Inne - Programowanie

Remote Usability Testing. Actionable insights in user behavior across geographies and time zones

Inge De Bleecker, Rebecca Okoroji

RS 232C - praktyczne programowanie. Od Pascala i C++ do Delphi i Buildera. Wydanie III

Andrzej Daniluk

Rust Essentials. A quick guide to writing fast, safe, and concurrent systems and applications - Second Edition

Ivo Balbaert

Rust High Performance. Learn to skyrocket the performance of your Rust applications

Iban Eguia Moraza

Rust Programming By Example. Enter the world of Rust by building engaging, concurrent, reactive, and robust applications

Guillaume Gomez, Antoni Boucher

Rust Programming Cookbook. Explore the latest features of Rust 2018 for building fast and secure apps

Claus Matzinger

Rust Standard Library Cookbook. Over 75 recipes to leverage the power of Rust

Jan Hohenheim, Daniel Durante

Rust Web Development with Rocket. A practical guide to starting your journey in Rust web development using the Rocket framework

Karuna Murti

Rust Web Programming. A hands-on guide to developing fast and secure web apps with the Rust programming language

Maxwell Flitton

Rzemiosło w czystej formie. Standardy i etyka rzetelnych programistów

Robert C. Martin

SAFe(R) for DevOps Practitioners. Implement robust, secure, and scaled Agile solutions with the Continuous Delivery Pipeline

Robert Wen, Harry Koehnemann

Salesforce Process Builder Quick Start Guide. Build complex workflows by clicking, not coding

Rakesh Gupta

SAP Intelligent RPA for Developers. Automate business processes using SAP Intelligent RPA and learn the migration path to SAP Process Automation

Vishwas Madhuvarshi, Vijaya Kumar Ganugula

Scala Reactive Programming. Build scalable, functional reactive microservices with Akka, Play, and Lagom

Rambabu Posa

Secret Recipes of the Python Ninja. Over 70 recipes that uncover powerful programming tactics in Python

Cody Jackson, Steven F. Lott

Security Automation with Ansible 2. Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis

Akash Mahajan, MADHU AKULA