ABAP in Eclipse : Install, Configure, Use, and Enhance Your ADT / / by Łukasz Pęgiel
| ABAP in Eclipse : Install, Configure, Use, and Enhance Your ADT / / by Łukasz Pęgiel |
| Autore | Pęgiel Łukasz |
| Edizione | [1st ed. 2021.] |
| Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2021 |
| Descrizione fisica | 1 online resource (498 pages) |
| Disciplina | 005.3 |
| Soggetto topico |
Programming languages (Electronic computers)
Programming Language |
| ISBN |
9781484269633
1484269632 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1: Installation & Basic Configuration -- Chapter 2: Views -- Chapter 3: How to use ABAP in Eclipse to Accelerate your Work.-Chapter 4: Eclipse and ADT Preferences,- Chapter 5: Eclipse extensions that will make the difference -- Chapter 6: Extending Eclipse -- Chapter 7: Extending ABAP Development Tools. |
| Record Nr. | UNINA-9910484392603321 |
Pęgiel Łukasz
|
||
| Berkeley, CA : , : Apress : , : Imprint : Apress, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The Absolute Beginner's Guide to Python Programming : A Step-by-Step Guide with Examples and Lab Exercises / / by Kevin Wilson
| The Absolute Beginner's Guide to Python Programming : A Step-by-Step Guide with Examples and Lab Exercises / / by Kevin Wilson |
| Autore | Wilson Kevin (Kevin Peter), <1978-> |
| Edizione | [1st ed. 2022.] |
| Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2022 |
| Descrizione fisica | 1 online resource (200 pages) |
| Disciplina | 005.133 |
| Soggetto topico |
Python (Computer program language)
Programming languages (Electronic computers) Python Programming Language |
| ISBN |
9781484287163
1484287169 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1: What is Python -- Chapter 2: The Basics -- Chapter 3: Working with Data -- Chapter 4: Flow Control -- Chapter 5: Handling Files -- Chapter 6: Using Functions -- Chapter 7: Using Modules -- Chapter 8: Exception Handling -- Chapter 9: Object Oriented Programming -- Chapter 10: Building an Interface -- Chapter 11: Developing a Game -- Chapter 12: Python Web Development. |
| Record Nr. | UNINA-9910616398503321 |
Wilson Kevin (Kevin Peter), <1978->
|
||
| Berkeley, CA : , : Apress : , : Imprint : Apress, , 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
AI Solutions for the United Nations Sustainable Development Goals (UN SDGs) : A Practical Approach Using JavaScript / / by Tulsi Pawan Fowdur, Lavesh Babooram
| AI Solutions for the United Nations Sustainable Development Goals (UN SDGs) : A Practical Approach Using JavaScript / / by Tulsi Pawan Fowdur, Lavesh Babooram |
| Autore | Fowdur Tulsi Pawan |
| Edizione | [1st ed. 2024.] |
| Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2024 |
| Descrizione fisica | 1 online resource (355 pages) |
| Disciplina | 006.3 |
| Altri autori (Persone) |
BabooramLavesh
LaliteshDobee AshvenSanghan GyaneetaLuchmunparsad AdnaanKurmally Mohammad AvishayeDomah DheerajRadjoo VandanaHanumunthadu MaadhaveeMohadeb Sai |
| Soggetto topico |
Artificial intelligence
Java (Computer program language) Programming languages (Electronic computers) Artificial Intelligence Java Programming Language |
| ISBN | 9798868805363 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1: Introduction to Machine Learning Applications Development and the UN SDGs -- Chapter 2: Utilizing Machine Learning Algorithms for Power generation prediction and classification in Wind Farms -- Chapter 3: Crop Recommendation System Using Machine Learning Algorithms for achieving SDGs 2, 9, and 12 -- Chapter 4: Aligning Manufacturing Emissions with SDGs 9 and 13 Using Machine Learning Algorithms -- Chapter 5: Water Potability Testing Using Machine Learning -- Applying Machine Learning for Air Quality Monitoring Targeting SDG 3 and 13 -- Chapter 7: Clustering the Development of Worldwide Internet Connectivity with Unsupervised Learning for SDGs 7, 9, and 11. |
| Record Nr. | UNINA-9910917787303321 |
Fowdur Tulsi Pawan
|
||
| Berkeley, CA : , : Apress : , : Imprint : Apress, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The Application of Formal Methods : Essays Dedicated to Jim Woodcock on the Occasion of His Retirement / / edited by Simon Foster, Augusto Sampaio
| The Application of Formal Methods : Essays Dedicated to Jim Woodcock on the Occasion of His Retirement / / edited by Simon Foster, Augusto Sampaio |
| Autore | Foster Simon |
| Edizione | [1st ed. 2024.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
| Descrizione fisica | 1 online resource (0 pages) |
| Disciplina | 005.131 |
| Altri autori (Persone) | SampaioAugusto |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Machine theory
Programming languages (Electronic computers) Software engineering Formal Languages and Automata Theory Programming Language Software Engineering |
| ISBN | 3-031-67114-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Preface -- Dedications -- Contents -- Denotational and Algebraic Semantics for the SMrCaIT Calculus Based on UTP -- 1 Background -- 2 Introduction -- 3 Backgrounds -- 3.1 Mobility Models -- 3.2 Scope Extrusion -- 3.3 The SMrCaIT Calculus -- 3.4 Guided Choice -- 4 Denotational Semantics -- 4.1 Semantic Model -- 4.2 Healthiness Conditions -- 4.3 Denotational Semantics of Basic Commands -- 4.4 Parallel Composition -- 5 Algebraic Semantics -- 5.1 Algebraic Laws of Basic Commands -- 5.2 Algebraic Laws of Parallel Composition -- 5.3 Algebraic Laws of Channel Restriction and Scope Extrusion -- 6 Conclusion and Future Work -- A Further Explanation of SMrCaIT -- References -- Specifying Fault-Tolerant Mixed-Criticality Scheduling -- 1 Introduction -- 2 Background -- 2.1 Rely-Guarantee ``thinking'' -- 2.2 Notes on Notation -- 3 Formalising Planning and Scheduling -- 4 Specifying the Fixed Priority Scheduler -- 4.1 Tasks Define Job Types -- 4.2 Job Arrival Assumptions -- 4.3 Assigning Priorities During Planning -- 4.4 State of Run-Time Model -- 4.5 Time vs Computer Clocks -- 4.6 Scheduler Class and Methods -- 4.7 The FP Planning Theorem -- 5 Comparison Between the Current and Previous Models -- 6 Conclusions -- References -- Clarifying Assumptions -- 1 Introduction -- 1.1 Verification of Sequential Programs -- 1.2 Development Methods -- 1.3 Concurrency -- 1.4 Structure of Chapter -- 2 Reasoning About Interference on States -- 2.1 Background to Rely-Guarantee Research -- 2.2 Verification (Post Facto) of concurrent programs -- 2.3 Recovering Compositionality -- 2.4 Data Abstraction/Reification -- 2.5 Ghost Variables -- 2.6 Using a Fiction of Atomicity -- 3 Developments of ``rely-guarantee thinking'' -- 3.1 Assumptions About External Components -- 3.2 Semantics and Tool Support -- 3.3 Related Research -- 3.4 Tackling Synchronisation.
4 Further Abstractions -- 4.1 Algebraic Presentation -- 4.2 Implementation Patterns -- 5 Conclusions -- References -- PCSP# Denotational Semantics with an Application in Sports Analytics -- 1 Introduction -- 2 The Probabilistic CSP# Language (PCSP#) -- 3 The Denotational Semantics for PCSP# -- 3.1 Semantic Model -- 3.2 Semantics of Processes -- 4 Sports Analytics Using Probabilistic Model Checking -- 4.1 Overview -- 4.2 The Proposed Approach -- 4.3 Data Mining -- 4.4 Modeling Tennis in MDP -- 4.5 Implementation in PCSP# -- 4.6 Strategy Recommendations -- 4.7 Evaluation -- 5 Related Work -- 5.1 Integration and Evolution of Formal Specification Languages in System Modeling and Verification -- 5.2 Sports Analytics in Racket Sports -- 6 Conclusion -- References -- Towards the Composition of Digital Twins -- 1 Dedication -- 2 Introduction -- 3 Background -- 3.1 Cyber-Physical Systems, Digital Twins and DT-Enabled Systems -- 3.2 System of Systems -- 4 Composing DT-Enabled Systems -- 4.1 A Fleet of Digital Twins -- 4.2 A Hierarchy of Digital Twins -- 4.3 Collaboration Between Digital Twins -- 5 Realising Composition of DT-Enabled Systems -- 5.1 Building DTs from Reusable Components -- 5.2 The Digital Twin as a Service Platform -- 5.3 Support for a Fleet and Hierarchy of Digital Twins -- 5.4 Support for Collaboration Between Digital Twins -- 6 The Flex Cell Use Case -- 7 Concluding Remarks -- References -- Formal Modelling of Peercoin and Proof-of-Stake Protocols -- 1 Introduction -- 2 Peercoin -- 2.1 Peercoin Protocol -- 3 Formal Modelling -- 3.1 A Brief Introduction to PRISM -- 3.2 Modelling the Protocol -- 3.3 Desirable Properties -- 4 Results and Analysis -- 5 Conclusions -- References -- On the Unification of Conformance Notions -- 1 Introduction -- 1.1 Background and Objectives -- 1.2 Main Contributions -- 1.3 Overview. 2 Finite State Machines and Conformance Relations -- 2.1 Definition of Finite State Machines -- 2.2 FSM Conformance Relations -- 2.3 Critical Assessment of FSM Conformance Relations -- 2.4 Unified Equivalence and Reduction Concepts for FSMs -- 2.5 Option-Preserving Reduction - A Novel Conformance Relation -- 3 A UTP Theory for FSMs -- 3.1 FSMs as UTP Processes -- 3.2 Universal Quasi-Equivalence and Universal Reduction in UTP -- 4 Conclusion -- References -- Abstracting and Verifying Decentralised Systems in CSP -- 1 Introduction -- 2 Background -- 2.1 CSP -- 2.2 FDR -- 3 Stochastic Reasoning -- 3.1 Judging Impossibility -- 3.2 Stochastic Proof -- 4 Consensus Machine -- 5 The Handover Protocol -- 5.1 Sequential Model -- 5.2 Distributed Model -- 6 Szymanski's Algorithm -- 7 Related Work -- 8 Conclusions -- References -- Towards an Algebra for Unifying Theories of Concurrent Programming (UTCP) -- 1 Introduction -- 1.1 Introduction to UTCP -- 1.2 Structure of This Chapter -- 2 Background -- 2.1 UTP -- 2.2 UTCP -- 2.3 Formal Definition of CKA -- 3 Methodology -- 3.1 Composing Atomic Actions -- 3.2 W(…): The Wash Cycle -- 3.3 Atomic Action Flows -- 3.4 Composite Flows -- 3.5 Atomic Control Merge -- 4 Law Proofs -- 4.1 Proving Rearrangments -- 4.2 Proving Collapses -- 4.3 Laws Involving miracle -- 4.4 Laws Involving Refinement -- 5 Related Work -- 6 Conclusions -- 6.1 Future Work -- References -- Static Race Detection for Periodic Real-Time Programs with IPCP Locks -- 1 Introduction -- 2 Overview -- 3 Periodic Programs with IPCP Locks -- 4 Data Races -- 5 Some Properties of IPCP Programs -- 6 Computing Response Time -- 7 Rules of Disjointness -- 7.1 Race Detection Algorithm -- 8 Experimental Evaluation -- 8.1 Implementation -- 8.2 Benchmarks -- 8.3 Comparison -- 8.4 Rule Coverage -- 9 Related Work -- 10 Conclusion -- References. A Tour Through the Programming Choices: Semantics and Applications -- 1 Dedication -- 2 Introduction -- 3 Programming Choices -- 3.1 Nondeterministic Choice -- 3.2 Angelic Choice -- 3.3 Preferential Choice -- 3.4 Probabilistic Choice -- 4 Applications -- 4.1 Co-simulation for Cyber-Physical Systems -- 4.2 RoboChart -- 4.3 Random Walks -- 5 Conclusions -- References -- I Kaptured the System -- 1 Introduction -- 2 An Overview of System Kapture -- 2.1 The Purpose of System Kapture -- 2.2 Core Concepts -- 2.3 Underlying Semantics -- 3 Kapturing a System -- 3.1 An Iteration of the System Requirements -- 4 Analysis of System Requirements -- 4.1 Absence of Errors and Warnings -- 4.2 System Always Progresses and Rounds Complete in Bounded Time -- 4.3 Queries -- 4.4 No Violation of Emergent Requirements -- 5 Conclusions -- References -- Proving B with Atelier B -- 1 Introduction -- 2 Introduction to the B Method -- 3 Atelier B Proof Obligations -- 3.1 Characteristics and Constraints -- 3.2 Evolution -- 4 Atelier B Proof System -- 4.1 Automatic Proof -- 4.2 Extending the Prover -- 4.3 Validation -- 5 B Industrial Applications -- 6 Adaptation over Years -- 7 Conclusion and Perspectives -- References -- Semantics Formalisation - Modelling and Proving Strategies Using Event-B Versus Theories -- 1 Introduction -- 2 Background -- 2.1 Event-B -- 2.2 The Theory Plugin -- 2.3 SCXML -- 3 Approach 1. Using Event-B Contexts and Machines -- 3.1 Formalisation of the Untriggered Statechart Syntactic Elements -- 3.2 Formalisation of the Untriggered Statechart Semantics -- 3.3 Formalisation of the Run-to-Completion Syntactic Elements -- 3.4 Formalisation of the Run-to-Completion Semantics -- 3.5 Formalisation of Triggered Statecharts -- 4 Approach 2. Formalisation Using Theories -- 4.1 Algebraic Formalisation of Untriggered Statecharts. 4.2 Algebraic Formalisation of Run-to-Completion Schedule -- 4.3 Algebraic Formalisation of Triggered Statecharts -- 5 Proof Rules for the Algebraic Data Types -- 5.1 Expanding Operators' Definition -- 5.2 Rewrite Rules -- 5.3 Inference Rules -- 6 Related Work -- 7 Conclusion -- References -- Author Index. |
| Record Nr. | UNINA-9910886092703321 |
Foster Simon
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Architecture of Advanced Numerical Analysis Systems : Designing a Scientific Computing System using OCaml / / by Liang Wang, Jianxin Zhao
| Architecture of Advanced Numerical Analysis Systems : Designing a Scientific Computing System using OCaml / / by Liang Wang, Jianxin Zhao |
| Autore | Wang Liang |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2023 |
| Descrizione fisica | 1 electronic resource (472 p.) |
| Disciplina | 005.13 |
| Altri autori (Persone) | ZhaoJianxin |
| Soggetto topico |
Programming languages (Electronic computers)
Computer science Artificial intelligence - Data processing Programming Language Computer Science Data Science Models of Computation |
| ISBN |
9781484288535
148428853X |
| Classificazione | COM000000COM004000COM014000COM031000 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1: Introduction.-Chapter 2: Core Optimization -- Chapter 3: Algorithm Differentiation -- Chapter 4: Mathematical Optimization -- Chapter 5: Deep Neural Networks -- Chapter 6: Computation Graph -- Chapter 7: Performance Accelerators -- Chapter 8: Compiler Backends -- Chapter 9: Composition and Deployment -- Chapter 10: Distributed Computing -- Chapter 11: Testing Framework -- Appendix A: Basic Analytics Examples -- Appendix B: System Conventions -- Appendix C: Metric Systems and Constants -- Appendix D: AlgoDiff Module -- Appendix E: Neural Network Module -- Appendix F: Actor System for Distributed Computing -- Bibliography. |
| Record Nr. | UNINA-9910637747103321 |
Wang Liang
|
||
| Berkeley, CA : , : Apress : , : Imprint : Apress, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Attacks and Defenses for the Internet-of-Things : 7th International Conference, ADIoT 2024, Hangzhou, China, December 13–14, 2024, Proceedings / / edited by Weizhi Meng, Moti Yung, Jun Shao
| Attacks and Defenses for the Internet-of-Things : 7th International Conference, ADIoT 2024, Hangzhou, China, December 13–14, 2024, Proceedings / / edited by Weizhi Meng, Moti Yung, Jun Shao |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (X, 169 p. 42 illus., 24 illus. in color.) |
| Disciplina | 621.38 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Cooperating objects (Computer systems)
Programming languages (Electronic computers) Computer networks Computers Cryptography Data encryption (Computer science) Computer networks - Security measures Cyber-Physical Systems Programming Language Computer Communication Networks Computing Milieux Cryptology Mobile and Network Security |
| ISBN | 3-031-85593-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | An Efficient Edge based Privacy preserving Range Aggregation Scheme for Aging in Place System -- An Empirical DNN Pruning Approach against Membership Inference Attacks -- A Conflict Aware Active Automata Learning Approach for BLE Device Status Machine Construction -- Optimizing Indoor Network Element Layout for Enhanced Signal Coverage and Security in Location Based Services -- An Efficient Lattice Based Authentication Protocol for the Vehicular Ad Hoc Network -- An IoT Based Privacy Preserving Computer Aided Diagnosis System for Skin Cancer Using Federated Learning and Homomorphic Encryption -- GCFuzz An Intelligent Method for Generating IoT Protocols Test Cases using GAN with CVAE -- VRMDA Verifiable and Robust Multi subset Data Aggregation scheme in IoT -- Assessing the Effectiveness of LLMs in Android Application Vulnerability Analysis -- Singularization A New Approach to Design Block Ciphers for Resource Constrained Devices. |
| Record Nr. | UNINA-9910987694403321 |
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Attacks and Defenses for the Internet-of-Things : 7th International Conference, ADIoT 2024, Hangzhou, China, December 13–14, 2024, Proceedings / / edited by Weizhi Meng, Moti Yung, Jun Shao
| Attacks and Defenses for the Internet-of-Things : 7th International Conference, ADIoT 2024, Hangzhou, China, December 13–14, 2024, Proceedings / / edited by Weizhi Meng, Moti Yung, Jun Shao |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (X, 169 p. 42 illus., 24 illus. in color.) |
| Disciplina | 621.38 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Cooperating objects (Computer systems)
Programming languages (Electronic computers) Computer networks Computers Cryptography Data encryption (Computer science) Computer networks - Security measures Cyber-Physical Systems Programming Language Computer Communication Networks Computing Milieux Cryptology Mobile and Network Security |
| ISBN | 3-031-85593-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | An Efficient Edge based Privacy preserving Range Aggregation Scheme for Aging in Place System -- An Empirical DNN Pruning Approach against Membership Inference Attacks -- A Conflict Aware Active Automata Learning Approach for BLE Device Status Machine Construction -- Optimizing Indoor Network Element Layout for Enhanced Signal Coverage and Security in Location Based Services -- An Efficient Lattice Based Authentication Protocol for the Vehicular Ad Hoc Network -- An IoT Based Privacy Preserving Computer Aided Diagnosis System for Skin Cancer Using Federated Learning and Homomorphic Encryption -- GCFuzz An Intelligent Method for Generating IoT Protocols Test Cases using GAN with CVAE -- VRMDA Verifiable and Robust Multi subset Data Aggregation scheme in IoT -- Assessing the Effectiveness of LLMs in Android Application Vulnerability Analysis -- Singularization A New Approach to Design Block Ciphers for Resource Constrained Devices. |
| Record Nr. | UNISA-996650068203316 |
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Beginning C : From Beginner to Pro / / by German Gonzalez-Morris, Ivor Horton
| Beginning C : From Beginner to Pro / / by German Gonzalez-Morris, Ivor Horton |
| Autore | Gonzalez-Morris German |
| Edizione | [7th ed. 2024.] |
| Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2024 |
| Descrizione fisica | 1 online resource (710 pages) |
| Disciplina | 005.45 |
| Altri autori (Persone) | HortonIvor |
| Soggetto topico |
Compilers (Computer programs)
Programming languages (Electronic computers) Compilers and Interpreters Programming Language |
| ISBN | 9798868801495 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1. Programming in C -- 2. First Steps in Programming -- 3. Making Decisions -- 4. Loops -- 5. Arrays -- 6. Applications with Strings and Text -- 7. Pointers -- 8. Structuring Your Programs -- 9. More on Functions -- 10. Essential Input and Output Operations -- 11. Structuring Data -- 12. Working with Files -- 13. Supporting Facilities -- 14. Advanced and Specialized Topics -- A. Computer Arithmetic -- B. ASCII Character Code Definitions -- C. Reserved Words in C -- D. Input and Output Format Specifications -- E. Standard Library Headers. |
| Record Nr. | UNINA-9910841862903321 |
Gonzalez-Morris German
|
||
| Berkeley, CA : , : Apress : , : Imprint : Apress, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Beginning C++23 : From Beginner to Pro / / by Ivor Horton, Peter Van Weert
| Beginning C++23 : From Beginner to Pro / / by Ivor Horton, Peter Van Weert |
| Autore | Horton Ivor |
| Edizione | [7th ed. 2023.] |
| Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2023 |
| Descrizione fisica | 1 online resource (938 pages) |
| Disciplina | 005.133 |
| Altri autori (Persone) | WeertPeter van |
| Soggetto topico |
C++ (Computer program language)
Programming languages (Electronic computers) Computer science Open source software C++ Programming Language Computer Science Open Source |
| ISBN |
9781484293430
1484293436 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1. Basic Ideas -- 2. Introducing Fundamental Types of Data -- 3. Working Fundamental Types -- 4. Making Decisions -- 5. Arrays and Loops -- 6. Pointers and References -- 7. Working with Strings -- 8. Defining Functions -- 9. Vocabulary Types -- 10. Function Templates -- 11. Modules and Namespaces -- 12. Defining your own Data Types -- 13. Operator Overloading -- 14. Inheritance -- 15. Polymorphism -- 16. Runtime Errors and Exceptions -- 17. Class Templates -- 18. Move Semantics -- 19. First-Class Functions -- 20. Containers and Algorithms -- 21. Constrained Templates and Concepts. |
| Record Nr. | UNINA-9910747590903321 |
Horton Ivor
|
||
| Berkeley, CA : , : Apress : , : Imprint : Apress, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Beginning Go Programming : Build Reliable and Efficient Applications with Go / / by Rumeel Hussain, Maryam Zulfiqar
| Beginning Go Programming : Build Reliable and Efficient Applications with Go / / by Rumeel Hussain, Maryam Zulfiqar |
| Autore | Hussain Rumeel |
| Edizione | [1st ed. 2022.] |
| Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2022 |
| Descrizione fisica | 1 online resource (272 pages) |
| Disciplina | 005.133 |
| Soggetto topico |
Programming languages (Electronic computers)
Software engineering Programming Language Software Engineering |
| ISBN |
9781484288580
1484288580 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1: Introduction to Go -- Chapter 2: Go Basics -- Chapter 3: Go Recipes: Programming Fundamentals Basics -- Chapter 4: Working with Text -- Chapter 5: Structs, Methods, and Interfaces -- Chapter 6: Working with JSON -- Chapter 7: HTTP -- Chapter 8: Concurrency -- Chapter 9: Tips and Tricks. |
| Record Nr. | UNINA-9910632470103321 |
Hussain Rumeel
|
||
| Berkeley, CA : , : Apress : , : Imprint : Apress, , 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||