Buy 2, Save 70%


Performing CRUD Operations with MongoDB
Jesse Smith shows you how Create, Read, Update, and Delete (CRUD) operations with MongoDB are easy using Mongo Query methods with JSON-like syntax.
By Jesse Smith - Feb 25, 2015
The MMIX Supplement to The Art of Computer Programming: Programming Techniques
In this excerpt from The MMIX Supplement: Supplement to The Art of Computer Programming Volumes 1, 2, 3 by Donald E. Knuth, Martin Ruckert discusses various programming techniques, including index variables, fields, relative addresses, bit stuffing, loop unrolling, subroutines, and reporting errors.
By Martin Ruckert - Feb 25, 2015
Video: Java Performance: Tune the HotSpot JVM Step-by-Step
In this video excerpt from Java Performance LiveLessons (Video Training), Charlie Hunt describes a high level step-by-step JVM tuning process that you can use to tune the Java Virtual Machine.
By Charlie Hunt - Feb 24, 2015
Universal Windows Apps with XAML and C# Unleashed: Threading, Windows, and Pages
This chapter from Universal Windows Apps with XAML and C# Unleashed begins by examining a very important topic, although one that many developers take for granted: the threading model for universal apps. This background is especially helpful for the advanced feature of writing an app that displays multiple windows, which is the second topic in this chapter. The third and final topic—navigating between a window’s pages—is a feature leveraged by just about every real-world app.
By Adam Nathan - Feb 23, 2015
So You Want to Start a Technical Blog
Everybody’s doing it. And by “it,” we mean blogging. You know you want to. You’ve got something to say and people need to hear it. Follow these down-to-earth tips and tricks about getting your feet wet in the world of technology blogs.
By Thursday Bram - Feb 20, 2015
See All Articles


Thank You,!

No matter what the need, few security organizations are as dedicated to helping us InfoSec Pros as SANS.

By John Traenkenschuh - Feb 12, 2015 - Security, General Security and Privacy, Network Security, Software Security
The Enemy Within

Long ago, Traenk read about new attacks, attacks modeled after biological attacks.  Those were viruses; what new comes?

By John Traenkenschuh - Feb 8, 2015 - Human Resources, Software Security, Access, General Security and Privacy, Information Management, Network Security, Management & Strategy, Data, Security, Business & Management
See All Blogs

Who is InformIT

We are the online presence for the world's leading technology publishers and your source for reliable and qualified content to help you do your job better.

Learn More About InformIT

Our Imprints

Become a Reviewer

Provide valuable feedback and suggestions on current and new releases from us. Learn more.