-
Author Ed Wright , Peter Scott
"This book was a joy to read. It covered all sorts of techniques for debugging, including 'defensive' paradigms that will eliminate bugs in the first place. As coach of the USA Programming Team, I find the most difficult thing to teach is debugging. This is the fi....
Release Date 2001/03 -
CGI Programming with Perl, 2nd Edition
Author Gunther Birznieks , Shishir Gundavaram , Scott Guelich
Programming on the Web today can involve any of several technologies, but the Common Gateway Interface (CGI) has held its ground as the most mature method--and one of the most powerful ones--of providing dynamic web content. CGI is a generic interface for calling ex....
Release Date 2000/06 -
UML Distilled: A Brief Guide to the Standard Object Modeling Language, Second Edition
Author Kendall Scott , Martin Fowler
Now widely adopted as the de facto industry standard and sanctioned by the Object Management Group, the Unified Modeling Language (UML) is a notation all software developers need to know and understand. However, the UML is a big language, and not all of it is equall....
Release Date 1999/08 -
F. Scott Barker's Microsoft® Access 2000 Power Programming
Author F. Scott Barker
Access 2000 Power Programming gives many practical techniques for the corporate and independent developer. New features of Access 2000 are covered thoroughly and useful examples which will be implemented by programmers in their everyday applications. New topics incl....
Release Date 1999/06 -
Author Henry Wong , Scott Oaks
Threads aren't a new idea: many operating systems and languages support them. But despite widespread support, threads tend to be something that everyone talks about, but few use. Programming with threads has a reputation for being tricky and nonportable. Not so wi....
Release Date 1999/01 -
Virtual Private Networks, Second Edition
Author Paul Wolfe , Charlie Scott , Mike Erwin
Historically, only large companies could afford secure networks, which they created from expensive leased lines. Smaller folks had to make do with the relatively untrusted Internet. Nowadays, even large companies have to go outside their private nets, because so ma....
Release Date 1998/12 -
Control and Measurement of Unintentional Electromagnetic Radiation
Author W. Scott Bennett
Full and accessible coverage of the key concepts governing the reduction, containment, and measurement of unintentional electromagnetic radiation.The rapid proliferation of computers, CD players, and other digital electronic systems in recent years has made unintent....
Release Date 1997/04 -
IBM Power Systems H922 and H924 Technical Overview and Introduction
Author Volker Haug , Bartlomiej Grabowski , Gareth Coates , Young Hoon Cho , Scott Vetter
None Show and hide more
Release Date -0001/11