Monday, 08 June 2015 |
Edited by Jonathan Follett with the subtitle "UX for Genomics, Robotics, and the Internet of Things" this is a collection of essays in which designers, engineers, and researchers discuss their approaches to experience design for groundbreaking technologies. Design not only provides the framework for how technology works and how it’s used, but also places it in a broader context that includes the total ecosystem with which it interacts and the possibility of unintended consequences. If you’re a UX designer or engineer open to complexity and dissonant ideas, this book is a revelation.
<ASIN:1491902515>
|
Friday, 05 June 2015 |
Turn your R code into packages that others can easily download and use. Hadley Wickham shows you how to bundle reusable R functions, sample data, and documentation together by applying his package development philosophy. In the process, you’ll work with devtools, roxygen, and testthat, a set of R packages that automate common development tasks.
<ASIN:1491910593>
|
Thursday, 04 June 2015 |
<ASIN:1783287535>
|
Wednesday, 03 June 2015 |
A practical guide to using Apache Storm for the real-world tasks associated with processing and analyzing real-time data streams. Sean T. Allen, Matthew Jankowski and Peter Pathirana start by building a solid foundation of Storm essentials so that you learn how to think about designing Storm solutions the right way from day one. But it quickly dives into real-world case studies that will bring the novice up to speed with real-time event processing using Storm.
<ASIN:1617291897>
|
Tuesday, 02 June 2015 |
As part of the "Pocket Primer" series, Oswald Campesato provides an overview jQuery with and tutorial videos on using it, covering jQuery UI Controls, jQueryMobile, HTML5 Technologies with jQuery, and more. It is primarily for self-directed learners who are comfortable with HTML/CSS/Javascript and who want to learn jQuery. It also has coverage of CSS3, HTML5 Canvas and PhoneGap. Includes companion DVD.
<ASIN:1938549147>
|
Monday, 01 June 2015 |
As leaders in the design and creation of security products authors Qing Li and Gregory Clark deliver unparalleled insight into the development of comprehensive and focused enterprise security solutions. In this handbook for security in modern times, they walk you through the process of translating your security goals into specific security technology domains, formulating the best deployment strategies, and verifying the solution by analyzing security incidents and divulging hidden breaches.
<ASIN:1118896696>
|
Wednesday, 27 May 2015 |
This hands-on guide provides an easy, step-by-step approach to installing, using, and maintaining these popular relational database engines. Author Russell Dyer, Curriculum Manager at MariaDB and former editor of the MySQL Knowledge Base, takes you through database design and the basics of data management and manipulation, using real-world examples and many practical tips. Exercises and review questions help you practice what you’ve just learned.
<ASIN:1449362907>
|
Tuesday, 26 May 2015 |
With the subtitle "Principles and best practices of scalable realtime data systems", this book teaches you to build big data systems using an architecture that takes advantage of clustered hardware along with new tools designed specifically to capture and analyze web-scale data. Nathan Marz and James Warren describe a scalable, easy-to-understand approach to big data systems that can be built and run by a small team. Following a realistic example, they guide readers through the theory of big data systems, how to implement them in practice, and how to deploy and operate them once they're built.
<ASIN:1617290343>
|
Monday, 25 May 2015 |
This is a special 15th Anniversary hardcover edition of security expert Bruce Schneier's book subtitled "Digital Security in a Networked World" in which provides a practical, straight–forward guide to achieving security throughout computer networks. No theory, no math, no fiction of what should be working but isn′t, just the facts. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. Schneier′s tutorial on just what cryptography (a subset of computer security) can and cannot do for them, has received far–reaching praise from both the technical and business community.
<ASIN:1119092434>
|
Friday, 22 May 2015 |
With AngularJS, you can quickly build client-side applications that run well on any desktop or mobile platform, using REST web services for backend processes. You may have heard that the learning curve for this JavaScript MVC framework is too steep, but that’s not the case. Ken Williamson provides a hands-on approach to learning AngularJS in which you gain direct experience with AngularJS by building a sample application.
<ASIN:1491916753>
|
Thursday, 21 May 2015 |
Offers a fresh banquet of delicious cutting-edge iOS programming recipes for projects both big and small. Renowned iOS programming expert Erica Sadun presents innovative ways to make the most of AVFoundation, Text Kit, animation, adaptive interface programming, with code for creating rich, robust. apps. As with her other iOS titles, this pragmatic guide translates modern best practices into working code, distilling key concepts into recipes you can understand and build on.
<ASIN:0134086228>
|
Wednesday, 20 May 2015 |
As a web designer, you encounter tough choices when it comes to weighing aesthetics and performance. Good content, layout, images, and interactivity are essential for engaging your audience, and each of these elements have an enormous impact on page load time and the end-user experience. In this practical book, Lara Hogan helps you approach projects with page speed in mind, showing you how to test and benchmark which design choices are most critical.
<ASIN:1491902515>
|
|
|