サクサク読めて、アプリ限定の機能も多数!
トップへ戻る
Nintendo Direct
www.informit.com
FT Press, an imprint of Pearson, publishes content from the world's best minds on the most important business and management topics. InformIT is the online presence of Pearson imprints focused on professional workforce topics including IT, business applications, and leadership. Informit.com/ftpress is your new home for shopping FT Press books and eBooks.
Featured Book Learn Python the Hard Way You Will Learn Python! In Learn Python the Hard Way, Fifth Edition, you'll learn Python by working through 60 lovingly crafted exercises. Read them. Type in the code. Run it. Fix your mistakes. Repeat. As you do, you'll learn how a computer works, how to solve problems, and how to enjoy programming...even when it's driving you crazy. Zed Shaw has created the
Erik Buck, author of Cocoa Design Patterns, talks with David Chisnall about the history of modern Apple development from it's NeXTSTEP beginnings to Cocoa and Objective-C today. Erik Buck is the co-author of Cocoa Design Patterns and a long-time Objective-C programmer. I talked to him about how he's seen the Cocoa platform evolve from OpenStep, and where he sees it going in the future. Although OS
Since its creation, the C language has been tightly tied to UNIX. C was designed as a portable assembly language for reimplementing UNIX, to make it easier to port to different platforms. In 1984, Richard Stallman began the GNU (GNU’s Not UNIX) Project to provide a clone of the UNIX operating system using entirely Free Software. Because a C compiler is a core component of any UNIX-like operating s
Description Copyright 2005 Dimensions: 7" x 9-1/2" Pages: 720 Edition: 1st Book ISBN-10: 0-13-147149-X ISBN-13: 978-0-13-147149-8 PHP and ASP/ASP.NET have emerged as the two primary applicationdevelopment frameworks for developing web applications. PHP is opensource, and it is the most popular Apache module in use, by far. This bookcovers the key topics that developers familiar with basic PHP synt
Description Copyright 2004 Dimensions: 7" x 9-1/4" Pages: 752 Edition: 1st Book ISBN-10: 0-13-145348-3 ISBN-13: 978-0-13-145348-7 A programmer wanting to understand the workings of the Linux VM today literally has no choice but to study the kernel source code, line-by-line - an excruciatingly difficult and time-consuming task. This book dedicates itself to explaining, in detail, how the memory man
Part 1 and Part 2 of this series pointed out some simple ways of writing security holes in C code, and discussed how to avoid them. This article concludes the series with a look at the most common source of security issues in C code—buffer handling—and some slightly more advanced techniques for introducing and avoiding security problems. Strings in C are a perennial cause of problems. When C was c
In part 1 of this series, we looked at some of the problems that C causes with novice programmers, related to error checking and variable initialization. This week we'll dig a bit deeper and see how C handles integer values—an unexpected cause of security holes—and look at how we can build some less error-prone memory management routines on top of C. If you're used to high-level languages, C's sup
Use of the C programming language is often blamed for insecure code. This is not entirely a valid accusation; projects like OpenBSD show that it is possible to write secure code in C. The problem with C, in this respect, is the same as the problem with assembly-language programming: The language exposes all of the features of the architecture to you, but little else. It provides all the features y
This PDF will be accessible from your Account page after purchase and requires PDF reading software, such as Acrobat® Reader®. The eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours. Watermarked eBook FAQ Description Copyright 2009 Edition: 1st eBook (Watermarked) ISBN-10: 0-321-55351-9 ISBN-13: 978-0-32
What does a software architect do? By Oliver GoldmanApr 1, 2024Oliver Goldman breaks down the definition of a software architect, and reviews some common tools and practices that potential architects will want to study. What is a software catalog, and why should we have one? By Oliver GoldmanMar 29, 2024Oliver Goldman explains how a software catalog can improve efficiency, defines four requirement
I talked a bit about the low-level virtual machine (LLVM) when comparing open source compilers. Since then, I’ve become involved with the LLVM project, working on code generation for the Objective-C language. In this article, I’ll give you a more in-depth overview of how LLVM works. LLVM is a virtual machine infrastructure that doesn’t provide any of the high-level features you’d find in something
Scott Stevenson interviews Aaron Hillegass about the new edition of Aaron's book, programmers' fear of the NIB file, and why there aren't more Macs in corporate America. Scott Stevenson: What sort of experience should a developer already have before reading Cocoa Programming for Mac OS X? Do they need to know anything about using Apple's development tools or Objective-C? Aaron Hillegass: One of th
Andrew Binstock and Donald Knuth converse on the success of open source, the problem with multicore architecture, the disappointing lack of interest in literate programming, the menace of reusable code, and that urban legend about winning a programming contest with a single compilation. Andrew Binstock: You are one of the fathers of the open-source revolution, even if you aren’t widely heralded as
Easily one of the most exciting new APIs included with Leopard is Core Animation. With Core Animation, developers can now easily add fluid animation to their applications without having to delve too deeply into the world of OpenGL. Software developer Marcus Zarra walks you through some of the basics of Core Animation and how they can be applied to a normal Cocoa application. Apple defines Core Ani
David Chisnall posits that the more programming languages you know, the better. The point is not to stuff your head with language rules. Rather, he explains how being able to read multiple languages, even if you never code in them, can help you to select the best possible tool for each coding need — and understand the limitations of the tools you're using. Learning foreign languages helps to broad
Author's Note: The examples for this section are written to the latest published ISO standard for the C programming language, commonly known as C99. All POSIX-compliant systems, including any that ship with GCC, should include an executable called c99, which can be used to compile them using the command 'c99 {sourcefile}'. A working knowledge of C99 is considered a pre-requisite of this tutorial,
Google is a very sophisticated search engine, but most users don’t use its full power. The average user enters a keyword or two into Google’s search box, clicks the Search button, and waits for Google to display the first page of search results. This is a rather brute-force method of searching, unfortunately, and typically generates a ton of mostly unwanted results. There is a better way to search
IBM Press is the official imprint of IBM retail books for students and business and technical professionals. With books designed to help users master the wide range of IBM products and services, architectures, and business solutions, IBM Press books are an informative resource for knowledge that's critical for today's IT and business professionals. IBM experts and industry innovators write and con
It’s very easy to make accurate predictions about the future of technology. Stuff will get smaller, faster, and cheaper. This has been true for centuries and is unlikely to change—at least until we start running out of oil. Making interesting and accurate predictions is somewhat more difficult. One trick employed by many futurists is to predict as many things as possible, and then remind people of
OpenVPN is a tried and true VPN solution. It's totally secure and infinitely configurable. You can install and run this software without relying on a third party, but the fact that it’s open source and free is what really makes it stand out. OpenVPN can be a little daunting to configure the first time you jump into it, but once you get your configuration worked out, it’s a pleasure to use. After y
Cross site scripting (XSS) attacks are often seen as a powerless hack. While this is true in some cases, for the most part the impact of an XSS vulnerability is left up to the imagination and talent of the attacker. In this article I am going to look at a real-life XSS attack and how it was used to bypass the authentication scheme of an online web application I was asked to test. In this case, the
Featured Book Deploying Juniper Data Centers with EVPN VXLAN Learn to deploy Juniper Data Centers with EVPN VXLAN Aninda Chatterjee's straightforward prose and industry experience give you the foundational knowledge necessary for Juniper Data Center certification from the JNCIA-DC to the JNCIE-DC. Master the only intent-based multivendor solution for deploying and monitoring EVPN-based VXLAN fabri
Que, a publishing imprint of Pearson, provides practical advice on the tools you need to enhance your personal and professional life. Featured Series My...—Full-Color, Step-by-Step Guides The "My..." series is a visually rich, task-based series to help you get up and running with your new device and technology and tap into some of the hidden, or less obvious features. This series also includes "Fo
Sams Publishing was developed to provide content for anyone who wanted to learn new technologies. Sams is now a part of Pearson, the world's largest learning company. Pearson will continue the Sams tradition of delivering trusted and quality content and resources to help you get started with new technologies and programming languages. Featured Series Titles in the Sams Teach Yourself series are ca
The idea (and the last part of the name) for CSS sprites originates in the early days of video games, when memory and speed were at a premium. To overcome system limitations, video game producers would lay out the thousands of small graphics used to create a game into a grid and then display each "sprite" as needed, masking out all but the needed part of the larger image. Using CSS sprites takes a
Featured Book The AI Revolution in Networking, Cybersecurity, and Emerging Technologies The AI Revolution is Here. AI is having a profound impact on nearly every sector of the workforce. Huge professional and financial opportunities await in the key domains of computer networking, cybersecurity, IoT, and cloud computing. The AI Revolution in Networking, Cybersecurity, and Emerging Technologies wil
Featured Book Programming: Principles and Practice Using C++ An Introduction to Programming by the Inventor of C++ The Third Edition will help anyone who is willing to work hard to learn the fundamental principles of programming and develop the practical skills needed for programming in the real world. Previous editions have been used successfully by many thousands of students. Buy the Book + eBoo
次のページ
このページを最初にブックマークしてみませんか?
『InformIT: The Trusted Technology Learning Source』の新着エントリーを見る
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く