Login       My Wishlist
  My Cart
$0.00 / 0 items
 
Translate This Website
International Translation Network
 
International Access
Global Shipping Options Available
Home About Us News Our Blog Our Catalog My Cart My Account Track Shippment Contact Us
  Our Catalog   Computers & Technology   Security & Encryption

Hack and HHVM: Programming Productivity Without Breaking Things


Mega Sale! Save 21% on the Hack and HHVM: Programming Productivity Without Breaking Things by O'Reilly Media at Translate This Website. MPN: black & white illustrations. Hurry! Limited time offer. Offer valid only while supplies last. How can you take advantage of the HipHop Virtual Machine (HHVM) and the Hack programming language, two new technologies that Facebook developed to


Product Description

How can you take advantage of the HipHop Virtual Machine (HHVM) and the Hack programming language, two new technologies that Facebook developed to run their web servers? With this practical guide, Owen Yamauchi—a member of Facebook’s core Hack and HHVM teams—shows you how to get started with these battle-tested open-source tools.

You’ll explore static typechecking and several other features that separate Hack from its PHP origins, and learn how to set up, configure, deploy, and monitor HHVM. Ideal for developers with basic PHP knowledge or experience with other languages, this book also demonstrates how these tools can be used with existing PHP codebases and new projects alike.

  • Learn how Hack provides static typechecking while retaining PHP’s flexible, rapid development capability
  • Write typesafe code with Hack’s generics feature
  • Explore HHVM, a just-in-time compilation runtime engine with full PHP compatibility
  • Dive into Hack collections, asynchronous functions, and the XHP extension for PHP
  • Understand Hack’s design rationale, including why it omits some PHP features
  • Use Hack for multitasking, and for generating HTML securely
  • Learn tools for working with Hack code, including PHP-to-Hack migration

Additional Information

Manufacturer:O'Reilly Media
Part Number:black & white illustrations
Publisher:O'Reilly Media
Studio:O'Reilly Media
MPN:black & white illustrations
EAN:9781491920879
Item Weight:0 pounds
Item Size:0.64 x 9 x 9 inches
Package Weight:1.05 pounds
Package Size:7 x 0.7 x 0.7 inches

Hack and HHVM: Programming Productivity Without Breaking Things by O'Reilly Media

Buy Now:
Hack and HHVM: Programming Productivity Without Breaking Things

Brand: O'Reilly Media
Condition: New
Lead Time: 1 - 2 Business Days
Availability: In Stock
$34.99
$27.75
You Save: 21%


Quantity:  

 


View More In Security & Encryption.

 


Have questions about this item, or would like to inquire about a custom or bulk order?


If you have any questions about this product by O'Reilly Media, contact us by completing and submitting the form below. If you are looking for a specif part number, please include it with your message.

First Name:
Last Last:
Email Address:
Your Message:

Related Best Sellers


ean: 9781539490197, isbn: 153949019X,
Become A Programming Master By Learning These Fundamentals Languages Discover the secret right here, right now ! Have you ever wanted to become a programmer ? If you answered "yes", this book is made for you. You will learn the most popular computer ...

ean: 9781537792125, isbn: 1537792121,
"Install Tor Browser On ANY Device!"Buy It Now For $9.99 $2.99 (70% Off)*OFFER* Buy a paperback copy of this Tor book and receive the Kindle version for only .99 cents!We’re living in an era defined by free-flowing information because of the fast-p...

ean: 9781937434625, isbn: 1937434621,
The Language of Cybersecurity defines 52 terms that every business professional should know about cybersecurity, even professionals who are not specialists. Anyone who uses any kind of computing device needs to understand the importance of cybersecur...

ean: 9780124186767, isbn: 0124186769,
Python Forensics provides many never-before-published proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation provided with the code samples will allow even novice P...

ean: 9780123943972, isbn: 0123943973,
The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they rel...

mpn: illustrations, ean: 9780735617223, isbn: 0735617228,
Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire development process—from designing secure applications to writing robus...

ean: 9781430268185, isbn: 1430268182,
Advanced API Security is a complete reference to the next wave of challenges in enterprise security--securing public and private APIs. API adoption in both consumer and enterprises has gone beyond predictions. It has become the ‘coolest’ way of e...

mpn: Illustrated, ean: 9781597499637, isbn: 1597499633,
SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." –Richard Bejtlich, Tao Secur...

mpn: 9780321822130, ean: 9780321822130, isbn: 0321822137,
Learn the Root Causes of Software Vulnerabilities and How to Avoid Them   Commonly exploited software vulnerabilities are usually caused by avoidable software defects. Having analyzed tens of thousands of vulnerability reports since 1988, CERT has d...



Privacy Policy / Terms of Service
© 2018 - translateth.is. All Rights Reserved.