- Table View
- List View
How do the experts solve difficult problems in software development? In this unique and insightful book, leading computer scientists offer case studies that reveal how they found unusual, carefully designed solutions to high-profile projects. You will be able to look over the shoulder of major coding and design experts to see problems through their eyes. This is not simply another design patterns book, or another software engineering treatise on the right and wrong way to do things. The authors think aloud as they work through their project's architecture, the tradeoffs made in its construction, and when it was important to break rules. This book contains 33 chapters contributed by Brian Kernighan, Karl Fogel, Jon Bentley, Tim Bray, Elliotte Rusty Harold, Michael Feathers, Alberto Savoia, Charles Petzold, Douglas Crockford, Henry S. Warren, Jr., Ashish Gulhati, Lincoln Stein, Jim Kent, Jack Dongarra and Piotr Luszczek, Adam Kolawa, Greg Kroah-Hartman, Diomidis Spinellis, Andrew Kuchling, Travis E. Oliphant, Ronald Mak, Rogerio Atem de Carvalho and Rafael Monnerat, Bryan Cantrill, Jeff Dean and Sanjay Ghemawat, Simon Peyton Jones, Kent Dybvig, William Otte and Douglas C. Schmidt, Andrew Patzer, Andreas Zeller, Yukihiro Matsumoto, Arun Mehta, TV Raman, Laura Wingerd and Christopher Seiwald, and Brian Hayes. Beautiful Code is an opportunity for master coders to tell their story. All author royalties will be donated to Amnesty International.
Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thinking about, it's also a fascinating topic. Criminals succeed by exercising enormous creativity, and those defending against them must do the same. Beautiful Security explores this challenging subject with insightful essays and analysis on topics that include: The underground economy for personal information: how it works, the relationships among criminals, and some of the new ways they pounce on their prey How social networking, cloud computing, and other popular trends help or hurt our online security How metrics, requirements gathering, design, and law can take security to a higher level The real, little-publicized history of PGP This book includes contributions from: Peiter "Mudge" Zatko Jim Stickley Elizabeth Nichols Chenxi Wang Ed Bellis Ben Edelman Phil Zimmermann and Jon Callas Kathy Wang Mark Curphey John McManus James Routh Randy V. Sabett Anton Chuvakin Grant Geyer and Brian Dunphy Peter Wayner Michael Wood and Fernando Francisco All royalties will be donated to the Internet Engineering Task Force (IETF).
New information technologies (IT) hold the promise of better health in a world increasingly coping with chronic illness. The miniaturization of ever-more powerful sensing devices, along with the collection, analysis, and sharing of data, support activities in homes and clinics that let patients have a greater role in their own health care. This article takes you on a tour of specific technologies, tools, and trends to help you understand what's been accomplished, what's feasible in the near future, and why some technologies seem to languish despite their apparent advantages. You'll also discover how these groundbreaking approaches can help lower the enormous health care costs in the US. Learn how devices and sensors are transforming medical equipment and helping self-monitoring go mainstream Understand how data is gathered, stored, and analyzed, as well as the role shared data plays in clinical research Explore the way IT helps medical teams coordinate, and how "telehealth" enables better patient treatment at home Learn how health IT helps empower patients by providing more transparency in the system Examine the standards in data storage and electronic health records, and weaknesses that need to be addressed in current systems
Many claims are made about how certain tools, technologies, and practices improve software development. But which claims are verifiable, and which are merely wishful thinking? In this book, leading thinkers such as Steve McConnell, Barry Boehm, and Barbara Kitchenham offer essays that uncover the truth and unmask myths commonly held among the software development community. Their insights may surprise you. Are some programmers really ten times more productive than others? Does writing tests first help you develop better code faster? Can code metrics predict the number of bugs in a piece of software? Do design patterns actually make better software? What effect does personality have on pair programming? What matters more: how far apart people are geographically, or how far apart they are in the org chart? Contributors include: Jorge Aranda Tom Ball Victor R. Basili Andrew Begel Christian Bird Barry Boehm Marcelo Cataldo Steven Clarke Jason Cohen Robert DeLine Madeline Diep Hakan Erdogmus Michael Godfrey Mark Guzdial Jo E. Hannay Ahmed E. Hassan Israel Herraiz Kim Sebastian Herzig Cory Kapser Barbara Kitchenham Andrew Ko Lucas Layman Steve McConnell Tim Menzies Gail Murphy Nachi Nagappan Thomas J. Ostrand Dewayne Perry Marian Petre Lutz Prechelt Rahul Premraj Forrest Shull Beth Simon Diomidis Spinellis Neil Thomas Walter Tichy Burak Turhan Elaine J. Weyuker Michele A. Whitecraft Laurie Williams Wendy M. Williams Andreas Zeller Thomas Zimmermann
The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and control to ordinary users.While this book is mostly about the technical promise of peer-to-peer, we also talk about its exciting social promise. Communities have been forming on the Internet for a long time, but they have been limited by the flat interactive qualities of email and Network newsgroups. People can exchange recommendations and ideas over these media, but have great difficulty commenting on each other's postings, structuring information, performing searches, or creating summaries. If tools provided ways to organize information intelligently, and if each person could serve up his or her own data and retrieve others' data, the possibilities for collaboration would take off. Peer-to-peer technologies along with metadata could enhance almost any group of people who share an interest--technical, cultural, political, medical, you name it.This book presents the goals that drive the developers of the best-known peer-to-peer systems, the problems they've faced, and the technical solutions they've found. Learn here the essentials of peer-to-peer from leaders of the field:Nelson Minar and Marc Hedlund of target="new">Popular Power, on a history of peer-to-peerClay Shirky of acceleratorgroup, on where peer-to-peer is likely to be headedTim O'Reilly of O'Reilly & Associates, on redefining the public's perceptionsDan Bricklin, cocreator of Visicalc, on harvesting information from end-usersDavid Anderson of SETI@home, on how SETI@Home created the world's largest computerJeremie Miller of Jabber, on the Internet as a collection of conversationsGene Kan of Gnutella and GoneSilent.com, on lessons from Gnutella for peer-to-peer technologiesAdam Langley of Freenet, on Freenet's present and upcoming architectureAlan Brown of Red Rover, on a deliberately low-tech content distribution systemMarc Waldman, Lorrie Cranor, and Avi Rubin of AT&T Labs, on the Publius project and trust in distributed systemsRoger Dingledine, Michael J. Freedman, andDavid Molnar of Free Haven, on resource allocation and accountability in distributed systemsRael Dornfest of O'Reilly Network and Dan Brickley of ILRT/RDF Web, on metadataTheodore Hong of Freenet, on performanceRichard Lethin of Reputation Technologies, on how reputation can be built onlineJon Udell ofBYTE and Nimisha Asthagiri andWalter Tuvell of Groove Networks, on securityBrandon Wiley of Freenet, on gateways between peer-to-peer systemsYou'll find information on the latest and greatest systems as well as upcoming efforts in this book.
This book is about the goals of peer-to-peer computer networking, its problems and solutions.
Poznaj techniki pracy guru programowania!Jak tworzy? czytelny i pozbawiony b??dów kod?W jaki sposób projektowa? architektur? systemów?Jak zbudowa? uniwersalne interfejsy u?ytkownika?Wbrew pozorom programowanie to nie tylko nauka ?cis?a, to tak?e sztuka! Trudna sztuka! Napisanie kodu poprawnie dzia?aj?cego czy kodu spe?niaj?cego oczekiwania u?ytkowników programu to niew?tpliwie wyzwanie! Wymaga bowiem doskona?ego zaplanowania architektury, skutecznej optymalizacji kodu ?ród?owego oraz umiej?tno?ci przewidywania potencjalnych problemów i ich odpowiednio wczesnej eliminacji. W?a?nie w tej ksi??ce prawdziwi mistrzowie programowania podziel? si? z Tob? swoimi do?wiadczeniami, przemy?leniami i spostrze?eniami dotycz?cymi tworzenia profesjonalnych rozwi?za?. Znajdziesz tu wiele praktycznych porad dotycz?cych pisania kodu, rozwi?zywania problemów programistycznych, projektowania architektury, tworzenia interfejsów u?ytkownika i pracy w zespole projektowym. Dowiesz si?, kiedy nale?y post?powa? dok?adnie wed?ug wskaza? metodologii, a kiedy "pój?cie na skróty" mo?e okaza? si? najlepszym rozwi?zaniem. Poznasz sposób my?lenia i zasady pracy najlepszych programistów ?wiata, dzi?ki czemu u?ytkownikom Twoich aplikacji zapewnisz maksymalny komfort.Korzystanie z wyra?e? regularnychDobór odpowiedniego poziomu abstrakcjiOcena jako?ci kodu ?ród?owegoTestowanie Techniki analizy sk?adniZabezpieczanie komunikacji sieciowejDostosowywanie architektury systemu do architektury komputerówPraca zespo?owaProjektowanie systemów w oparciu o komponenty OpenSourceUsuwanie b??dów U?atwianie pracy osobom niepe?nosprawnym Do??cz do grona mistrzów programowania!
Select your format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. To learn more about using Bookshare with your device, visit the "Using Bookshare" page in the Help Center.
Here is an overview of the specialized formats that Bookshare offers its members with links that go to the Help Center for more information.
- Bookshare Web Reader - a customized reading tool for Bookshare members offering all the features of DAISY with a single click of the "Read Now" link.
- DAISY (Digital Accessible Information System) - a digital book file format. DAISY books from Bookshare are DAISY 3.0 text files that work with just about every type of access technology that reads text. Books that contain images will have the download option of ‘DAISY Text with Images’.
- BRF (Braille Refreshable Format) - digital Braille for use with refreshable Braille devices and Braille embossers.
- MP3 (Mpeg audio layer 3) - Provides audio only with no text. These books are created with a text-to-speech engine and spoken by Kendra, a high quality synthetic voice from Ivona. Any device that supports MP3 playback is compatible.
- DAISY Audio - Similar to the Daisy 3.0 option above; however, this option uses MP3 files created with our text-to-speech engine that utilizes Ivona's Kendra voice. This format will work with Daisy Audio compatible players such as Victor Reader Stream and Read2Go.