Kamis, 15 September 2011

4 new posts


4 new posts

Link to Wow! eBook - Blog

Java For Dummies, 5th Edition

Posted: 15 Sep 2011 04:43 AM PDT

Java For Dummies, 5th Edition

Book Description

The top-selling beginning Java book is now fully updated for Java 7!

Java is the platform-independent, object-oriented programming language used for developing web and mobile applications. The revised version offers new functionality and features that have programmers excited, and this popular guide covers them all. This book helps programmers create basic Java objects and learn when they can reuse existing code. It’s just what inexperienced Java developers need to get going quickly with Java 2 Standard Edition 7.0 (J2SE 7.0) and Java Development Kit 7.0 (JDK 7).

  • Explores how the new version of Java offers more robust functionality and new features such as closures to keep Java competitive with more syntax-friendly languages like Python and Ruby
  • Covers object-oriented programming basics with Java, code reuse, the essentials of creating a Java program using the new JDK 7, creating basic Java objects, and new Eclipse features
  • A companion web site offers all code from the book and bonus chapters

Written by a Java trainer, Java For Dummies, 5th Edition will enable even novice programmers to start creating Java applications quickly and easily.

From the Back Cover
Jumpin’ Java! The bestselling Java beginner’s book is now fully updated for Java 7!

Java, the object-oriented programming language that works on almost any computer, is what powers many of those cool multimedia applications. Thousands have learned Java programming from previous editions of this book — now it’s your turn! Whether you’re new to programming or already know a little Visual Basic or C++, you’ll be doing Java in a jiffy.

  • The Java scoop — get an overview of Java, the enhancements in Java 7, and the software tools you need
  • Building blocks — learn to work with Java classes and methods and add comments
  • Get loopy — understand the value of variables and learn to control program flow with loops or decision-making statements
  • Class it up — explore classes and objects, constructors, and subclasses, and see how to reuse your code
  • A click ahead — experiment with variables and methods, use arrays and collections to juggle values, and create programs that respond to mouse clicks

Open the book and find:

  • Definitions of the many terms you’ll encounter
  • The grammar of Java
  • How to save time by reusing code
  • All about if, for, switch, and while statements
  • An overview of object-oriented programming
  • Hints about handling exceptions
  • How to write Java applets
  • Ten ways to avoid mistakes

Visit the companion website at www.dummies.com/go/javafordummies5e for lots of code samples that you can use in your Java programs

Learn to:

  • Combine several smaller programs to create a bigger program
  • Work with new libraries, closure, parallel frameworks, and other new features
  • Create basic Java objects and reuse code
  • Handle exceptions and events

Book Details

  • Paperback: 432 pages
  • Publisher: For Dummies; 5th Edition (August 2011)
  • Language: English
  • ISBN-10: 0470371730
  • ISBN-13: 978-0470371732
Note: There is a file embedded within this post, please visit this post to download the file.

Related Posts

Thor’s Microsoft Security Bible

Posted: 15 Sep 2011 04:37 AM PDT

Thors Microsoft Security Bible

Book Description

Thor’s Microsoft® Security Bible provides a “one-stop-shop” for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code.

  • Detailed technical information on security processes for all major Microsoft applications
  • Unique project-based “storytelling” delivery, combining multiple security techniques and methods together for real-world solutions to security challenges in actual business use cases
  • Reference-style content for access to specific application security techniques and methods
  • Actual author opinion and guidance as not only HOW to go about security particular applications, but WHY to do so
  • DVD Companion disk with source code, tools, video tutorials, and other materials

“Most recognize Thor as the Norse god of thunder with massive powers of destruction. Few realize that he was also the god of restoration. Likewise, his namesake, Timothy “Thor” Mullen, has spent his entire adult life both destroying and restoring Microsoft-based security systems. Thor’s Microsoft Security Bible conveys the wisdom and expertise of the industry legend that has defined the bleeding edge of Microsoft security for over twenty years. I highly recommend this book.”
-Johnny Long, Hacker at Large Author of the best-selling “Google Hacking” series

Book Details

  • Hardcover: 336 pages
  • Publisher: Syngress (August 2011)
  • Language: English
  • ISBN-10: 1597495727
  • ISBN-13: 978-1597495721
Note: There is a file embedded within this post, please visit this post to download the file.

Related Posts

Security Risk Management

Posted: 15 Sep 2011 04:34 AM PDT

Security Risk Management

Book Description

The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can’t explain why. This book will help you to break free from the so-called “best practices” argument by articulating risk exposures in business terms. You will learn techniques for how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management. While other books focus entirely on risk analysis methods, this is the first comprehensive guide for managing security risks.

  • Includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment
  • Explores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate risk
  • Presents a roadmap for designing and implementing a security risk management program

Table of Contents
Part I – Introduction to Risk Management
Chapter 1. The Security Evolution
Chapter 2. Risky Business
Chapter 3. The Risk Management Lifecycle
Chapter 4. Risk Profiling

Part II – Risk Assessment and Analysis Techniques
Chapter 5. Formulating a Risk
Chapter 6. Risk Exposure Factors
Chapter 7. Security Controls and Services
Chapter 8. Risk Evaluation and Mitigation Strategies
Chapter 9. Reports and Consulting
Chapter 10. Risk Assessment Techniques

Part III – Building and Running a Risk Management Program
Chapter 11. Threat and Vulnerability Management
Chapter 12. Security Risk Reviews
Chapter 13. A Blueprint for Security
Chapter 14. Building a Program from Scratch

Appendix A: Security Risk Profile
Appendix B: Risk Models and Scales
Appendix C: Architectural Risk Analysis Reference Tables

Book Details

  • Paperback: 360 pages
  • Publisher: Syngress (May 2011)
  • Language: English
  • ISBN-10: 1597496154
  • ISBN-13: 978-1597496155
Note: There is a file embedded within this post, please visit this post to download the file.

Related Posts

JavaScript: The Web Technologies Series, 5th Edition

Posted: 15 Sep 2011 04:28 AM PDT

JavaScript: The Web Technologies Series, 5th Edition

Book Description

Now in its fifth edition, JAVASCRIPT guides beginning programmers through Web application development using the JavaScript programming language. As with previous editions of this book, Don Gosselin introduces key Web authoring techniques with a strong focus on industry application. A real-world project, similar to what students would encounter in a professional setting, is developed throughout each chapter. Since professional Web development jobs often require programmers to add features to an existing site, each chapter project uses a professionally designed Web site. After completing the course, students will be able to use JavaScript to build professional quality, dynamic Web sites. For valuable information on pricing, previous editions, changes to current editions and alternate formats, please visit www.cengage.com/highered to search by ISBN#, author, title or keyword for materials in your areas of interest.

Table of Contents
CHAPTER 1 Introduction to JavaScript
CHAPTER 2 Working with Functions, Data Types, and Operators
CHAPTER 3 Building Arrays and Control Structures
CHAPTER 4 Manipulating the Browser Object Model
CHAPTER 5 Validating Form Data with JavaScript
CHAPTER 6 Using Object-Oriented JavaScript
CHAPTER 7 Manipulating Data in Strings and Arrays
CHAPTER 8 Debugging and Error Handling
CHAPTER 9 Managing State Information and Security
CHAPTER 10 Introduction to the Document Object Model (DOM)
CHAPTER 11 Creating Dynamic HTML (DHTML)
CHAPTER 12 Updating Web Pages with AJAX
APPENDIX A Building a Web Development Environment
APPENDIX B Introduction to PHP
APPENDIX C Working with Well-Formed Web Pages
APPENDIX D JavaScript Reference
APPENDIX E Solutions to Short Quizzes

Book Details

  • Paperback: 928 pages
  • Publisher: Course Technology; 5th Edition (February 2010)
  • Language: English
  • ISBN-10: 0538748877
  • ISBN-13: 978-0538748872
Note: There is a file embedded within this post, please visit this post to download the file.

Related Posts

Tidak ada komentar:

Posting Komentar