|
|
Writing Secure Code for Windows Vista(TM) (Paperback)
Get the definitive guide to writing secure code and developing
more-secure applications for Windows Vista--straight from the experts.
Security is one of the greatest enhancements in Windows Vista, and
developers will be urged to write more secure code on the platform to
support a growing customer base. This reference delivers the straight
scoop from the authors who wrote the immensely popular, award-winning
book Writing Secure Code. Developers get first-hand insights into design
decisions and practical advice for solving real-world security issues.
The book covers new features, including ACLs and BitLocker™, as well
as enhancements to familiar concepts, such as firewalls and
authentication. In addition, there are plenty of code samples in C# on
the Web. Designed to complement and extend Writing Secure Code, this
book is essential for developers of Windows Vista.
URL:
Code:
http://www.amazon.com/exec/obidos/tg/detail/-/0735623937/
Download:
Code:
http://rapidshare.com/files/91653071/Microsoft.Press.Writing.Secure.Code.for.Windows.Vista.Apr.2007.chm
|
|
|
SOA Security in Action (Paperback)
SOA is one of the latest technologies enterprises are using to tame
their software costs - in development, deployment, and management. SOA
makes integration easy, helping enterprises not only better utilize
their existing investments in applications and infrastructure, but also
open up new business opportunities. However, one of the big stumbling
blocks in executing SOA is security. This book addresses Security in SOA
with detailed examples illustrating the theory, industry standards and
best practices. It is true that security is important in any system. SOA
brings in additional security concerns as well rising out of the very
openness that makes it attractive. If we apply security principles
blindly, we shut ourselves of the benefits of SOA. Therefore, we need to
understand which security models and techniques are right for SOA. This
book provides such an understanding. Usually, security is seen as an
esoteric topic that is better left to experts. While it is true that
security requires expert attention, everybody, including software
developers, designers, architects, IT administrators and managers need
to do tasks that require very good understanding of security topics.
Fortunately, traditional security techniques have been around long
enough for people to understand and apply them in practice. This,
however, is not the case with SOA Security. Anyone seeking to implement
SOA Security is today forced to dig through a maze of inter-dependent
specifications and API docs that assume a lot of prior experience on the
part of readers. Getting started on a project is hence proving to be a
huge challenge to practitioners. This book seeks to change that. It
provides bottom-up understanding of security techniques appropriate for
use in SOA without assuming any prior familiarity with security topics
on the part of the reader. Unlike most other books about SOA that merely
describe the standards, this book helps you get started immediately by
walking you through sample code that illustrates how real life problems
can be solved using the techniques and best practices described in
standards. Whereas standards discuss all possible variations of each
security technique, this book focusses on the 20% of variations that are
used 80% of the time. This keeps the material covered in the book simple
as well as self-sufficient for all readers except the most advanced.
URL:
Code:
http://www.amazon.com/exec/obidos/tg/detail/-/1932394680/
Download:
Code:
http://rapidshare.com/files/90811400/Manning.SOA.Security.Dec.2007.pdf
|
|
|
Schaum's Outline of Data Structures with Java Second Edition
You can catch up on the latest developments in the number one,
fastest-growing programming language in the world with this fully
updated Schaum's guide. Schaum's Outline of Data Structures with Java
has been revised to reflect all recent advances and changes in the
language.
URL:
Code:
http://www.amazon.com/exec/obidos/tg/detail/-/0071476989/
Download:
Code:
http://rapidshare.com/files/90807515/McGraw.Hill.Schaums.Outline.of.Data.Structures.with.Java.2nd.Edition.Jun.2007.pdf
|
|
|
Video Training ISA Server 2006
The main ISA Server 2006 lab manual consists of nine lab modules:
- A. Introduction to ISA Server
- B. Configuring Outbound Internet Access
- C. Publishing Web Servers and Other Servers
- D. Publishing an Exchange Server
- E. Enabling VPN Connections
- F. ISA Server 2006 as Branch Office Gateway
- G. Enterprise Management of ISA Servers
- H. Configuring Load Balancing
- I. Using Monitoring, Alerting and Loging
Each lab module is independent of the other lab modules.
All nine lab modules are in a single lab manual, named ISA 2006 Lab Manual.doc.
The modules contain exercises about new or changed functionality in ISA Server 2006,
and contain exercises about functionality that is the same in ISA Server 2004.
In the "subset" lab manual, only the exercises about new or changed functionality
in ISA Server 2006 are put together in a single lab manual. All these exercises
are also in the main lab manual.
Each lab manual has a version formatted for A4 paper size, and a version formatted
for Letter paper size.
Download
Code:
http://rapidshare.com/files/87752082/Video.Training.ISA.Server.2006.part1.rar
http://rapidshare.com/files/88808722/Video.Training.ISA.Server.2006.part2.rar
http://rapidshare.com/files/88822865/Video.Training.ISA.Server.2006.part3.rar
http://rapidshare.com/files/88832964/Video.Training.ISA.Server.2006.part4.rar
http://rapidshare.com/files/87740639/Video.Training.ISA.Server.2006.part5.rar
http://rapidshare.com/files/87736118/Video.Training.ISA.Server.2006.part6.rar
|
|
|
Google Web Toolkit Solutions: More Cool & Useful Stuff (Paperback)
Cutting-Edge GWT: Advanced Recipes for Java Developers
Google Web Toolkit (GWT) is an open source Java development framework
for building Ajax-enabled web applications. Instead of the hodgepodge of
technologies that developers typically use for Ajax-JavaScript, HTML,
CSS, and XMLHttpRequest-GWT lets developers implement rich client
applications with pure Java, using familiar idioms from the AWT, Swing,
and SWT. GWT goes beyond most Ajax frameworks by making it easy to build
desktop-like applications that run in the ubiquitous browser, where the
richness of the user interface is limited only by the developer's
imagination.
This book focuses on the more advanced aspects of GWT that you need to
implement real-world applications with rich user interfaces but without
the heavy lifting of JavaScript and other Ajax-related technologies.
Each solution in this practical, hands-on book is more than a recipe.
The sample programs are carefully explained in detail to help you
quickly master advanced GWT techniques, such as implementing
drag-and-drop, integrating JavaScript libraries, and using advanced
event handling methodologies.
Solutions covered include:
- Building custom GWT widgets, including both high-level composites
and low-level components
- Implementing a viewport class that includes iPhone-style automated
scrolling
- Integrating web services with GWT applications
- Incorporating the Script.aculo.us JavaScript framework into GWT
applications
- Combining Hibernate and GWT to implement database-backed web
applications
- Extending the GWT PopupPanel class to implement a draggable and
resizable window
- Creating a drag-and-drop module, complete with drag sources and drop
targets
- Deploying GWT applications to an external server
- Dynamically resizing flex tables
- Using GWT widgets in legacy applications developed with other
frameworks, such as Struts and JavaServer Faces
Complete Sample Code Available at www.coolandusefulgwt.com
All of the code used in this book has been tested, both in hosted and
web modes, and in an external version of Tomcat (version 5.5.17), under
Windows, Linux, and Mac OS X. For Windows and Linux, we used 1.4.60, and
for the Mac we used 1.4.61. NOTE: There are three separate versions of
the code. Please download the correct JAR file for the operating system
you are using.
URL:
Code:
http://www.amazon.com/exec/obidos/tg/detail/-/0132344815/
Download:
Code:
http://rapidshare.com/files/90586078/Prentice.Hall.Google.Web.Toolkit.Solutions.Nov.2007.pdf
|
|
|
Google Web Toolkit Applications (Paperback)
Ryan clearly understands the GWT value proposition and how GWT
integrates into a diverse web technology stack-and not just in a
theoretical way. With the popularity of gpokr.com and kdice.com, Ryan
can speak with the authority of concrete success."
-Bruce Johnson, creator of Google Web Toolkit
"This book distinguishes itself from other books on GWT in that it walks
through the entire process of building several nontrivial GWT
applications, not the toy applications that most books present."
-R. Mark Volkmann, Object Computing, Inc.
"Google Web Toolkit Applications is an excellent resource for any GWT
developer. Solutions to challenges commonly encountered in GWT are
presented through the design and development of actual applications. The
applications developed throughout the text demonstrate best practices
from simple UI design all the way to custom code generation, and are
presented with little pretext about the amount of Java knowledge a given
developer may have. Advanced concepts are not withheld but are presented
in a way that will be understood by both novice and seasoned developers
alike. Good application development practices and proper Model View
Controller design is reinforced throughout the book, nearly guaranteeing
that the reader will come away a better programmer. "
-Jason Essington, Senior Web/Java Engineer, Green River Computing
"Dewsbury's Google Web Toolkit Applications is a book for both experts
and beginner programmers who want to discover this open source Java
software development framework, as well as write Ajax applications. A
very detailed book!"
-Massimo Nardone, Advisory IT Security Architect
Accelerate and Simplify Ajax Development with Google Web Toolkit
Get the edge you need to deliver exceptional user experiences with
Google Web Toolkit Applications, a guidebook that provides web
developers with core information and instructions for creating rich web
applications. Whether you're a developer who needs to build a
high-performance front end for Java, PHP, or Ruby applications, or to
integrate with external web services, this resource from expert Google
Web Toolkit (GWT) developer Ryan Dewsbury delivers the in-depth coverage
you'll need.
In this valuable book, insider Ryan Dewsbury provides instructions for
using the robust tool set and gets you on your way to creating
first-class web applications by providing a comprehensive overview of
GWT technology. In addition, he shares his "in-the-trenches" insights on
- Building elegant and responsive user interfaces with Cascading Style
Sheets and GWT's Widgets and Panels
- Creating seamless user experiences through asynchronous
communication with HTTP, REST, JSON/JSONP, and RPC Interoperating with
web standards-such as XML, RSS, and Atom-and web services-such as Google
Maps, Amazon Books, Yahoo! Search, Flickr, and Blogger
- Overcoming browser security restrictions, such as HTTP's
two-connection limit and the Same-Origin policy
- Accelerating development, using software engineering, code
generation, internationalization, application patterns, and Java tools
- Deploying for optimal performance with resource compression and
caching
- Building five non-trivial applications: a gadget application with a
rich drag-and-drop interface, a multi-search application that makes
requests to many search engines, a blog editor application for managing
entries across multiple blogs, a web-based instant messenger, and a
database manager for a traditional web page
This practical guide to GWT introduces you to the technology; provides
techniques, tips, and examples; and puts you on the road to delivering
top-notch user experiences for your web applications.
URL:
Code:
http://www.amazon.com/exec/obidos/tg/detail/-/0321501969/
Download:
Code:
http://rapidshare.com/files/90586486/Prentice.Hall.Google.Web.Toolkit.Applications.Dec.2007.pdf
|
|
|
C# 3.0 Design Patterns [ILLUSTRATED] (Paperback)
If you want to speed up the development of your .NET applications,
you're ready for C# design patterns -- elegant, accepted and proven ways
to tackle common programming problems. This practical guide offers you a
clear introduction to the classic object-oriented design patterns, and
explains how to use the latest features of C# 3.0 to code them. C#
Design Patterns draws on new C# 3.0 language and .NET 3.5 framework
features to implement the 23 foundational patterns known to working
developers. You get plenty of case studies that reveal how each pattern
is used in practice, and an insightful comparison of patterns and where
they would be best used or combined. This well-organized and illustrated
book includes: An explanation of design patterns and why they're used,
with tables and guidelines to help you choose one pattern over another
Illustrated coverage of each classic Creational, Structural, and
Behavioral design pattern, including its representation in UML and the
roles of its various players C# 3.0 features introduced by example and
summarized in sidebars for easy reference Examples of each pattern at
work in a real .NET 3.5 program available for download from O'Reilly and
the author's companion web site Quizzes and exercises to test your
understanding of the material. With C# 3.0 Design Patterns, you learn to
make code correct, extensible and efficient to save time up front and
eliminate problems later. If your business relies on efficient
application development and quality code, you need C# Design Patterns.
URL:
Code:
http://www.amazon.com/exec/obidos/tg/detail/-/059652773X/
Download:
Code:
http://rapidshare.com/files/90584818/OReilly.C.Sharp.3.0.Design.Patterns.Jan.2008.pdf
|
|
|
MCITP: Microsoft Windows Vista Desktop Support Consumer Study, Guide: (Paperback)
If you are a support professional who sets up, maintains, and
troubleshoots desktop applications on Windows Vista, now you can build
your skills and prepare for exam 70-623, MCITP: Supporting and
Troubleshooting Applications on a Windows Vista Client for Consumer
Support Technicians, the required exam for achieving certification as an
MCITP: Consumer Support Technician. Inside this comprehensive study
guide you'll find full coverage of all exam objectives, practical
hands-on exercises, real-world scenarios, challenging review questions,
and more.
URL:
Code:
http://www.amazon.com/exec/obidos/tg/detail/-/0470165340/
Download:
Code:
http://rapidshare.com/files/90584587/MCITP.Microsoft.Windows.Vista.Desktop.Support.Consumer.Study.Guide.Exam.70-623.pdf
|
|
|
Practical Guide to Trusted Computing (Paperback)
Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable
Every year, computer security threats become more severe. Software alone
can no longer adequately defend against them: what's needed is secure
hardware. The Trusted Platform Module (TPM) makes that possible by
providing a complete, open industry standard for implementing trusted
computing hardware subsystems in PCs. Already available from virtually
every leading PC manufacturer, TPM gives software professionals powerful
new ways to protect their customers. Now, there's a start-to-finish
guide for every software professional and security specialist who wants
to utilize this breakthrough security technology.
Authored by innovators who helped create TPM and implement its
leading-edge products, this practical book covers all facets of TPM
technology: what it can achieve, how it works, and how to write
applications for it. The authors offer deep, real-world insights into
both TPM and the Trusted Computing Group (TCG) Software Stack. Then, to
demonstrate how TPM can solve many of today's most challenging security
problems, they present four start-to-finish case studies, each with
extensive C-based code examples.
Coverage includes:
- What services and capabilities are provided by TPMs
- TPM device drivers: solutions for code running in BIOS, TSS stacks
for new operating systems, and memory-constrained environments
- Using TPM to enhance the security of a PC's boot sequence
- Key management, in depth: key creation, storage, loading, migration,
use, symmetric keys, and much more
- Linking PKCS#11 and TSS stacks to support applications with
middleware services
- What you need to know about TPM and privacy--including how to avoid
privacy problems
- Moving from TSS 1.1 to the new TSS 1.2 standard
- TPM and TSS command references and a complete function library
URL:
Code:
http://www.amazon.com/exec/obidos/tg/detail/-/0132398427/
Download:
Code:
http://rapidshare.com/files/90582959/IBM.Press.A.Practical.Guide.to.Trusted.Computing.Jan.2008.pdf
|
|
|
Bluetooth Essentials for Programmers (Paperback)
This book provides an introduction to Bluetooth programming, with a
specific focus on developing real code. The authors discuss the major
concepts and techniques involved in Bluetooth programming, with special
emphasis on how they relate to other networking technologies. They
provide specific descriptions and examples for creating applications in
a number of programming languages and environments including Python, C,
Java, GNU/Linux, Windows XP, Symbian Series 60, and Mac OS X. No
previous experience with Bluetooth is assumed, and the material is
suitable for anyone with some programming background. The authors place
special emphasis on the essential concepts and techniques of Bluetooth
programming, starting simply and allowing the reader to quickly master
the basic concepts before addressing advanced features.
URL:
Code:
http://www.amazon.com/exec/obidos/tg/detail/-/0521703751/
Download:
Code:
http://rapidshare.com/files/90582309/Cambridge.Press.Bluetooth.Essentials.for.Programmers.Sep.2007.pdf
|
|
|
PHP Web 2.0 Mashup Projects (Paperback)
This practical tutorial has detailed, carefully explained case studies
using PHP to build new, effective mashup applications, which combine
data from multiple external online sources into an integrated Web 2.0
experience. If you are confident with PHP programming and interested in
mashing things up, this book is for you! All you need to know about
formats, protocols, web services, and web APIs is covered as you learn
to write PHP code to remotely consume services like Google Maps, Flickr,
Amazon, YouTube, MSN Search, Yahoo!, Last.fm, the Internet UPC Database,
and even the California Highway Patrol Traffic data! The 5 real-world
PHP projects each start with an overview of technologies and protocols
needed and then dive into the tools used and details of creating the
project, and you can download each project's source code. You will learn
how these technologies work with each other and how to use this
information, together with your imagination, to build your own
cutting-edge websites.
URL:
Code:
http://www.amazon.com/exec/obidos/tg/detail/-/184719088X/
Download:
Code:
http://rapidshare.com/files/90582062/Packt.Publishing.PHP.Web.2.0.Mashup.Projects.Sep.2007.pdf
|
|
|
Rapid GUI Programming with Python and Qt (Prentice Hall Open Source, Software Development)
The Insider's Best-Practice Guide to Rapid PyQt 4 GUI Development
Whether you're building GUI prototypes or full-fledged cross-platform
GUI applications with native look-and-feel, PyQt 4 is your fastest,
easiest, most powerful solution. Qt expert Mark Summerfield has written
the definitive best-practice guide to PyQt 4 development. With Rapid GUI
Programming with Python and Qt you'll learn how to build efficient GUI
applications that run on all major operating systems, including Windows,
Mac OS X, Linux, and many versions of Unix, using the same source code
for all of them. Summerfield systematically introduces every core GUI
development technique: from dialogs and windows to data handling; from
events to printing; and more. Through the book's realistic examples
you'll discover a completely new PyQt 4-based programming approach, as
well as coverage of many new topics, from PyQt 4's rich text engine to
advanced model/view and graphics/view programming. Every key concept is
illuminated with realistic, downloadable examples—all tested on Windows,
Mac OS X, and Linux with Python 2.5, Qt 4.2, and PyQt 4.2, and on
Windows and Linux with Qt 4.3 and PyQt 4.3. Coverge includes:
- Python basics for every PyQt developer: data types, data structures,
control structures, classes, modules, and more
- Core PyQt GUI programming techniques: dialogs, main windows, and
custom file formats
- Using Qt Designer to design user interfaces, and to implement and
test dialogs, events, the Clipboard, and drag-and-drop
- Building custom widgets: Widget Style Sheets, composite widgets,
subclassing, and more
- Making the most of Qt 4.2's new graphics/view architecture
- Connecting to databases, executing SQL queries, and using form and
table views
- Advanced model/view programming: custom views, generic delegates,
and more
- Implementing online help, internationalizing applications, and using
PyQt's networking and multithreading facilities
URL:
Code:
http://www.amazon.com/exec/obidos/tg/detail/-/0132354187/
Download:
Code:
http://rapidshare.com/files/90581268/Prentice.Hall.Rapid.GUI.Programming.with.Python.and.Qt.Oct.2007.pdf
|
|
|
Open Source Fuzzing Tools (Paperback)
A "fuzzer" is a program that attempts to discover security
vulnerabilities by sending random data to an application. If that
application crashes, then it has deffects to correct. Security
professionals and web developers can use fuzzing for software
testing--checking their own programs for problems--before hackers do it!
Open Source Fuzzing Tools is the first book to market that covers the
subject of black box testing using fuzzing techniques. Fuzzing has been
around fow a while, but is making a transition from hacker home-grown
tool to commercial-grade quality assurance product. Using fuzzing,
developers can find and eliminate buffer overflows and other software
vulnerabilities during the development process and before release.
* Fuzzing is a fast-growing field with increasing commercial interest (7
vendors unveiled fuzzing products last year).
* Vendors today are looking for solutions to the ever increasing threat
of vulnerabilities. Fuzzing looks for these vulnerabilities
automatically, before they are known, and eliminates them before
release.
* Software developers face an incresing demand to produce secure
applications---and they are looking for any information to help them do
that.
URL:
Code:
http://www.amazon.com/exec/obidos/tg/detail/-/1597491950/
Download:
Code:
http://rapidshare.com/files/90580900/Syngress.Open.Source.Fuzzing.Tools.Aug.2007.pdf
|
|
|
Perl Scripting for IT Security (Paperback)
This book is intended for anyone who has an interest in useful Perl
scripting, in particular on the Windows platform, for the purpose of
incident response, and forensic analysis, and application monitoring.
While a thorough grounding in scripting languages (or in Perl
specifically) is not required, it is helpful in fully and more
completely understanding the material and code presented in this book.
This book contains information that is useful to consultants who perform
incident response and computer forensics, specifically as those
activities pertain to MS Windows systems (Windows 2000, XP, 2003, and
some Vista). My hope is that not only will consultants (such as myself)
find this material valuable, but so will system administrators, law
enforcement officers, and students in undergraduate and graduate
programs focusing on computer forensics.
* Perl is the third most commonly used programming language in the world
* Helps security professionals in updating settings on a remote server
several cities away, collecting data for a report to management, and
more
* The companion Web site for the book contains dozens of scripts the
reader can download and use today
URL:
Code:
http://www.amazon.com/exec/obidos/tg/detail/-/159749173X/
Download:
Code:
http://rapidshare.com/files/90580614/Syngress.Perl.Scripting.for.IT.Security.Dec.2007.pdf
|
|
|
C# 3.0 Cookbook, Third Edition [ILLUSTRATED] (Paperback)
Completely updated for C# 3.0 and the .NET 3.5 platform, the new edition
of this bestseller offers more than 250 code recipes to common and
not-so-common problems that C# programmers face every day. Every recipe
in the book has been reconsidered with more than a third of them
rewritten to take advantage of new C# 3.0 features. If you prefer
solutions you can use today to general C# language instruction, and
quick answers to theory, this is your book. C# 3.0 Cookbook offers a new
chapter on LINQ (language integrated query), plus two expanded chapters
for recipes for extension methods, lambda functions, object
initializers, new synchronization primitives and more. The new edition
is also complemented by a public wiki, which not only includes all of
the C# 2.0 recipes from the previous edition unchanged by the release of
C# 3.0, but invites you to suggest better ways to solve those tasks.
Here are some of topics covered: LINQ Numeric data types and
Enumerations Strings and characters Classes and structures Generics
Collections Exception handling Delegates, events, and lambda expressions
Filesystem interactions Web site access XML usage (including LINQ to
XML, XPath and XSLT) Networking Threading Data Structures & Algorithms
Each recipe in the book includes tested code that you can download from
oreilly.com and reuse in your own applications, and each one includes a
detailed discussion of how and why the underling technology works. You
don't have to be an experienced C# or .NET developer to use C# 3.0
Cookbook. You just have to be someone who wants to solve a problem now,
without having to learn all the related theory first.
URL:
Code:
http://www.amazon.com/exec/obidos/tg/detail/-/059651610X/
Download:
Code:
http://rapidshare.com/files/90580317/OReilly.C.Sharp.3.0.Cookbook.3rd.Edition.Jan.2008.pdf
|
|
|
Design Patterns in Ruby (Addison-Wesley Professional Ruby Series)
Praise for Design Patterns in Ruby
"Design Patterns in Ruby documents smart ways to resolve many problems
that Ruby developers commonly encounter. Russ Olsen has done a great job
of selecting classic patterns and augmenting these with newer patterns
that have special relevance for Ruby. He clearly explains each idea,
making a wealth of experience available to Ruby developers for their own
daily work."
—Steve Metsker, Managing Consultant with Dominion Digital, Inc.
"This book provides a great demonstration of the key 'Gang of Four'
design patterns without resorting to overly technical explanations.
Written in a precise, yet almost informal style, this book covers enough
ground that even those without prior exposure to design patterns will
soon feel confident applying them using Ruby. Olsen has done a great job
to make a book about a classically 'dry' subject into such an engaging
and even occasionally humorous read."
—Peter Cooper
"This book renewed my interest in understanding patterns after a decade
of good intentions. Russ picked the most useful patterns for Ruby and
introduced them in a straightforward and logical manner, going beyond
the GoF's patterns. This book has improved my use of Ruby, and
encouraged me to blow off the dust covering the GoF book."
—Mike Stok
"Design Patterns in Ruby is a great way for programmers from statically
typed objectoriented languages to learn how design patterns appear in a
more dynamic, flexible language like Ruby."
—Rob Sanheim, Ruby Ninja, Relevance Most design pattern books are based
on C++ and Java. But Ruby is different—and the language's unique
qualities make design patterns easier to implement and use. In this
book, Russ Olsen demonstrates how to combine Ruby's power and elegance
with patterns, and write more sophisticated, effective software with far
fewer lines of code. After reviewing the history, concepts, and goals of
design patterns, Olsen offers a quick tour of the Ruby language—enough
to allow any experienced software developer to immediately utilize
patterns with Ruby. The book especially calls attention to Ruby features
that simplify the use of patterns, including dynamic typing, code
closures, and "mixins" for easier code reuse. Fourteen of the classic
"Gang of Four" patterns are considered from the Ruby point of view,
explaining what problems each pattern solves, discussing whether
traditional implementations make sense in the Ruby environment, and
introducing Ruby-specific improvements. You'll discover opportunities to
implement patterns in just one or two lines of code, instead of the
endlessly repeated boilerplate that conventional languages often
require. Design Patterns in Ruby also identifies innovative new patterns
that have emerged from the Ruby community. These include ways to create
custom objects with metaprogramming, as well as the ambitious
Rails-based "Convention Over Configuration" pattern, designed to help
integrate entire applications and frameworks. Engaging, practical, and
accessible, Design Patterns in Ruby will help you build better software
while making your Ruby programming experience more rewarding.
URL:
Code:
http://www.amazon.com/exec/obidos/tg/detail/-/0321490452/
Download:
Code:
http://rapidshare.com/files/90579521/Addison.Wesley.Design.Patterns.in.Ruby.Dec.2007.pdf
|
|
|
Implementation Patterns (Addison-Wesley Signature) (Paperback)
"Kent is a master at creating code that communicates well, is easy to
understand, and is a pleasure to read. Every chapter of this book
contains excellent explanations and insights into the smaller but
important decisions we continuously have to make when creating quality
code and classes."
-Erich Gamma, IBM Distinguished Engineer
"Many teams have a master developer who makes a rapid stream of good
decisions all day long. Their code is easy to understand, quick to
modify, and feels safe and comfortable to work with. If you ask how they
thought to write something the way they did, they always have a good
reason. This book will help you become the master developer on your
team. The breadth and depth of topics will engage veteran programmers,
who will pick up new tricks and improve on old habits, while the clarity
makes it accessible to even novice developers.
"
-Russ Rufer, Silicon Valley Patterns Group
"Many people don't realize how readable code can be and how valuable
that readability is. Kent has taught me so much, I'm glad this book
gives everyone the chance to learn from him."
-Martin Fowler, chief scientist, ThoughtWorks
"Code should be worth reading, not just by the compiler, but by humans.
Kent Beck distilled his experience into a cohesive collection of
implementation patterns. These nuggets of advice will make your code
truly worth reading."
-Gregor Hohpe, author of Enterprise Integration Patterns
"In this book Kent Beck shows how writing clear and readable code
follows from the application of simple principles. Implementation
Patterns will help developers write intention revealing code that is
both easy to understand and flexible towards future extensions. A must
read for developers who are serious about their code."
-Sven Gorts
"Implementation Patterns bridges the gap between design and coding. Beck
introduces a new way of thinking about programming by basing his
discussion on values and principles."
-Diomidis Spinellis, author of Code Reading and Code Quality
Software Expert Kent Beck Presents a Catalog of Patterns Infinitely
Useful for Everyday Programming
Great code doesn't just function: it clearly and consistently
communicates your intentions, allowing other programmers to understand
your code, rely on it, and modify it with confidence. But great code
doesn't just happen. It is the outcome of hundreds of small but critical
decisions programmers make every single day. Now, legendary software
innovator Kent Beck-known worldwide for creating Extreme Programming and
pioneering software patterns and test-driven development-focuses on
these critical decisions, unearthing powerful "implementation patterns"
for writing programs that are simpler, clearer, better organized, and
more cost effective.
Beck collects 77 patterns for handling everyday programming tasks and
writing more readable code. This new collection of patterns addresses
many aspects of development, including class, state, behavior, method,
collections, frameworks, and more. He uses diagrams, stories, examples,
and essays to engage the reader as he illuminates the patterns. You'll
find proven solutions for handling everything from naming variables to
checking exceptions.
This book covers:
- The value of communicating through code and the philosophy behind
patterns
- How and when to create classes, and how classes encode logic
- Best practices for storing and retrieving state
- Behavior: patterns for representing logic, including alternative
paths
- Writing, naming, and decomposing methods
- Choosing and using collections
- Implementation pattern variations for use in building frameworks
Implementation Patterns will help programmers at all experience levels,
especially those who have benefited from software patterns or agile
methods. It will also be an indispensable resource for development teams
seeking to work together more efficiently and build more maintainable
software. No other programming book will touch your day-to-day work more
often.
URL:
Code:
http://www.amazon.com/exec/obidos/tg/detail/-/0321413091/
Download
Code:
http://rapidshare.com/files/90579360/Addison.Wesley.Implementation.Patterns.Nov.2007.pdf
|
|
|
|
|
|
|