Sebanyak 55 item atau buku ditemukan

Extreme Programming Explained

Embrace Change

Beck wants to encourage readers to re-examine their preconceptions of how software development ought to occur. He does just that in this overview of Extreme Programming, a controversial approach to software development which challenges the notion that the cost of changing a piece of software must rise dramatically over the course of time.

You may love XP, or you may hate it, but "Extreme Programming Explained" will force you to take a fresh look at how you develop software. 0201616416B04062001

Facts and Fallacies of Software Engineering

The practice of building software is a “new kid on the block” technology. Though it may not seem this way for those who have been in the field for most of their careers, in the overall scheme of professions, software builders are relative “newbies.” In the short history of the software field, a lot of facts have been identified, and a lot of fallacies promulgated. Those facts and fallacies are what this book is about. There’s a problem with those facts–and, as you might imagine, those fallacies. Many of these fundamentally important facts are learned by a software engineer, but over the short lifespan of the software field, all too many of them have been forgotten. While reading Facts and Fallacies of Software Engineering , you may experience moments of “Oh, yes, I had forgotten that,” alongside some “Is that really true?” thoughts. The author of this book doesn’t shy away from controversy. In fact, each of the facts and fallacies is accompanied by a discussion of whatever controversy envelops it. You may find yourself agreeing with a lot of the facts and fallacies, yet emotionally disturbed by a few of them! Whether you agree or disagree, you will learn why the author has been called “the premier curmudgeon of software practice.” These facts and fallacies are fundamental to the software building field–forget or neglect them at your peril!

Regarding the controversial and thought-provoking assessments in this handbook, many software professionals might disagree with the authors, but all will embrace the debate.

Python Essential Reference

Presents a guide to the features and library modules of the Python programming language.

Presents a guide to the features and library modules of the Python programming language.

The Eclipse Graphical Editing Framework (GEF)

A hands-on tutorial for new Eclipse GEF developers, plus a complete API reference and troubleshooting guide for all GEF developers * *A step-by-step walkthrough of all major GEF sub-products, driven by a realistic, running example. *How to design, develop and maintain commercial-quality GEF projects, avoid common pitfalls, and take full advantage of GEF's features. *Includes coverage of implementing GEF Usability and GEF Accessibility. *Detailed, example-rich coverage of testing GEF applications. As the popularity of Eclipse and SWT-based applications continues to grow, product specifications are requiring richer graphical interfaces. When standard widgets such as text editors, combo boxes and trees aren't enough, graphics may be the best choice to display information. In this practical, hands-on guide, three leading Eclipse graphics experts covers everything developers need to build the rich, visual interfaces they want. The authors introduce all three graphics frameworks available to Eclipse developers, Draw2D, Zest, and GEF, discussing the pros and cons of each. They carefully introduce each framework's API, walk through building a robust application with Draw2D, and then refactor their example application twice: first with Zest, and then with GEF. Coverage includes: Draw2D figures, layouts, connections, routing algorithms, and text support; Zest graphing and layout algorithms; GEF controllers, commands, requests, palette and tools, accessibility, usability; and much more. The book also includes a full chapter of advanced techniques, as well as practical troubleshooting guidance.

The book also includes a full chapter of advanced techniques, as well as practical troubleshooting guidance.

Enterprise Modeling with UML

Designing Successful Software Through Business Analysis

"Written for practitioners interested in business systems and software applications, this book fuses object technology, workflow, data warehousing, and distributed system concepts into a coherent model that has been successfully implemented worldwide. Enterprises using these concepts are well positioned to thrive in the emerging global business arena. Enterprise Modeling with UML describes specific methods for modeling large, complex, and adaptable enterprise systems, using the Unified Modeling Language (UML) to illustrate its concepts and components." "Enterprise Modeling with UML addresses in detail the four key elements of an enterprise model: purpose, processes, entities, and organization. Written from a business perspective rather than technical standpoint, the book covers such vital topics as: formalizing business concepts, models, and components; creating and communicating the value of an enterprise; designing, scheduling, tracking, and automating processes; describing business entities in organizational contexts; modeling hierarchical and networked organizations and coordinating such organizations to form value chains; and building adaptable enterprise systems from reusable software components." "The accompanying CD-ROM contains Java and XML examples of many of the ideas and models presented in the book."--BOOK JACKET.Title Summary field provided by Blackwell North America, Inc. All Rights Reserved

Written for practitioners interested in business systems and software applications, this book fuses object technology, workflow, data warehousing, and distributed system concepts into a coherent model that has been successfully implemented ...

Implementing ADSL

"From service architecture to applications, standards to business case, Implementing ADSL delivers a complete, up-to-date overview of what it takes to deploy ADSL. Written by a leading authority in the field, this book will be equally valuable for decision-makers and implementers in both service provider and enterprise IT organizations." "Whether you are a network manager, architect, administrator, or engineer, Implementing ADSL brings together crucial information and insight for making the best possible decisions about today's most important access technology." --Book Jacket.

Written by a leading authority in the field, this book will be equally valuable for decision-makers and implementers in both service provider and enterprise IT organizations.

Crimeware

Understanding New Attacks and Defenses

“This book is the most current and comprehensive analysis of the state of Internet security threats right now. The review of current issues and predictions about problems years away are critical for truly understanding crimeware. Every concerned person should have a copy and use it for reference.” —Garth Bruen, Project KnujOn Designer There’s a new breed of online predators—serious criminals intent on stealing big bucks and top-secret information—and their weapons of choice are a dangerous array of tools called “crimeware.” With an ever-growing number of companies, organizations, and individuals turning to the Internet to get things done, there’s an urgent need to understand and prevent these online threats. Crimeware: Understanding New Attacks and Defenses will help security professionals, technical managers, students, and researchers understand and prevent specific crimeware threats. This book guides you through the essential security principles, techniques, and countermeasures to keep you one step ahead of the criminals, regardless of evolving technology and tactics. Security experts Markus Jakobsson and Zulfikar Ramzan have brought together chapter contributors who are among the best and the brightest in the security industry. Together, they will help you understand how crimeware works, how to identify it, and how to prevent future attacks before your company’s valuable information falls into the wrong hands. In self-contained chapters that go into varying degrees of depth, the book provides a thorough overview of crimeware, including not only concepts prevalent in the wild, but also ideas that so far have only been seen inside the laboratory. With this book, you will Understand current and emerging security threats including rootkits, bot networks, spyware, adware, and click fraud Recognize the interaction between various crimeware threats Gain awareness of the social, political, and legal implications of these threats Learn valuable countermeasures to stop crimeware in its tracks, now and in the future Acquire insight into future security trends and threats, and create an effective defense plan With contributions by Gary McGraw, Andrew Tanenbaum, Dave Cole, Oliver Friedrichs, Peter Ferrie, and others.

With this book, you will Understand current and emerging security threats including rootkits, bot networks, spyware, adware, and click fraud Recognize the interaction between various crimeware threats Gain awareness of the social, political ...

The Art of UNIX Programming

The Art of UNIX Programming poses the belief that understanding the unwritten UNIX engineering tradition and mastering its design patterns will help programmers of all stripes to become better programmers. This book attempts to capture the engineering wisdom and design philosophy of the UNIX, Linux, and Open Source software development community as it has evolved over the past three decades, and as it is applied today by the most experienced programmers. Eric Raymond offers the next generation of "hackers" the unique opportunity to learn the connection between UNIX philosophy and practice through careful case studies of the very best UNIX/Linux programs.

This book attempts to capture the engineering wisdom and design philosophy of the UNIX, Linux, and Open Source software development community as it has evolved over the past three decades, and as it is applied today by the most experienced ...

Designing Enterprise Applications with the J2EE Platform

The Java 2 Platform, Enterprise Edition, offers developers a simplified, component-based approach to creating applications for intranets and the Internet. As part of the highly regarded Java BluePrints program, Designing Enterprise Applications with the J2EE Platform, Second Edition, describes the key architectural and design issues in applications supported by the J2EE platform and offers practical guidelines for both architects and developers. It explores key J2EE platform features such as Java servlets, JavaServer Pages, and Enterprise JavaBeans component models, as well as the JDBC API, Java Message Service API, and JEE Connector Architecture. It also discusses security, deployment, transaction management, internationalization, and other important issues for today's applications.

As part of the highly regarded Java BluePrints program, Designing Enterprise Applications with the J2EE Platform, Second Edition, describes the key architectural and design issues in applications supported by the J2EE platform and offers ...

C++ Network Programming, Volume 2

Systematic Reuse with ACE and Frameworks

Do you need to develop flexible software that can be customized quickly? Do you need to add the power and efficiency of frameworks to your software? The ADAPTIVE Communication Environment (ACE) is an open-source toolkit for building high-performance networked applications and next-generation middleware. ACE's power and flexibility arise from object-oriented frameworks, used to achieve the systematic reuse of networked application software. ACE frameworks handle common network programming tasks and can be customized using C++ language features to produce complete distributed applications. C++ Network Programming, Volume 2, focuses on ACE frameworks, providing thorough coverage of the concepts, patterns, and usage rules that form their structure. This book is a practical guide to designing object-oriented frameworks and shows developers how to apply frameworks to concurrent networked applications. C++ Networking, Volume 1, introduced ACE and the wrapper facades, which are basic network computing ingredients. Volume 2 explains how frameworks build on wrapper facades to provide higher-level communication services. Written by two experts in the ACE community, this book contains: An overview of ACE frameworks Design dimensions for networked services Descriptions of the key capabilities of the most important ACE frameworks Numerous C++ code examples that demonstrate how to use ACE frameworks C++ Network Programming, Volume 2, teaches how to use frameworks to write networked applications quickly, reducing development effort and overhead. It will be an invaluable asset to any C++ developer working on networked applications.

Written by two experts in the ACE community, this book contains: An overview of ACE frameworks Design dimensions for networked services Descriptions of the key capabilities of the most important ACE frameworks Numerous C++ code examples ...