Udvidet returret til d. 31. januar 2025

Bøger udgivet af APress

Filter
Filter
Sorter efterSorter Populære
  • af Venkata Ravi Kumar Yenugula
    480,95 kr.

    This book is your one-stop resource on MySQL database installation and server management for administrators. It covers installation, upgrades, monitoring, high availability, disaster recovery, security, and performance and troubleshooting. You will become fluent in MySQL 8.2, the latest version of the highly scalable and robust relational database system.With a hands-on approach, the book offers step-by-step guidance on installing, upgrading, and establishing robust high availability and disaster recovery capabilities for MySQL databases. It also covers high availability with InnoDB and NDB clusters, MySQL routers and enterprise MySQL tools, along with robust security design and performance techniques. Throughout, the authors punctuate concepts with examples taken from their experience with large-scale implementations at companies such as Meta and American Airlines, anchoring this practical guide to MySQL 8.2 administration in the real world.What YouWill LearnUnderstand MySQL architecture and best practices for administration of MySQL serverConfigure high availability, replication, disaster recovery with InnoDB and NDB enginesBack up and restore with MySQL utilities and tools, and configure the database for zero data lossTroubleshoot with steps for real-world critical errors and detailed solutionsWho This Book Is ForTechnical professionals, database administrators, developers, and engineers seeking to optimize MySQL databases for scale, security, and performance

  • af Alex Libby
    199,95 kr.

    Leverage the power of the Shadow DOM API to quickly create encapsulated code that keeps markup and styles separate within websites. Using little more than a text editor or free software, this project-oriented book simplifies the process of creating and manipulating the Shadow DOM API code in the browser for websites or online applications. You'll use a starting toolset to develop future projects, incorporate them into an existing workflow, and allow them to simplify complex components. This makes them more robust and less brittle when used in websites. You'll also see that websites do not have to convert the whole work process immediately; you can incorporate as little or as much as needed of the API, and build on this as your skills develop. We live in an age where speed and simplicity are of the essence. Beginning Shadow DOM API shows you the perfect way to create encapsulated code that can run in multiple frameworks with a minimum of fuss.You You'll LearnImplement the Shadow DOM API in a projectGain an appreciation of pointers using the Shadow DOM APIManage issues and security when using the Shadow DOM APIMake components and code more reusable, while maintaining desired stylingWho This Book Is ForWebsite developers who are already familiar with frameworks that Shadow DOM API, but do not want to have to use the heavy weight of a full-sized framework to add features such as DOM encapsulation to their code.

  • af Shivakumar R Goniwada
    573,95 kr.

    Explore the dynamics of digital identity, a crucial component in today¿s modern technology-driven era. This engaging book offers a deep understanding of how digital identity is evolving rapidly, why it¿s so significant, and offers organizations, regulatory bodies, and academicians the strategies needed to adopt secure decentralized digital identity features effectively. It¿s a must-read for those aiming to grasp the intricacies of digital identity and leverage it for future innovation and security.The book begins by redefining digital identity, examining its evolution and the profound impact it has on both individuals and organizations. It then delves into the development of digital identity strategies, laying the foundation for future digital transformations. Covering a wide range of topics, the book discusses the innovation, challenges, and technological exploration in digital identity. A special focus is given to biometric technologies and the implementation of decentralized digital identities, addressing critical areas such as identity governance, blockchain, AI and advanced biometrics. The book also investigates the implications of digital identity across various industries, including cross border travel, healthcare, social media, finance, metaverse, IoT etc. finally the book provides not only emerging trends but offers a glimpse into the future digital identity. Whether yoüre a tech professional, business leader, student or simply keen on understanding the impact of digital advancements, this book promises to offer insightful perspectives and practical solutions for navigating the complex world of digital identity. It underscores the importance of identity in spearheading digital innovation, making it a key resource for anyone looking to stay ahead in the digital landscape. As you reach its conclusion, yoüll be equipped with a wealth of knowledge and insights that are crucial in today¿s digital era.What You'll LearnDigital identity strategies and their role in shaping the future of digital identityDifferent facets of digital identitySpecifics of biometric technologies and decentralized digital identity Industry specific digital identity and its implementationCrucial aspects of privacy, ethics, and secure in the context of digital identityWho This Book Is ForSoftware professionals, security practitioners, architects, senior managers, executives, and students who are interested in digital identity.

  • af Enterprise Solution Architect
    380,95 kr.

    This book is for enterprise and solution architects, systems integrators, and anyone managing enterprise-scale, multi-cloud or hybrid IT landscapes. The book examines usage of Azure Arc for governance and systems management with security as an overarching theme. It is not an implementation manual but provides high-level guidance on best practices and links to detailed guidance. It offers insight into the types of problems that Azure Arc can solve, and will help you determine whether it is the right choice for your organization.Modern enterprise computing is an astonishing luxury land filled with never-before-seen hosting options on commercial clouds as well as advancements in the areas of private cloud and edge computing. The challenge with this plethora of choices is to manage and coordinate large IT estates which may bridge multiple public clouds and private datacenters. Visibility of operations to achieve security, cost control, and efficiency is often difficult to achieve. Data management is another area which is particularly fraught with complexity and risk.Industry leaders have made serious investments in the design of control plane products to address these gaps with varying approaches and degrees of success. Azure Arc is designed to provide a consolidated view of assets such as databases and Kubernetes installations across major cloud providers, edge locations, and customer-owned datacenters. It facilitates deployment of new infrastructure, patching and upgrades, monitoring, policy, and security controls for assets living on-premises or in competitor clouds as if they were native to Azure. While competitive products exist, at this writing none have the flexibility and reach of Arc to effectively manage very large hybrid estates.Readers will appreciate the author¿s approach of walking through typical enterprise computing scenarios while listing industry- or scenario-specific challenges that are difficult to overcome, and then reinforcing understanding by restating the challenges while explaining how Azure Arc can be utilized to remediate them.What You Will LearnDiscover what Azure Arc is, the types of problems it is intended to solve, and how to map your requirements to its capabilitiesStreamline and secure large Arc-enabled Kubernetes deployments via modern GitOps practicesUse Azure Arc to consolidate management across a broad range of hybrid and multi-cloud ecosystems through policy-driven governanceApply monitoring and automation to defend systems against security threats that are beyond the ability of manual administration to deflectUncover practical guidance that is written in a way that makes basic precepts approachable to non-technical stakeholders and then branches out into areas that will offer advanced readers new insights and consolidate a broad topic into a usable directionWho This BookIs ForEnterprise and solution architects, systems integrators, and anyone else looking to solve enterprise-scale administration problems across a multi-cloud or hybrid architecture

  • af Bruce Hopkins
    406,95 kr.

    Embrace the future of software development! ChatGPT for Java is the perfect starting point for Java developers to learn how to build intelligent applications using ChatGPT and Open AI APIs.This book takes you from the ground up to demonstrate how to use ChatGPT programmatically. You will learn the basics of ChatGPT and OpenAI APIs, including how to authenticate, send prompts, generate responses, test in the Playground, and handle errors. Each chapter includes practical exercises which demonstrate different API functionalities and bring your concepts to life. You will learn how to AI-enable your own applications using models such as GPT-4, GPT-3.5, Whisper, DALL-E, and many more. As a result, developers will understand that generative AI tools will not replace software development jobs! Instead, you will leverage ChatGPT as your Java AI-pair programmer to increase speed and productivity. You will also learn how ChatGPT can provide powerful Natural Language Processing (NLP) capabilities to your Java apps in order to understand various formats of unstructured text. Step-by-step, you will apply the concepts covered to create your own intelligent chatbots that can automatically process messages from either Slack on Discord. With this book, Java developers will be empowered to take their applications to new heights by leveraging the power of AI as this exciting field continues to evolve and transform.What You Will LearnAuthenticate with the ChatGPT and OpenAI APIs and learn how to engineer and send promptsTest your prompts in the ChatGPT PlaygroundHow to use multiple artificial intelligence models Harness the power the temperature, top_p, and other parameters that can ONLY be accessed by developers to create more unique and engaging responses from ChatGPTCreate intelligent bots for Slack or Discord serversIncorporate context into prompts for betterresponses and apply advanced features of the APIs.Explore future directions for ChatGPT and OpenAI Who This Book Is ForBeginning and intermediate Java developers who have a basic understanding of Java programming concepts and are interested in learning how to add intelligence to their applications by using ChatGPT programmatically. No prior experience with ChatGPT or OpenAI APIs is required.

  • af Abhishek Mishra
    413,95 kr.

    Understand and apply the design patterns outlined in this book to design, develop, and deploy scalable AI solutions that meet your organization's needs and drive innovation in the era of intelligent automation.This book begins with an overview of scalable AI systems and the importance of design patterns in creating robust intelligent solutions. It covers fundamental concepts and techniques for achieving scalability in AI systems, including data engineering practices and strategies. The book also addresses scalable algorithms, models, infrastructure, and architecture considerations. Additionally, it discusses deployment, productionization, real-time and streaming data, edge computing, governance, and ethics in scalable AI. Real-world case studies and best practices are presented, along with insights into future trends and emerging technologies.The book focuses on scalable AI and design patterns, providing an understanding of the challenges involved in developing AI systems that can handle large amounts of data, complex algorithms, and real-time processing. By exploring scalability, you will be empowered to design and implement AI solutions that can adapt to changing data requirements.What You Will LearnDevelop scalable AI systems that can handle large volumes of data, complex algorithms, and real-time processingKnow the significance of design patterns in creating robust intelligent solutionsUnderstand scalable algorithms and models to handle extensive data and computing requirements and build scalable AI systemsBe aware of the ethical implications of scalable AI systemsWho This Book Is ForAI practitioners, data scientists, and software engineers with intermediate-level AI knowledge and experience

  • af Morey J Haber
    447,95 kr.

    Today, it¿s easier for threat actors to simply log in versus hack in. As cyberattacks continue to increase in volume and sophistication, it¿s not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities¿whether human or machine, to initiate or progress their attack. Detecting and defending against these malicious activities should be the basis of all modern cybersecurity initiatives.This book details the risks associated with poor identity security hygiene, the techniques that external and internal threat actors leverage, and the operational best practices that organizations should adopt to protect against identity theft, account compromises, and to develop an effective identity and access security strategy. As a solution to these challenges, Identity Security has emerged as a cornerstone of modern Identity and Access Management (IAM) initiatives. Managing accounts, credentials, roles, entitlements, certifications, and attestation reporting for all identities is now a security and regulatory compliance requirement. In this book, you will discover how inadequate identity and privileged access controls can be exploited to compromise accounts and credentials within an organization. You will understand the modern identity threat landscape and learn how role-based identity assignments, entitlements, and auditing strategies can be used to mitigate the threats across an organization¿s entire Identity Fabric. What You Will LearnUnderstand the concepts behind an identity and how its associated credentials and accounts can be leveraged as an attack vectorImplement an effective identity security strategy to manage identities and accounts based on roles and entitlements, including the most sensitive privileged accountsKnow the role that identity security controls play in the cyber kill chain and how privileges should be managed as a potential weak linkBuild upon industry standards and strategies such as Zero Trust to integrate key identity security technologies into a corporate ecosystemPlan for a successful identity and access security deployment; create an implementation scope and measurable risk reduction; design auditing, discovery, and regulatory reporting; and develop oversight based on real-world strategies to prevent identity attack vectorsWho This Book Is ForManagement and implementers in IT operations, security, and auditing looking to understand and implement an Identity and Access Management (IAM) program and manage privileges in these environments

  • af Puthiyavan Udayakumar
    413,95 kr.

    Microsoft Defender for IoT helps organizations identify and respond to threats aimed at IoT devices, increasingly becoming targets for cyberattacks. This book discusses planning, deploying, and managing your Defender for IoT system. The book is a comprehensive guide to IoT security, addressing the challenges and best practices for securing IoT ecosystems.The book starts with an introduction and overview of IoT in Azure. It then discusses IoT architecture and gives you an overview of Microsoft Defender. You also will learn how to plan and work with Microsoft Defender for IoT, followed by deploying OT Monitoring. You will go through air-gapped OT sensor management and enterprise IoT monitoring. You also will learn how to manage and monitor your Defender for IoT systems with network alerts and data. After reading this book, you will be able to enhance your skills with a broader understanding of IoT and Microsoft Defender for IoT-integrated best practices to design, deploy, and manage a secure enterprise IoT environment using Azure.What You Will LearnUnderstand Microsoft security services for IoTGet started with Microsoft Defender for IoTPlan and design a security operations strategy for the IoT environmentDeploy security operations for the IoT environmentManage and monitor your Defender for IoT SystemWho This Book Is ForCybersecurity architects and IoT engineers

  • af Dario Cabianca
    413,95 kr.

    Written in a simple and developer-focused style, this book gives you the tools and knowledge you need to ace the GCP Professional Cloud Security Engineer certification exam. The approach is two-fold: introducing and implementing all GCP cloud security concepts and controls based on the certification exam objectives, and demonstrating how these concepts can be applied to real-world scenarios.Your study begins with cloud identities in GCP and different identity types (user accounts, service accounts, groups, and domains) and how separation of duties is implemented with access controls and Identity and Access Management (IAM). Emphasis is placed on the unique GCP approach to managing resources, with its clear distinction between resource ownership and resource billing. Following the defense in depth principle, the book shifts focus to network security and introduces different types of constructs that enable micro-segmentation, as they are implemented in a software-defined network. A chapter devoted to data protection is included. You will learn how to leverage the Data Loss Prevention (DLP) application programming interface (API) to prevent access to your workloads¿ sensitive data from unauthorized use. Examples on how to use the DLP API are provided using the Go language, which is becoming widely adopted in the developer community due to its simplicity, and high-performance networking and multi-processing capabilities. Encryption at rest, in use, and in transit is covered with an overview on how GCP implements confidential computing. The book concludes with an examination of the GCP services you need to know to monitor, audit, and ensure compliance with the laws and regulations where your workloads and infrastructure operate.By the end of the book, you will have acquired the knowledge and confidence to pass the GCP Professional Cloud Security Engineer certification exam and to successfully design, architect, and engineer security solutions with the Google Cloud Platform.Bonus Material: IAM deny policiesWhat You Will Learn Understand the five security principles and how to use them to drive the development of modern security architectures in Google Cloud Secure identities with Cloud Identity and Identity & Access Management (IAM) Secure the network with segmentation and private connectivity Protect sensitive data with the Data Loss Prevention (DLP) API and encryption Monitor, log, audit, and troubleshoot security incidents with the Google Cloud Operations Suite Ensure compliance and address regulatory concerns Who This Book Is ForSoftware engineers specializing in DevOps, SecOps, and DataOps, who possess expertise in the Software Development Life Cycle (SDLC) methodologies within Agile teams. It also targets software architects with proficiency in various domains such as security, network, solution, data, infrastructure, cloud, and enterprise architecture.

  • af Tareq Rabbo
    346,95 kr.

    Spring Web Services (Spring-WS) is an integral part of the popular Spring Framework and its next major update, Spring Framework 3.x. According to SpringSource, "Spring Web Services is unique among Java web service frameworks due to its focus on contract-first web services." The Definitive Guide to Spring Web Services is the first and official SpringSource guide to Spring-WS. With this book, users will learn how to put to use Spring-WS and Spring REST effectively in order to write and maintain viable web services. Write contract-first web services with Spring-WS.Develop REST web services with Spring REST support. Examine real-world examples and learn best practices to develop maintainable services. Explore Spring-SW from both the server side and the client side. What you'll learn Understand the main purpose and motivations behind constructing and consuming a web service, and the benefits of Spring-WS compared to competing frameworks. Write and maintain contract-first web services using the various Spring-WS features, and configure and extend Spring-WS to meet your specific needs. Use message factories, endpoints and dispatching, fault handling, interceptors, transports, and more. Use Object XML Mapping (OXM) frameworks transparently through the most popular OXM frameworks to develop your web services. Write flexible web services and apply agile and best practices including testing and more. Uncover the new Spring REST and how it can be best leveraged toward your Spring-WS applications. Discover how Spring-WS lets you interoperate/integrate with .NET, OSGi, and more. Deploy on SpringSource dm Server and other deployment engines. Who is this book for? The book is primarily focussed on beginner and intermediate users; however, the later chapters will offer more than enough meat to entice pro users as well. Basic knowledge of Spring is assumed.

  • - From Novice to Professional
    af Magnus Lie Hetland
    619,95 kr.

    Gain a fundamental understanding of Python’s syntax and features with the second edition of Beginning Python, an up–to–date introduction and practical reference. Covering a wide array of Python–related programming topics, including addressing language internals, database integration, network programming, and web services, you’ll be guided by sound development principles. Ten accompanying projects will ensure you can get your hands dirty in no time.Updated to reflect the latest in Python programming paradigms and several of the most crucial features found in Python 3.0 (otherwise known as Python 3000), advanced topics, such as extending Python and packaging/distributing Python applications, are also covered.

  • - Agile Web Development for the Java Platform Using Groovy and Grails
    af Christopher M Judd
    333,95 kr.

    Related Titles The Definitive Guide to Grails Practical JRuby on Rails Web 2.0 Projects: Bringing Ruby on Rails to Java The Definitive Guide to JasperReports

  • af Steven Hughes
    380,95 kr.

    About the Apress Pro Series The Apress Pro series books are practical, professional tutorials to keep you on and moving up the professional ladder. You have gotten the job, now you need to hone your skills in these tough competitive times. The Apress Pro series expands your skills and expertise in exactly the areas you need. Master the content of a Pro book, and you will always be able to get the job done in a professional development project. Written by experts in their field, Pro series books from Apress give you the hard-won solutions to problems you will face in your professional programming career. Related Titles Foundation Flash Applications for Mobile Devices Creating Mobile Games: Using Java ME Platform to Put the Fun into Your Mobile Device and Cell Phone

  • af Connie Morrison
    287,95 kr.

    Word 2007: Beyond the Manual is written for the experienced Word user who would find an introductory manual boring, condescending, and a waste of time. Basic features of word-processing in general or of Word in particular are not discussed. Features new to Word 2007 are emphasized, as are complex features that, though available in earlier versions of Word, were not readily accessible. The narrative is fast-paced, concise, and respectful of the reader's familiarity with earlier versions of the program.

  • af Richard Delorme
    289,95 kr.

    * Uses real application based on VWD's "Personal Web Starter Kit". * Compares and contrasts VWD and VS.NET, and discusses how to surmount difficulties you many encounter moving from one to another. * Discussion is consistently practical and goal oriented-book aims to help you maximize VWD Express as quickly as possible. * Perfect for the budding hobbyist or student.

  • - A Problem-Solution Approach
    af Sam Alapati
    486,95 kr.

    Oracle's backup and recovery tool is called Recovery Manager, or RMAN for short. It's one tool that every database administrator absolutely must know, and know well, because to lose a critical database can be a job-ending event. RMAN Recipes is a task-oriented book providing ready-made and example-based solutions to common (and some not-so-common) backup and recovery operations. The authors respect their reader's time. When the pressure's on, database administrators don't have time for long discussions of theory. They need solutions, and right now. RMAN Recipes delivers, getting right to the point with quick- and easy-to-read, step-by-step solutions that database administrators can implement with confidence.

  • af Jonathan Hassell
    277,95 kr.

    * Practical, non-theoretical content. * Author is recognized authority on Windows network administration. * Approaches the product objectively, without evangelizing.

  • af Sean Morrissey
    581,95 kr.

    iOS Forensic Analysis provides an in-depth look at investigative processes for the iPhone, iPod Touch, and iPad devices. The methods and procedures outlined in the book can be taken into any courtroom. With never-before-published iOS information and data sets that are new and evolving, this book gives the examiner and investigator the knowledge to complete a full device examination that will be credible and accepted in the forensic community.

  • af Matthew MacDonald
    444,95 kr.

    This book will follow the proven pattern of its previous .NET 2.0 and .NET 1.1 editions, teaching novice users how to use ASP.NET by gradually building their knowledge of the technology up in a pyramidal fashion chapter by chapter. Comprehensively revised for both ASP.NET 3.5 and the new C# 3.0 language this book presents the easiest path to ASP.NET 3.5 mastery. This is one of the first books introducing novices to this important new technology area, and is written specifically in their coding language of preference. The book is written by a proven and award winning .NET author that has been following the technology release cycle since its inception.

  • af Peter Wainwright
    474,95 kr.

    *Condensed, readable style; delivers tremendous value in just one book. This book offers *THE resource for focused and pragmatic industrial solutions in Perl, while the competing *best-sellers are older, quirkier and shallower treatments of Perl. *Thorough discussion of Perl-from installations to applications development; ideal for working Perl programmers in 2005. *Wainwright is a respected Perl expert and author of industry-respected Pro Apache title.

  • af Al Ward
    394,95 kr.

    * Written by two of the most respected members in the Photoshop community* Beautifully illustrated in full color throughout* Accompanying CD provides all the source files used in the book, plus extra goodies such as bonus tutorials, Actions, Layer Styles, and Colin's video tutorials

  • af Michael Coles
    564,95 kr.

    Pro T-SQL 2012 Programmer's Guide is every developer's key to making full use of SQL Server 2012's powerful, built-in Transact-SQL language. Discussing new and existing features, the book takes you on an expert guided tour of Transact-SQL functionality. Fully functioning examples and downloadable source code bring technically accurate and engaging treatment of Transact-SQL into your own hands. Step-by-step explanations ensure clarity, and an advocacy of best-practices will steer you down the road to success. Transact-SQL is the language developers and DBAs use to interact with SQL Server. It's used for everything from querying data, to writing stored procedures, to managing the database. New features in T-SQL 2012 include full support for window functions, stored sequences, the ability to throw errors, data paging, and more. All these important new features are covered in this book. Developers and DBAs alike can benefit from the expressive power of Transact-SQL, and Pro T-SQL 2012 Programmer's Guide provides the gateway to success in applying this increasingly important database language to everyday business and technical tasks.

  • af Jason Strate
    533,95 kr.

    Expert Performance Indexing for SQL Server 2012 is a deep dive into perhaps the single-most important facet of good performance: indexes, and how to best use them. The book begins in the shallow waters with explanations of the types of indexes and how they are stored in databases. Moving deeper into the topic, and further into the book, you will look at the statistics that are accumulated both by indexes and on indexes. All of this will help you progress towards properly achieving your database performance goals. What you'll learn from Expert Performance Indexing for SQL Server 2012 will help you understand what indexes are doing in the database and what can be done to mitigate and improve their effects on performance. The final destination is a guided tour through a number of real-world scenarios and approaches that can be taken to investigate, mitigate, and improve the performance of your database. Defines indexes and provides an understanding of their role Uncovers and explains the statistics that are kept in indexes Teaches strategies and approaches for indexing databases

  • af Jon Westfall
    410,95 kr.

    With Beginning Android Web Apps Development, you'll learn how to apply HTML5, CSS3, JavaScript, Ajax and other Web standards for use on the Android mobile platform, by building a variety of fun and visually stimulating games and other web applications! If you've done some basic web development, and you want to build your skills to create exceptional web apps, you'll find everything you seek in the discussions and examples in this book.Each application you'll build in Beginning Android Web Application Development will show you solutions that you can apply to many of your own projects. Each example shares techniques and coding solutions that will inspire your own work. You'll learn how to tie your Android apps into Twitter through two apps that you'll build: Who's that Tweet?!, a quiz game based on celebrity accounts, and I Love Ham, a coding investigation into search phrases and rhyming. Your Android web app development skills will then proceed in another direction, as you discover the power of HTML5 in two game apps: Scavenger Hunt, which introduces you to the HTML5 GPS location API, and Spies!, a location-based application that shows you how to use CSS3, Ajax, and HTML5 within multi-player environments. You'll also create an Android web application which checks the arrival time of buses and light-rails through the use of Portland, Oregon's open Tri-Met data API! This app is a great template for other apps you may want to build in the future, and showcases the important techniques for incorporating cloud-based apps into web games. After reading Beginning Android Web Apps Development, you will have built real apps and developed along the way the skills you'll need to create highly interactive, professional web applications... and, your journey will be engaging and enjoyable!

  • af Joachim Rossberg
    611,95 kr.

    You can have the best coders in the world working in your teams, but if your project management isn't up to scratch, your project is almost certain to be delayed, to come in over budget, and in some cases to fail entirely. By taking precise control of your application development process, you can make changes, both large and small, throughout your project's life cycle that will lead to better-quality finished products that are consistently delivered on time and within budget.Application lifecycle management (ALM) is an area of rapidly growing interest within the development community. Because its techniques allow you to deal with the process of developing applications across many areas of responsibility and across many different disciplines, its effects on your project can be wide ranging and pronounced. It is a project management tool that has practical implications for the whole team-from architects to designers, from developers to testers. Pro Application Lifecycle Management with Visual Studio 2012 focuses on the most powerful ALM tool available for the Microsoft .NET Framework: Visual Studio Team Foundation Server. It demonstrates the key concepts and techniques of ALM at first with a guide to the overall methodology, and then delves into architecture and testing--illustrating all of the concepts, tips and tricks using the tools TFS provides. The book serves as a complete guide to the ALM style--with no fluff and many relevant code samples and examples.After reading the book, you will understand how TFS can be used to generate continuous meaningful reporting on your project's health for the decision makers on your team as well as for your project's sponsors.

  • af Edmund Zehoo
    580,95 kr.

    Oracle Application Express 4 Recipes provides an example-based approach to learning Application Express-the ground-breaking, rapid application development platform included with every Oracle Database license. The recipes format is ideal for the quick-study who just wants a good example or two to kick start their thinking and get pointed in the right direction. The recipes cover the gamut of Application Express development. Author and Application Express expert Edmund Zehoo shows how to create data entry screens, visualize data in the form of reports and charts, implement validation and back-end logic, and much more. Solutions are presented in an easy problem/solution format, which you can copy and adapt for your own use. Detailed discussion for each solution deepens your understanding and aids in customizing the solutions to fit your particular development challenges. Teaches Application Express via an example-based format Takes you from beginner to intermediate level Shows how to build a fully-functional web store in just one hour

  • af Rick Killpack
    521,95 kr.

    * Handy all-in-one reference to Novell's eDirectory for all platforms. * Network consultants and administrators will find instant solutions to common administration issues based on the author's own Novell experiences. * Industry-wide solutions are based on the latest versions of eDirectory and how they integrate with all other versions of NDS and eDirectory.

  • af Richard Stones
    690,95 kr.

    *The most updated PostgreSQL book on the market, covering version 8.0 *Highlights the most popular PostgreSQL APIs, including C, Perl, PHP, and Java *This is two books in one; it simultaneously covers key relational database design principles, while teaching PostgreSQL

  • af Jeni Tennison
    763,95 kr.

    * Updated for XSLT 2.0, the latest revision * A clear, step-by-step introduction to XSLT for practical, everyday tasks * Suitable for complete beginners, even people who have never programmed before * Comprehensive, but focuses on techniques that are used time and time again; Uses a fun byut realistic case study throughout * Includes introductions to many of the most popular XML vocabularies Written by one of the leading experts on both XSLT and XML Schema; technical review by Michael Kay, the leading and well-known expert on XSLT.

  • af Peter Wainwright
    636,95 kr.

    * The Definitive Guide to Apache, Third Edition is a new revision of Peter Wainwright's best-selling (actually, the highest-selling) book on Apache configuration and administration. * Provides multiple methods and examples of how to solve a particular problem; compares and contrasts the methods rather than recommending a single, "best" solution. * Demonstrates how to use many of the most-popular scripting languages such as PHP, Perl, and Python to create dynamic web sites.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.