Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 6 of 6 matches in All Departments
YOU HAVE TO OWN THIS BOOK! "Software Exorcism: A Handbook for Debugging and Optimizing Legacy Code" takes an unflinching, no bulls$&# look at behavioral problems in the software engineering industry, shedding much-needed light on the social forces that make it difficult for programmers to do their job. Do you have a co-worker who perpetually writes bad code that "you" are forced to clean up? This is your book. While there are plenty of books on the market that cover debugging and short-term workarounds for bad code, Reverend Bill Blunden takes a revolutionary step beyond them by bringing our attention to the underlying illnesses that plague the software industry as a whole. Further, "Software Exorcism" discusses tools and techniques for effective and aggressive debugging, gives optimization strategies that appeal to all levels of programmers, and presents in-depth treatments of technical issues with honest assessments that are not biased toward proprietary solutions.
This is a special title that will be both technically useful and visually stimulating to the reader.
-->Reverend Bill Blunden--> tells all: who's going offshore, who's helping them do it, and why. In addition to presenting the pro-globalization stance of corporate America, Reverend Blunden gives voice to dissenting opinions that have largely been ignored by the media. This book offers an enlightening, detailed analysis of the offshore outsourcing phenomenon, and exposes the underlying core values of America's economic and political system. Blunden has been directly affected by offshoring, and writes from the programmer's point of viewfor the programmer. While Blunden is passionate about the topic, he and the editor ensure that this book presents both sides of the issue, and appeals to all readers.-->Table of Contents-->Setting the StageMeasuring the TrendThe Offshoring Obstacle CourseArguments in Favor of OffshoringArguments Against Offshoring
Truth is often stranger than fiction, especially when it comes to the workplace. In "Cube Farm, "author, Bill Blunden, recounts his three years in Minnesota, performing research and development for Lawson Software. Riddled with intrigue, duplicity and collusion, this story offers a trench-level view of a company in the throes of internal rivalry, and suffering from a string of failed projects. If you have ever suffered at the hands of an incompetent manager, or toiled in a dysfunctional environment, then this hilarious account will appeal to you. "Cube Farm "provides "lessons learned" sections, at the end of each chapter, which delve into the basics in corporate self defense. Table of Contents THE IVY LEAGUE ADVANTAGE BLAZING A TRAIL TO MINNESOTA FIRST IMPRESSIONS THE ILLUMINATI VANISHING ACT THE KING'S NEW CLOTHES THE GREAT ESCAPE IT'S THE NATURE OF THE BEAST A FIXED FIGHT THE Y2K TIME BOMB!
YOU HAVE TO OWN THIS BOOK! Software Exorcism: A Handbook for Debugging and Optimizing Legacy Code takes an unflinching, no bulls$&# look at behavioral problems in the software engineering industry, shedding much-needed light on the social forces that make it difficult for programmers to do their job. Do you have a co-worker who perpetually writes bad code that you are forced to clean up? This is your book. While there are plenty of books on the market that cover debugging and short-term workarounds for bad code, Reverend Bill Blunden takes a revolutionary step beyond them by bringing our attention to the underlying illnesses that plague the software industry as a whole. Further, Software Exorcism discusses tools and techniques for effective and aggressive debugging, gives optimization strategies that appeal to all levels of programmers, and presents in-depth treatments of technical issues with honest assessments that are not biased toward proprietary solutions.
While Forensic Analysis Has Proven To Be A Valuable Investigative Tool In The Field Of Computer Security, Utilizing Anti-Forensic Technology Makes It Possible To Maintain A Covert Operational Foothold For Extended Periods, Even In A High-Security Environment. Adopting An Approach That Favors Full Disclosure, The Updated Second Edition Of The Rootkit Arsenal Presents The Most Accessible, Timely, And Complete Coverage Of Forensic Countermeasures. This Book Covers More Topics, In Greater Depth, Than Any Other Currently Available. In Doing So The Author Forges Through The Murky Back Alleys Of The Internet, Shedding Light On Material That Has Traditionally Been Poorly Documented, Partially Documented, Or Intentionally Undocumented. The Range Of Topics Presented Includes How To: -Evade Post-Mortem Analysis -Frustrate Attempts To Reverse Engineer Your Command & Control Modules -Defeat Live Incident Response -Undermine The Process Of Memory Analysis -Modify Subsystem Internals To Feed Misinformation To The Outside -Entrench Your Code In Fortified Regions Of Execution -Design And Implement Covert Channels -Unearth New Avenues Of Attack
|
You may like...
|