Programming for Software Sharing:
Traditional network television programming has always followed the same script: executives approve a pilot, order a trial number of episodes, and broadcast them, expecting viewers to watch a given show on their television sets at the same time every week. But then came Netflix´s House of Cards. Netflix gauged the show´s potential from data it had gathered about subscribers´ preferences, ordered two seasons without seeing a pilot, and uploaded the first thirteen episodes all at once for viewers to watch whenever they wanted on the devices of their choice. In this book, Michael Smith and Rahul Telang, experts on entertainment analytics, show how the success of House of Cards upended the film and TV industries - and how companies like Amazon and Apple are changing the rules in other entertainment industries, notably publishing and music. We´re living through a period of unprecedented technological disruption in the entertainment industries. Just about everything is affected: pricing, production, distribution, piracy. Smith and Telang discuss niche products and the long tail, product differentiation, price discrimination, and incentives for users not to steal content. To survive and succeed, businesses have to adapt rapidly and creatively. Smith and Telang explain how. How can companies discover who their customers are, what they want, and how much they are willing to pay for it? Data. The entertainment industries, must learn to play a little ´´moneyball.´´ The bottom line: follow the data. PLEASE NOTE: When you purchase this title, the accompanying reference material will be available in your Library section along with the audio. 1. Language: English. Narrator: Timothy Andrés Pabon. Audio sample: http://samples.audible.de/bk/brll/008542/bk_brll_008542_sample.mp3. Digital audiobook in aax.
Have you been coding for a while now, but could still use some useful Java coding tips? Do you have some basic knowledge with Java and want to learn more? If you answered yes to any of these questions, then look no further - this book is for you. In this definitive Java intermediate level guide, you´re about to discover that Java is a program that allows you to use different techniques to do different things. Each aspect of Java is going to help you to better understand how the program is going to work so that you are able to use Java so that it can benefit you better. Here is a preview of what you´ll learn.... Building custom code that is going to assist you in a way that writing normal code would not Simplifying your code that helps you so that you can make your code easier to understand not only to you but to your user as well Using multiple environments that is going to be best for you because they are going to show you how your code is going to work with different applications Sharing documents with other people in live time so that what is changed by them is added to what you have - without having to worry about not being on the same page And much, much more! Other benefits of owning this book: Gain more knowledge about the capabilities of the Java programming language Learn the intermediate essentials of Java in order to gain the confidence to tackle more advanced topics Gain the critical steps in your path towards Java programming mastery By implementing the lessons in this book, not only would you learn one of today´s popular computer language, but it will serve as your guide in accomplishing all your Java goals - whether as a fun hobby or as a starting point into a successful and longterm programming career. 1. Language: English. Narrator: JD Kelly. Audio sample: http://samples.audible.de/bk/acx0/083155/bk_acx0_083155_sample.mp3. Digital audiobook in aax.
DNS and BIND tells you everything you need to work with one of the Internet´s fundamental building blocks: the distributed host information database that´s responsible for translating names into addresses, routing mail to its proper destination, and even listing phone numbers with the new ENUM standard. This book brings you up-to-date with the latest changes in this crucial service. The fifth edition covers BIND 9.3.2, the most recent release of the BIND 9 series, as well as BIND 8.4.7. BIND 9.3.2 contains further improvements in security and IPv6 support, and important new features such as internationalized domain names, ENUM (electronic numbering), and SPF (the Sender Policy Framework). Whether you´re an administrator involved with DNS on a daily basis or a user who wants to be more informed about the Internet and how it works, you´ll find that this book is essential reading. Topics include: * What DNS does, how it works, and when you need to use it * How to find your own place in the Internet´s namespace * Setting up name servers * Using MX records to route mail * Configuring hosts to use DNS name servers * Subdividing domains (parenting) * Securing your name server: restricting who can query your server, preventing unauthorized zone transfers, avoiding bogus servers, etc. * The DNS Security Extensions (DNSSEC) and Transaction Signatures (TSIG) * Mapping one name to several servers for load sharing * Dynamic updates, asynchronous notification of change to a zone, and incremental zone transfers * Troubleshooting: using nslookup and dig, reading debugging output, common problems * DNS programming using the resolver library and Perl´s Net::DNS module
HIGHLIGHT C++ Concurrency in Action is the first book to market to show how to take advantage of the new C++ Standard and how to write robust multi-threaded applications in C++. DESCRIPTION With the new C++ Standard and Technical Report 2 (TR2), multi-threading is coming to C++ in a big way. TR2 will provide higher-level synchronization facilities that allow for a much greater level of abstraction, and make programming multi-threaded applications simpler and safer. As a guide and reference to the new concurrency features in the upcoming C++ Standard and TR2, this book is invaluable for existing programmers familiar with writing multi-threaded code in C++ using platform-specific APIs, or in other languages, as well as C++ programmers who have never written multithreaded code before. KEY POINTS When and when not to use concurrency Concurrency and multi-threading in C++ Concurrency support in the New Standard How to improve performance with concurrency How to manage concurrency Problems and solutions in sharing data Synchronization and why we need it Memory model details Product Description HIGHLIGHT C++ Concurrency in Action is the first book to market to show how to take advantage of the new C++ Standard and how to write robust multi-threaded applications in C++. DESCRIPTION With the new C++ Standard and Technical Report 2 (TR2), multi-threading is coming to C++ in a big way. TR2 will provide higher-level synchronization facilities that allow for a much greater level of abstraction, and make programming multi-threaded applications simpler and safer. As a guide and reference to the new concurrency features in the upcoming C++ Standard and TR2, this book is invaluable for existing programmers familiar with writing multi-threaded code in C++ using platform-specific APIs, or in other languages, as well as C++ programmers who have never written multithreaded code before. KEY POINTS When and when not to use concurrency Concurrency and multi-threading in C++ Concurrency support in the New Standard How to improve performance with concurrency How to manage concurrency Problems and solutions in sharing data Synchronization and why we need it Memory model details HIGHLIGHT C++ Concurrency in Action is the first book to market to show how to take advantage of the new C++ Standard and how to write robust multi-threaded applications in C++. DESCRIPTION With the new C++ Standard and Technical Report 2 (TR2), multi-threading is coming to C++ in a big way. TR2 will provide higher-level synchronization facilities that allow for a much greater level of abstraction, and make programming multi-threaded applications simpler and safer. As a guide and reference to the new concurrency features in the upcoming C++ Standard and TR2, this book is invaluable for existing programmers familiar with writing multi-threaded code in C++ using platform-specific APIs, or in other languages, as well as C++ programmers who have never written multithreaded code before. KEY POINTS - When and when not to use concurrency - Concurrency and multi-threading in C++ - Concurrency support in the New Standard - How to improve performance with concurrency - How to manage concurrency - Problems and solutions in sharing data - Synchronization and why we need it - Memory model details
Bill Karwin has helped thousands of people write better SQL and build stronger relational databases. Now he´s sharing his collection of antipatterns - the most common errors he´s identified in those thousands of requests for help. Most developers aren´t SQL experts, and most of the SQL that gets used is inefficient, hard to maintain, and sometimes just plain wrong. This book shows you all the common mistakes, and then leads you through the best fixes. What´s more, it shows you what´s behind these fixes, so you´ll learn a lot about relational databases along the way. Each chapter in this book helps you identify, explain, and correct a unique and dangerous antipattern. The four parts of the book group the anti patterns in terms of logical database design, physical database design, queries, and application development. The chances are good that your application´s database layer already contains problems such as Index Shotgun, Keyless Entry, Fear of the Unknown, and Spaghetti Query. This book will help you and your team find them. Even better, it will also show you how to fix them, and how to avoid these and other problems in the future. SQL Antipatterns gives you a rare glimpse into an SQL expert´s playbook. Now you can stamp out these common database errors once and for all. Whatever platform or programming language you use, whether you´re a junior programmer or a Ph.D., SQL Antipatterns will show you how to design and build databases, how to write better database queries, and how to integrate SQL programming with your application like an expert. You´ll also learn the best and most current technology for full-text search, how to design code that is resistant to SQL injection attacks, and other techniques for success.
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier´s Secrets and Lies and Applied Cryptography! Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You´ll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems security managers, you´ll find tools and a framework for structured thinking about what can go wrong. Software developers, you´ll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you´ll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling. * Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs * Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric * Provides effective approaches and techniques that have been proven at Microsoft and elsewhere * Offers actionable how-to advice not tied to any specific software, operating system, or programming language * Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you´re ready with Threat Modeling: Designing for Security.
Jaron Lanier, a Silicon Valley visionary since the 1980s, was among the first to predict the revolutionary changes the World Wide Web would bring to commerce and culture. Now, in his first book, written more than two decades after the Web was created, Lanier offers this provocative and cautionary look at the way it is transforming our lives for better and for worse. The current design and function of the Web have become so familiar that it is easy to forget that they grew out of programming decisions made decades ago. The Web´s first designers made crucial choices (such as making one´s presence anonymous) that have had enormous and often unintended consequences. Whats more, these designs quickly became locked in, a permanent part of the Web´s very structure. Lanier discusses the technical and cultural problems that can grow out of poorly considered digital design and warns that our financial markets, and sites like Wikipedia, Facebook, and Twitter, are elevating the wisdom of mobs and computer algorithms over the intelligence and judgment of individuals. Lanier also shows: How 1960s antigovernment paranoia influenced the design of the online world and enabled trolling and trivialization in online discourse How file sharing is killing the artistic middle class How a belief in a technological rapture motivates some of the most influential technologists Why a new humanistic technology is necessary Controversial and fascinating, You Are Not a Gadget is a deeply felt defense of the individual from an author uniquely qualified to comment on the way technology interacts with our culture. 1. Language: English. Narrator: Rob Shapiro. Audio sample: http://samples.audible.de/bk/rand/002141/bk_rand_002141_sample.mp3. Digital audiobook in aax.
´´Eric Evans has written a fantastic book on how you can make the design of your software match your mental model of the problem domain you are addressing. ´´His book is very compatible with XP. It is not about drawing pictures of a domain; it is about how you think of it, the language you use to talk about it, and how you organize your software to reflect your improving understanding of it. Eric thinks that learning about your problem domain is as likely to happen at the end of your project as at the beginning, and so refactoring is a big part of his technique. ´´The book is a fun read. Eric has lots of interesting stories, and he has a way with words. I see this book as essential reading for software developers-it is a future classic.´´ - Ralph Johnson , author of Design Patterns ´´If you don´t think you are getting value from your investment in object-oriented programming, this book will tell you what you´ve forgotten to do. ´´Eric Evans convincingly argues for the importance of domain modeling as the central focus of development and provides a solid framework and set of techniques for accomplishing it. This is timeless wisdom, and will hold up long after the methodologies du jour have gone out of fashion.´´ - Dave Collins , author of Designing Object-Oriented User Interfaces ´´Eric weaves real-world experience modeling-and building-business applications into a practical, useful book. Written from the perspective of a trusted practitioner, Eric´s descriptions of ubiquitous language, the benefits of sharing models with users, object life-cycle management, logical and physical application structuring, and the process and results of deep refactoring are major contributions to our field.´´ - Luke Hohmann , author of Beyond Software Architecture This book belongs on the shelf of every thoughtful software developer. --Kent Beck What Eric has managed to capture is a part of the design process that experienced object designers have always used, but that we have been singularly unsuccessful as a group in conveying to the rest of the industry. We´ve given away bits and pieces of this knowledge...but we´ve never organized and systematized the principles of building domain logic. This book is important. --Kyle Brown, author of Enterprise Java(TM) Programming with IBM® WebSphere® The software development community widely acknowledges that domain modeling is central to software design. Through domain models, software developers are able to express rich functionality and translate it into a software implementation that truly serves the needs of its users. But despite its obvious importance, there are few practical resources that explain how to incorporate effective domain modeling into the software development process. Domain-Driven Design fills that need. This is not a book about specific technologies. It offers readers a systematic approach to domain-driven design, presenting an extensive set of design best practices, experience-based techniques, and fundamental principles that facilitate the development of software projects facing complex domains. Intertwining design and development practice, this book incorporates numerous examples based on actual projects to illustrate the application of domain-driven design to real-world software development. Readers learn how to use a domain model to make a complex development effort more focused and dynamic. A core of best practices and standard patterns provides a common language for the development team. A shift in emphasis--refactoring not just the code but the model underlying the code--in combination with the frequent iterations of Agile development leads to deeper insight into domains and enhanced communication between domain expert and programmer. Domain-Dr