because they reveal the brain's hidden logic; they shed light on the cheats and shortcuts and latent assumptions our brains make about the world."e; If you want to know more about what's going on in your head, then Mind Hacks is the key--let yourself play with the interface between you and the world.

  • av Jonathan Gennick
    561

    Updated for Oracle 10g, this guide to SQL*Plus describes how to perform, step-by-step, all of the tasks that Oracle developers and DBAs want to perform with SQL*Plus--and maybe some you didn't realize you could perform. If you want to leverage of the full power and flexibility of this popular Oracle tool, this book is a useful resource.

  • - Tips & Tools for Automating Your House
    av Gordon Meyer
    417

    So much of what is commonplace today was once considered impossible, or at least wishful thinking. Laser beams in the operating room, cars with built-in guidance systems, cell phones with email access. There's just no getting around the fact that technology always has, and always will be, very cool.But technology isn't only cool; it's also very smart. That's why one of the hottest technological trends nowadays is the creation of smart homes.At an increasing rate, people are turning their homes into state-of-the-art machines, complete with more switches, sensors, and actuators than you can shake a stick at. Whether you want to equip your home with motion detectors for added security, install computer-controlled lights for optimum convenience, or even mount an in-home web cam or two purely for entertainment, the world is now your oyster. Ah, but like anything highly technical, creating a smart home is typically easier said than done.Thankfully, Smart Home Hacks takes the guesswork out of the process. Through a seemingly unending array of valuable tips, tools, and techniques, Smart Home Hacks explains in clear detail how to use Mac, Windows, or Linux to achieve the automated home of your dreams. In no time, you'll learn how to turn a loose collection of sensors and switches into a well-automated and well-functioning home no matter what your technical level may be.Smart Home Hacks covers a litany of stand-alone and integrated smart home solutions designed to enhance safety, comfort, and convenience in new and existing homes. Kitchens, bedrooms, home offices, living rooms, and even bathrooms are all candidates for smart automation and therefore are all addressed in Smart Home Hacks.Intelligently written by engineering guru and George Jetson wannabe, Gordon Meyer, Smart Home Hacks leaves no stone unturned. From what to purchase to how to use your remote control, it's the ultimate guide to understanding and implementing complete or partial home automation.

  • av Russell Miles
    607

    This hands-on book shows readers why and how common Java development problems can be solved by using new Aspect-oriented programming (AOP) techniques. With a wide variety of code recipes for solving day-to-day design and coding problems using AOP's unique approach, 'AspectJ Cookbook' demonstrates that AOP is more than just a concept.

  • av Debra Cameron
    457

    Tells readers how to get started with the GNU Emacs editor. It is a guide that will also "grow" with you: as you become more proficient, this book will help you learn how to use Emacs more effectively. It takes you from basic Emacs usage (simple text editing) to moderately complicated customization and programming.

  • av Gregor N. Purdy
    127

    Firewalls, Network Address Translation (NAT), network logging and accounting are all provided by Linux's Netfilter system, also known by the name of the command used to administer it, iptables. The iptables interface is the most sophisticated ever offered onLinux and makes Linux an extremely flexible system for any kind of network filtering you might do. Large sets of filtering rules can be grouped in ways that makes it easy to test them and turn them on and off.Do you watch for all types of ICMP traffic--some of them quite dangerous? Can you take advantage of stateful filtering to simplify the management of TCP connections? Would you like to track how much traffic of various types you get?This pocket reference will help you at those critical moments when someone asks you to open or close a port in a hurry, either to enable some important traffic or to block an attack. The book will keep the subtle syntax straight and help you remember all the values you have to enter in order to be as secure as possible. The book has an introductory section that describes applications,followed by a reference/encyclopaedic section with all the matches and targets arranged alphabetically.

  • av Hans Bergsten
    677

    JavaServer Faces, or JSF, brings a component-based model to web application development that's similar to the model that's been used in standalone GUI applications for years. The technology builds on the experience gained from Java Servlets, JavaServer Pages, and numerous commercial and open source web application frameworks that simplify the development process.In JavaServer Faces, developers learn how to use this new framework to build real-world web applications. The book contains everything you'll need: how to construct the HTML on the front end; how to create the user interface components that connect the front end to your business objects; how to write a back-end that's JSF-friendly; and how to create the deployment descriptors that tie everything together.JavaServer Faces pays particular attention to simple tasks that are easily ignored, but crucial to any real application: working with tablular data, for example, or enabling and disabling buttons. And this book doesn't hide from the trickier issues, like creating custom components or creating renderers for different presentation layers. Whether you're experienced with JSF or a just starting out, you'll find everything you need to know about this technology in this book.Topics covered include:The JSF environmentCreating and rendering componentsValidating inputHandling user-generated eventsControlling page navigationWorking with tabular dataInternationalizationIntegration between JSF and StrutsDeveloping custom renderers and custom componentsJavaServer Faces is a complete guide to the crucial new JSF technology. If you develop web applications, JSF belongs in your toolkit, and this book belongs in your library.

  • av Grace Todino & John Strang Jerry Peek
    417

    This is an introduction to UNIX in print. This edition covers Internet usage for email, file transfers, and Web browsing. It includes a quick-reference card to pull out and keep handy.

  • av Scott Schulze & Darl Kuhn
    127

    Oracle RMAN Pocket Reference is a handy guide for DBAs who intend to use Oracle Recovery Manager for database backup and recovery. Because Recovery Manager (RMAN) is a relatively new tool, many DBAs are just becoming familiar with it. They will welcome a timely book that explains clearly and concisely how to use RMAN for common backup and recovery tasks that are infrequent, yet extremely vital.The first portion of the book is primarily task-oriented. After a short section on RMAN architecture, the book shows (in checklist style) how to perform common backup and recovery tasks such as:Implementing a recovery catalogCreating and running RMAN scriptsConfiguring input/output channelsTaking a full database backupBacking up tablespaces and datafilesTaking incremental backupsRecovering lost datafilesThe second portion of the book consists of a handy syntax reference to the many RMAN commands. Having a quick reference to RMAN commands is a great convenience to DBAs who otherwise, often under the pressure of a recovery situation, would have to wade through Oracle's online documentation.

  • av D.J. Adams
    677

    Jabber is a set of protocols expressed in XML, and an extensible framework that allows people and applications to exchange all sorts of information. This text offers developers a chance to learn and understand the Jabber technology and protocol from an implementer's point of view.

  • av Bill Pribyl
    497

    This volume is suitable for newcomers to PL/SQL. It begins with a discussion of what it is and what it's good for, and then presents language features, one at a time. An example - the development of a library's electronic catalogue system - runs through the chapters.

  • av Kevin Dooley
    731

    This unique book offers a vendor-neutral approach for designing large local area networks according to business or organizational needs, rather than from a product perspective. Author and independent network design consultant Kevin Dooley outlines "e;top-down network design"e; for building a technological infrastructure to fit your organization's requirements, a process far more effective and cost-efficient than fitting the organization to the parameters of a shrink-wrapped proprietary solution.Dooley argues that the design of a network is largely independent of the products used. Whether you use a Cisco or Juniper router, the same security issues and protocols apply. The questions he addresses in this book are need-specific: Do I use a router or a switch? Should I route between switched areas or switch between routed areas?Designing Large-Scale LANs covers everything from security, bandwidth and scalability to network reliability, which includes backup, redundancy, and points of failure. Specific technologies are analyzed in detail: network topologies, routing and switching strategies, wireless, virtual LANs, firewalls and gateways, security, Internet protocols, bandwidth, and multicast services. The book also discusses proprietary technologies that are ubiquitous, such as Cisco's IOS and Novell's IPX.This complete guide to top-down network design will help you choose the right network solutions. If you're designing large scale networks and need expert advice and guidance, look no further than Designing Large-Scale LANs.

  • Spara 10%
    - Designing with Details
    av Dan Saffer
    387

    Its the little things that turn a good digital product into a great one. With this full color practical book, youll learn how to design effective microinteractions: the small details that exist inside and around features. How can users change a setting? How do they turn on mute, or know they have a new email message?Through vivid, real-world examples from todays devices and applications, author Dan Saffer walks you through a microinteractions essential parts, then shows you how to use them in a mobile app, a web widget, and an appliance. Youll quickly discover how microinteractions can change a product from one thats tolerated into one thats treasured.Explore a microinteractions structure: triggers, rules, feedback, modes, and loopsLearn the types of triggers that initiate a microinteractionCreate simple rules that define how your microinteraction can be usedHelp users understand the rules with feedback, using graphics, sounds, and vibrationsUse modes to let users set preferences or modify a microinteractionExtend a microinteractions life with loops, such as Get data every 30 seconds

  • - Master the fundamentals of C# 3.0
    av Jesse Liberty & Brian MacDonald
    567

    If you're new to C#, this popular book is the ideal way to get started. Completely revised for the latest version of the language, Learning C# 3.0 starts with the fundamentals and takes you through intermediate and advanced C# features -- including generics, interfaces, delegates, lambda expressions, and LINQ. You'll also learn how to build Windows applications and handle data with C#. No previous programming experience is required -- in fact, if you've never written a line of code in your life, bestselling authors Jesse Liberty and Brian MacDonald will show you how it's done. Each chapter offers a self-contained lesson to help you master key concepts, with plenty of annotated examples, illustrations, and a concise summary. With this book, you will:Learn how to program as you learn C#Grasp the principles of object-oriented programming through C#Discover how to use the latest features in C# 3.0 and the .NET 3.5 Framework--including LINQ and the Windows Presentation Foundation (WPF)Create Windows applications and data-driven applicationsYou'll also find a unique Test Your Knowledge section in each chapter, with practical exercises and review quizzes, so you can practice new skills and test your understanding. If you're ready to dive into C# and .NET programming, this book is a great way to quickly get up to speed.

  • - Demistifying the Geekier Side of Mac OS X
    av Rich Rosen, Brian Jepson & Ernest E. Rothman
    487

    If you're a developer or system administrator lured to Mac OS X because of its Unix roots, you'll quickly discover that performing Unix tasks on a Mac is different than what you're accustomed to. Mac OS X for Unix Geeks serves as a bridge between Apple's Darwin OS and the more traditional Unix systems. This clear, concise guide gives you a tour of Mac OS X's Unix shell in both Leopard and Tiger, and helps you find the facilities that replace or correspond to standard Unix utilities.You'll learn how to perform common Unix tasks in Mac OS X, such as using Directory Services instead of the standard Unix /etc/passwd and /etc/group, and you'll be able to compile code, link to libraries, and port Unix software using either Leopard and Tiger. This book teaches you to:Navigate the Terminal and understand how it differs from an xtermUse Open Directory (LDAP) and NetInfo as well as Directory ServicesCompile your code with GCC 4Port Unix programs to Mac OS X with FinkUse MacPorts to install free/open source softwareSearch through metadata with Spotlight's command-line utilitiesBuild the Darwin kernelAnd there's much more. Mac OS X for Unix Geeks is the ideal survival guide to tame the Unix side of Leopard and Tiger. If you're a Unix geek with an interest in Mac OS X, you'll soon find that this book is invaluable.

  • Spara 18%
    av Jukka K. Korpela
    531

    Possessing what readers need to grasp Unicode, this book takes on a guide through the character world. It is suitable for both beginning and seasoned programmers.

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.