Hack and HHVM

Programming Productivity Without Breaking Things



Bookstore > Books > Hack and HHVM

Price$7.00 - $35.99
Rating
AuthorOwen Yamauchi
PublisherO'Reilly Media
Published2015
Pages260
LanguageEnglish
FormatPaper book / ebook (PDF)
ISBN-101491920874
ISBN-139781491920879
EBook Hardcover Paperback

A couple of years ago, Facebook switched its production servers from a PHP-to-C++ compiler to their own HipHop Virtual Machine (HHVM) and then launched a new version of PHP to run on HHVM called Hack. This comprehensive guide - written by a member of the core HHVM and Hack teams at Facebook - shows you how to get up and running with both HHVM and Hack.

What makes them useful? The HHVM engine is faster and more performant than the Zend engine, which can save Facebook and other large-scale sites millions of dollars in servers and maintenance. And while the Hack language looks and acts like PHP, it also contains new features such as static typing, generics, native collections, which PHP developers have long needed.

Pick up this book and explore two important programming innovations that help Facebook run a tighter ship.





5 5 8

Similar Books


Hacking Android

Hacking Android

by Srinivasa Rao Kotipalli, Mohammed A. Imran

With the mass explosion of Android mobile phones in the world, mobile devices have become an integral part of our everyday lives. Security of Android devices is a broad subject that should be part of our everyday lives to defend against ever-growing smartphone attacks. Everyone, starting with end users all the way up to developers and sec...

Price:  $34.89  |  Publisher:  Packt Publishing  |  Release:  2016

Black Hat Python

Black Hat Python

by Justin Seitz

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities - writing network sniffers, ...

Price:  $20.99  |  Publisher:  No Starch Press  |  Release:  2014

Hacking and Securing iOS Applications

Hacking and Securing iOS Applications

by Jonathan Zdziarski

If you're an app developer with a solid foundation in Objective-C, this book is an absolute must - chances are very high that your company's iOS applications are vulnerable to attack. That's because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren't ...

Price:  $7.71  |  Publisher:  O'Reilly Media  |  Release:  2012

The Hardware Hacker

The Hardware Hacker

by Andrew "bunnie" Huang

For over a decade, Andrew "bunnie" Huang, one of the world's most esteemed hackers, has shaped the fields of hacking and hardware, from his cult-classic book Hacking the Xbox to the open-source laptop Novena and his mentorship of various hardware startups and developers. In The Hardware Hacker, Huang shares his experiences in ma...

Price:  $3.80  |  Publisher:  No Starch Press  |  Release:  2017

Hacking Exposed Wireless, 2nd Edition

Hacking Exposed Wireless, 2nd Edition

by Johnny Cache, Joshua Wright, Vincent Liu

Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless, second edition reveals how attackers use readily available and custom tools to target, infiltrate, and hija...

Price:  $3.99  |  Publisher:  McGraw-Hill  |  Release:  2010

Hacking VoIP

Hacking VoIP

by Himanshu Dwivedi

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller...

Price:  $16.00  |  Publisher:  No Starch Press  |  Release:  2008

Practical Binary Analysis

Practical Binary Analysis

by Dennis Andriesse

As malware increasingly obfuscates itself and applies anti-analysis techniques to thwart our analysis, we need more sophisticated methods that allow us to raise that dark curtain designed to keep us out - binary analysis can help. The goal of all binary analysis is to determine (and possibly modify) the true properties of binary programs ...

Price:  $29.99  |  Publisher:  No Starch Press  |  Release:  2018

Web Penetration Testing with Kali Linux, 3rd Edition

Web Penetration Testing with Kali Linux, 3rd Edition

by Gilberto Najera-Gutierrez, Juned Ahmed Ansari

Web Penetration Testing with Kali Linux - 3rd Edition shows you how to set up a lab, helps you understand the nature and mechanics of attacking websites, and explains classical attacks in great depth. This edition is heavily updated for the latest Kali Linux changes and the most recent attacks. Kali Linux shines when it comes to client-si...

Price:  $39.99  |  Publisher:  Packt Publishing  |  Release:  2018