Keyword : Category :
 
 
 
 
Windows
Unix
Php and mysql
Linux
Java
Mobile programming
Certification
Asterisk
Python
Autocad
3d-animation
Hacks
Programming
Hardware
Networking
Web design
Multimedia - graphics
Simple steps
Dummies
.net programming
Oracle
Sql server
Operating system
Telecommunications
Microsoft
Office
Web development
Cisco
Graphics
C sharp
Software development
Database
Computer science
Uml
Security
General
Cms
Mac
Android
 
 
Email:
 
 
MACHINE LEARNING (IN PYTHON AND R) FOR DUMMIES
NRS 1120.00
 
Book details / order
C# 6.0 COOKBOOK, 4TH EDITION
Completely updated for c# 6.0, the new edition of this bestseller offers more than 150 code recipes to common and not-so-common problems that c# programmers face every day. more than a third of the recipes have been rewritten to take advantage of new c# 6.0 features. if you prefer solutions to general c# language instruction and quick answers to theory, this is your book.c# 6.0 cookbook offers new recipes for asynchronous methods, dynamic objects, enhanced error handling, the rosyln compiler, and more. here are some of topics covered: classes and generics collections, enumerators, and iterators data types linq and lambda expressions exception handling reflection and dynamic programming regular expressions filesystem interactions networking and the web xml usage threading, synchronization, and concurrency each recipe in the book includes tested code that you can download from oreilly.com and reuse in your own applications, and each one includes a detailed discussion of how and why the underlying technology works. you don't have to be an experienced c# or .net developer to use c# 6.0 cookbook. you just have to be someone who wants to solve a problem now, without having to learn all the related theory first. about the authors jay hilyard has been developing applications for the windows platform for over 20 years, including .net. he’s published numerous articles in msdn magazine. jay currently works at newmarket, an amadeus company. view jay hilyard's full profile page. stephen teilhet started working with the pre-alpha version of the .net platform and has been using it ever since. at ibm, he works as the lead security researcher on their static source code security analysis tool, which is used to find vulnerabilities in many different languages, including c# and visual basic. chapter 1. classes and generics 1.0. introduction 1.1. creating union-type structures 1.2. making a type sortable 1.3. making a type searchable 1.4. returning multiple items from a method 1.5. parsing command-line parameters 1.6. initializing a constant field at runtime 1.7. building cloneable classes 1.8. ensuring an object’s disposal 1.9. deciding when and where to use generics 1.10. understanding generic types 1.11. reversing the contents of a sorted list 1.12. constraining type arguments 1.13. initializing generic variables to their default values 1.14. adding hooks to generated entities 1.15. controlling how a delegate fires within a multicast delegate 1.16. using closures in c# 1.17. performing multiple operations on a list using functors 1.18. controlling struct field initialization 1.19. checking for null in a more concise way chapter 2. collections, enumerators, and iterators 2.0. introduction 2.1. looking for duplicate items in a list 2.2. keeping your list sorted 2.3. sorting a dictionary’s keys and/or values 2.4. creating a dictionary with min and max value boundaries 2.5. persisting a collection between application sessions 2.6. testing every element in an array or list 2.7. creating custom enumerators 2.8. dealing with finally blocks and iterators 2.9. implementing nested foreach functionality in a class 2.10. using a thread-safe dictionary for concurrent access without manual locking chapter 3. data types 3.0. introduction 3.1. encoding binary data as base64 3.2. decoding a base64-encoded binary 3.3. converting a string returned as a byte[] back into a string 3.4. passing a string to a method that accepts only a byte[] 3.5. determining whether a string is a valid number 3.6. rounding a floating-point value 3.7. choosing a rounding algorithm 3.8. safely performing a narrowing numeric cast 3.9. testing for a valid enumeration value 3.10. using enumerated members in a bit mask 3.11. determining whether one or more enumeration flags are set chapter 4. language integrated query (linq) and lambda expressions 4.0. introduction 4.1. querying a message queue 4.2. using set semantics with data 4.3. reusing parameterized queries with linq to sql 4.4. sorting results in a culture-sensitive manner 4.5. adding functional extensions for use with linq 4.6. querying and joining across data repositories 4.7. querying configuration files with linq 4.8. creating xml straight from a database 4.9. being selective about your query results 4.10. using linq with collections that don’t support ienumerable 4.11. performing an advanced interface search 4.12. using lambda expressions 4.13. using different parameter modifiers in lambda expressions 4.14. speeding up linq operations with parallelism chapter 5. debugging and exception handling 5.0. introduction 5.1. knowing when to catch and rethrow exceptions 5.2. handling exceptions thrown from methods invoked via reflection 5.3. creating a new exception type 5.4. breaking on a first-chance exception 5.5. handling exceptions thrown from an asynchronous delegate 5.6. giving exceptions the extra info they need with exception.data 5.7. dealing with unhandled exceptions in winforms applications 5.8. dealing with unhandled exceptions in wpf applications 5.9. determining whether a process has stopped responding 5.10. using event logs in your application 5.11. watching the event log for a specific entry 5.12. implementing a simple performance counter 5.13. creating custom debugging displays for your classes 5.14. tracking where exceptions come from 5.15. handling exceptions in asynchronous scenarios 5.16. being selective about exception processing chapter 6. reflection and dynamic programming 6.0. introduction 6.1. listing referenced assemblies 6.2. determining type characteristics in assemblies 6.3. determining inheritance characteristics 6.4. invoking members using reflection 6.5. accessing local variable information 6.6. creating a generic type 6.7. using dynamic versus object 6.8. building objects dynamically 6.9. make your objects extensible chapter 7. regular expressions 7.0. introduction 7.1. extracting groups from a matchcollection 7.2. verifying the syntax of a regular expression 7.3. augmenting the basic string replacement function 7.4. implementing a better tokenizer 7.5. returning the entire line in which a match is found 7.6. finding a particular occurrence of a match 7.7. using common patterns chapter 8. filesystem i/o 8.0. introduction 8.1. searching for directories or files using wildcards 8.2. obtaining the directory tree 8.3. parsing a path 8.4. launching and interacting with console utilities 8.5. locking subsections of a file 8.6. waiting for an action to occur in the filesystem 8.7. comparing version information of two executable modules 8.8. querying information for all drives on a system 8.9. compressing and decompressing your files chapter 9. networking and web 9.0. introduction 9.1. handling web server errors 9.2. communicating with a web server 9.3. going through a proxy 9.4. obtaining the html from a url 9.5. using the web browser control 9.6. prebuilding an asp.net website programmatically 9.7. escaping and unescaping data for the web 9.8. checking out a web server’s custom error pages 9.9. writing a tcp server 9.10. writing a tcp client 9.11. simulating form execution 9.12. transferring data via http 9.13. using named pipes to communicate 9.14. pinging programmatically 9.15. sending smtp mail using the smtp service 9.16. using sockets to scan the ports on a machine 9.17. using the current internet connection settings 9.18. transferring files using ftp chapter 10. xml 10.0. introduction 10.1. reading and accessing xml data in document order 10.2. querying the contents of an xml document 10.3. validating xml 10.4. detecting changes to an xml document 10.5. handling invalid characters in an xml string 10.6. transforming xml 10.7. validating modified xml documents without reloading 10.8. extending transformations 10.9. getting your schemas in bulk from existing xml files 10.10. passing parameters to transformations chapter 11. security 11.0. introduction 11.1. encrypting and decrypting a string 11.2. encrypting and decrypting a file 11.3. cleaning up cryptography information 11.4. preventing string tampering in transit or at rest 11.5. making a security assert safe 11.6. verifying that an assembly has been granted specific permissions 11.7. minimizing the attack surface of an assembly 11.8. obtaining security and/or audit information 11.9. granting or revoking access to a file or registry key 11.10. protecting string data with secure strings 11.11. securing stream data 11.12. encrypting web.config information 11.13. obtaining a safer file handle 11.14. storing passwords chapter 12. threading, synchronization, and concurrency 12.0. introduction 12.1. creating per-thread static fields 12.2. providing thread-safe access to class members 12.3. preventing silent thread termination 12.4. being notified of the completion of an asynchronous delegate 12.5. storing thread-specific data privately 12.6. granting multiple access to resources with a semaphore 12.7. synchronizing multiple processes with the mutex 12.8. using events to make threads cooperate 12.9. performing atomic operations among threads 12.10. optimizing read-mostly access 12.11. making your database requests more scalable 12.12. running tasks in order chapter 13. toolbox 13.0. introduction 13.1. dealing with operating system shutdown, power management, or user session changes 13.2. controlling a service 13.3. list what processes an assembly is loaded in 13.4. using message queues on a local workstation 13.5. capturing output from the standard output stream 13.6. capturing standard output for a process 13.7. running code in its own appdomain 13.8. determining the operating system and service pack version of the current operating system

Author : Stephen teilhet, jay hilyard
Publication : Oreilly
Isbn : 9789352132478
Store book number : 105
NRS 1600.00
  
Order This Book
*Marked Field Is Necessary
Your Name: *
Your Address:
Your Email: *
Your Cell Phone:
Your Work Phone:
Quantity: *
Total:
Message (if any)
Security code: *
Case Sensitive
 
 
Packt publication
Microsoft press
Wrox
Bpb
Phi
Dreamtech press
Sybex
Wiley
Tata
Oreilly
Macmilan
Vikas
Apress
Spd
Pearson
Cambridge
Oxford
Idg
Charles river media
Murach
Niit
Black book
Bible
Elsevier
Sk kataria
Pragmatic bookshelf
Fusion books
 
 
INTRODUCTION TO ALGORITHMS
NRS 2712.00
 
 
Professional ASP.NET MVC 4
Mastering Microsoft Exchange ...
Android Hacker's Handbook
CCNA Cisco Certified Network ...
Windows Phone 7 Application ...
Beginning Drupal (Wrox Progr ...
Troubleshooting Windows 7 In ...
 More>>
 
All Right Reserved © bookplus.com.np 2008