Appcelerator Titanium Smartphone App Development Cookbook - Second Edition
¥80.65
Over 100 recipes to help you develop cross-platform, native applications in JavaScript About This Book Leverage your JavaScript skills to write mobile applications using Titanium Studio tools with the native advantage Deploy your application on the App Store and Google Play Add your own IOS native modules in objective-C, in an easy-to-follow step-by-step format Who This Book Is For This book is an essential for any developer learning or using JavaScript who wants to write native UI applications for iOS and Android. No knowledge of Objective-C, Swift and Java is required and you’ll quickly be developing native, cross-platform apps, in JavaScript! What You Will Learn Transfer data between applications with URL schemes, and make your application accessible to other mobile applications and services Connect with remote services using JSON Work with Google Maps and Apple Maps, GPS and annotate routes Create animations and special effects Integrate notifications and connect with social media services such as Facebook and Twitter Build applications with Alloy MVC – a rapid application development framework Design native APIs and use local databases In Detail The mobile web has paved the way but many users want to have “native” applications installed. Using Appcelerator as a platform it’s now possible to write iOS, Android, and Windows phone applications in JavaScript! It allows developers to develop fully native UI applications using Appcelerator studio tools without any knowledge of Objective-C, Swift or Java. This book will take you through the process of building cross-platform, native UI applications for the mobile from scratch. You will learn how to develop apps, how to use GPS, cameras and photos and how to build socially connected apps. You will also learn how to package them for submission to the App Store and Google Play. This cookbook takes a pragmatic approach to creating applications in JavaScript from putting together basic UIs, to handling events and implementation of third party services such as Twitter, Facebook and Push notifications. The book shows you how to integrate datasources and server APIs, and how to use local databases. The topics covered will guide you to use Appcelerator Studio tools for all the mobile features such as Geolocation, Accelerometer, animation and more. You’ll also learn about Alloy, the Appcelerator MVC framework for rapid app development, and how to transfer data between applications using URLSchemes, enabling other developers to access and launch specific parts of your app. Finally, you will learn how to register developer accounts and publish your very own applications on the App Store and Google Play. Style and approach This book offers a set of practical recipes with a step-by-step approach for building native applications for both the iOS and Android using JavaScript. This hands-on guide shows you exactly how to use the Appcelerator platform to rapidly develop cross-platform, native apps.
Test-Driven Machine Learning
¥71.93
Control your machine learning algorithms using test-driven development to achieve quantifiable milestones About This Book Build smart extensions to pre-existing features at work that can help maximize their value Quantify your models to drive real improvement Take your knowledge of basic concepts, such as linear regression and Na?ve Bayes classification, to the next level and productionalize their models Play what-if games with your models and techniques by following the test-driven exploration process Who This Book Is For This book is intended for data technologists (scientists, analysts, or developers) with previous machine learning experience who are also comfortable reading code in Python. You may be starting, or have already started, a machine learning project at work and are looking for a way to deliver results quickly to enable rapid iteration and improvement. Those looking for examples of how to isolate issues in models and improve them will find ideas in this book to move forward. What You Will Learn Get started with an introduction to test-driven development and familiarize yourself with how to apply these concepts to machine learning Build and test a neural network deterministically, and learn to look for niche cases that cause odd model behaviour Learn to use the multi-armed bandit algorithm to make optimal choices in the face of an enormous amount of uncertainty Generate complex and simple random data to create a wide variety of test cases that can be codified into tests Develop models iteratively, even when using a third-party library Quantify model quality to enable collaboration and rapid iteration Adopt simpler approaches to common machine learning algorithms Take behaviour-driven development principles to articulate test intent In Detail Machine learning is the process of teaching machines to remember data patterns, using them to predict future outcomes, and offering choices that would appeal to individuals based on their past preferences. Machine learning is applicable to a lot of what you do every day. As a result, you can’t take forever to deliver your first iteration of software. Learning to build machine learning algorithms within a controlled test framework will speed up your time to deliver, quantify quality expectations with your clients, and enable rapid iteration and collaboration. This book will show you how to quantifiably test machine learning algorithms. The very different, foundational approach of this book starts every example algorithm with the simplest thing that could possibly work. With this approach, seasoned veterans will find simpler approaches to beginning a machine learning algorithm. You will learn how to iterate on these algorithms to enable rapid delivery and improve performance expectations. The book begins with an introduction to test driving machine learning and quantifying model quality. From there, you will test a neural network, predict values with regression, and build upon regression techniques with logistic regression. You will discover how to test different approaches to na?ve bayes and compare them quantitatively, along with how to apply OOP (Object-Oriented Programming) and OOP patterns to test-driven code, leveraging SciKit-Learn. Finally, you will walk through the development of an algorithm which maximizes the expected value of profit for a marketing campaign by combining one of the classifiers covered with the multiple regression example in the book. Style and approach An example-driven guide that builds a deeper knowledge and understanding of iterative machine learning development, test by test. Each topic develops solutions using failing tests to illustrate problems; these are followed by steps to pass the tests, simply and straightforwardly. Topics which use generated data explore how the data was generated, alongside explanations of the assumptions behind different machine learning techniques.
Arduino for Secret Agents
¥54.49
Transform your tiny Arduino device into a secret agent gadget to build a range of espionage projects with this practical guide for hackers About This Book Discover the limitless possibilities of the tiny Arduino and build your own secret agent projects From a fingerprint sensor to a GPS Tracker and even a robot– learn how to get more from your Arduino Build nine secret agent projects using the power and simplicity of the Arduino platform Who This Book Is For This book is for Arduino programmers with intermediate experience of developing projects, and who want to extend their knowledge by building projects for secret agents. It would also be great for other programmers who are interested in learning about electronics and programming on the Arduino platform. What You Will Learn Get to know the full range of Arduino features so you can be creative through practical projects Discover how to create a simple alarm system and a fingerprint sensor Find out how to transform your Arduino into a GPS tracker Use the Arduino to monitor top secret data Build a complete spy robot! Build a set of other spy projects such as Cloud Camera and Microphone System In Detail Q might have Bond’s gadgets– but he doesn’t have an Arduino (not yet at least). Find out how the tiny Arduino microcomputer can be used to build an impressive range of neat secret agent projects that can help you go undercover and get to grips with the cutting-edge of the world of espionage with this book, created for ardent Arduino fans and anyone new to the powerful device. Each chapter shows you how to construct a different secret agent gadget, helping you to unlock the full potential of your Arduino and make sure you have a solution for every tricky spying situation. You’ll find out how to build everything from an alarm system to a fingerprint sensor, each project demonstrating a new feature of Arduino, so you can build your expertise as you complete each project. Learn how to open a lock with a text message, monitor top secret data remotely, and even create your own Arduino Spy Robot, Spy Microphone System, and Cloud Spy Camera This book isn’t simply an instruction manual – it helps you put your knowledge into action so you can build every single project to completion. Style and approach This practical reference guide shows you how to build various projects with step-by-step explanations on each project, starting with the assembly of the hardware, followed by basics tests of all those hardware components and finally developing project on the hardware.
AngularJS Directives Cookbook
¥71.93
Extend the capabilities of AngularJS and build dynamic web applications by creating customized directives with this selection of more than 30 recipes About This Book Learn how to extend HTML templates in new ways to build even better web applications with exceptional interface components Build reusable directives for large-scale AngularJS applications Create even sophisticated and impressive modern web apps with ease Who This Book Is For This book is for developers with AngularJS experience who want to extend their knowledge to create or customize directives in any type of AngularJS application. Some experience of modern tools such as Yeoman and Bower would be helpful, but is not a requirement. What You Will Learn Build and customize external HTML templates, and create simple, effective directives for common interface components Learn how to use Controller function and any Bootstrap UI directives to manipulate the DOM and how to transform any UI library into AngularJS directives Construct an AngularJS application to use shared components and validate your HTML5 Discover how to use jQuery events and manipulate the DOM using jQuery UI inside AngularJS applications Create custom directives for ongoing projects using Yeoman generators, and find out how to implement standalone directives Build reusable directives for Large AngularJS applications and extend directives to use dynamic templates Write unit test for directives using the Karma runner and Jasmine’s behavior-driven development framework In Detail AngularJS directives are at the center of what makes it such an exciting – and important - web development framework. With directives, you can take greater control over HTML elements on your web pages – they ‘direct’ Angular’s HTML compiler to behave in the way you want it to. It makes building modern web applications a much more expressive experience, and allows you to focus more closely on improving the way that user interaction impacts the DOM and the way your app manages data. If you’re already using Angular, you probably recognize the power of directives to transform the way you understand and build your projects – but customizing and creating your own directives to harness AngularJS to its full potential can be more challenging. This cookbook shows you how to do just that – it’s a valuable resource that demonstrates how to use directives at every stage in the workflow. Packed with an extensive range of solutions and tips that AngularJS developers shouldn’t do without, you’ll find out how to make the most of directives. You’ll find recipes demonstrating how to build a number of different user interface components with directives, so you can take complete control over how users interact with your application. You’ll also learn how directives can simplify the way you work by creating reusable directives – by customizing them with Yeoman you can be confident that you’re application has the robust architecture that forms the bedrock of the best user experiences. You’ll also find recipes that will help you learn how to unit test directives, so you can be confident in the reliability and performance of your application. Whether you’re looking for guidance to dive deeper into AngularJS directives, or you want a reliable resource, relevant to today’s web development challenges, AngularJS Directives Cookbook delivers everything you need in an easily accessible way. Style and approach This book easy-to-follow guide is packed with hands-on recipes to help you build modular AngularJS applications with custom directives. It presents tips on using the best tools and various ways to use these tools for front-end development.
Web Penetration Testing with Kali Linux - Second Edition
¥90.46
Build your defense against web attacks with Kali Linux 2.0 About This Book Gain a deep understanding of the flaws in web applications and exploit them in a practical manner Get hands-on web application hacking experience with a range of tools in Kali Linux 2.0 Develop the practical skills required to master multiple tools in the Kali Linux 2.0 toolkit Who This Book Is For If you are already working as a network penetration tester and want to expand your knowledge of web application hacking, then this book tailored for you. Those who are interested in learning more about the Kali Sana tools that are used to test web applications will find this book a thoroughly useful and interesting guide. What You Will Learn Set up your lab with Kali Linux 2.0 Identify the difference between hacking a web application and network hacking Understand the different techniques used to identify the flavor of web applications Expose vulnerabilities present in web servers and their applications using server-side attacks Use SQL and cross-site *ing (XSS) attacks Check for XSS flaws using the burp suite proxy Find out about the mitigation techniques used to negate the effects of the Injection and Blind SQL attacks In Detail Kali Linux 2.0 is the new generation of the industry-leading BackTrack Linux penetration testing and security auditing Linux distribution. It contains several hundred tools aimed at various information security tasks such as penetration testing, forensics, and reverse engineering. At the beginning of the book, you will be introduced to the concepts of hacking and penetration testing and will get to know about the tools used in Kali Linux 2.0 that relate to web application hacking. Then, you will gain a deep understanding of SQL and command injection flaws and ways to exploit the flaws. Moving on, you will get to know more about *ing and input validation flaws, AJAX, and the security issues related to AJAX. At the end of the book, you will use an automated technique called fuzzing to be able to identify flaws in a web application. Finally, you will understand the web application vulnerabilities and the ways in which they can be exploited using the tools in Kali Linux 2.0. Style and approach This step-by-step guide covers each topic with detailed practical examples. Every concept is explained with the help of illustrations using the tools available in Kali Linux 2.0.
Creating Data Stories with Tableau Public
¥63.21
Illustrate your data in a more interactive and interesting way using Tableau Public About This Book Learn the basics of creating visualizations with Tableau using this concise reference book Understand how to join and aggregate your data sources using Tableau It is a step by step guide that uses examples to help you understand the key concepts and feature of Tableau Public Who This Book Is For This book is targeted at investigative journalists and bloggers with an interest in making rich and interactive data visualizations. Intermediate Tableau Public users and organizations can also use this book as a reference guide and teaching aid. Members of the media team, such as data specialists, web developers, editors, producers, and managers can also benefit from an understanding of the structure and challenges of writing an interactive and interesting data visualization using Tableau Public. What You Will Learn Connect to various data sources and understand what data is appropriate for Tableau Public Understand chart types and when to use specific chart types with different types of data Join and aggregate data for use in Tableau Public data stories Discover features of Tableau Public, from basic to advanced Involve calculations in Tableau Public Build geographic maps to bring context to data Create dashboards from one or more separate data visualizations Create filters and actions to allow greater interactivity to Tableau Public visualizations and dashboards Publish and embed Tableau visualizations and dashboards in articles In Detail Tableau Public is a very useful tool in anyone's data reporting toolbox that allows authors to add an interactive data element to any article. It allows investigative journalists and bloggers to tell a “data story”, allowing others to explore your data visualization. The relative ease of Tableau Public visualization creation allows data stories to be developed rapidly. It allows readers to explore data associations in multiple-sourced public data, and uses state-of-the-art dashboard and chart graphics to immerse the users in an interactive experience. This book offers investigative journalists, bloggers, and other data story tellers a rich discussion of visualization creation topics, features, and functions. This book allows data story tellers to quickly gain confidence in understanding and expanding their visualization-creation knowledge, and allows them to quickly create interesting, interactive data visualizations to bring a richness and vibrancy to complex articles. The book takes you from basic concepts in visualization creation, like connecting to data sources, cleansing data, chart types, common functions, map creation, and publishing to the Web, to more advanced functions. It is a great overview and reference guide for beginner to intermediate Tableau Public data story tellers, and covers creation of Tableau Public visualizations of varying complexities. Style and approach This book is a crisp, systematic, and tutorial-styled guide to building interactive Tableau visualizations.
Building a Game with Unity and Blender
¥80.65
Learn how to build a complete 3D game using the industry-leading Unity game development engine and Blender, the graphics software that gives life to your ideas About This Book Learn the fundamentals of two powerful tools and put the concepts into practice Find out how to designand buildall the core elements required for a great game - from characters to environments, to props— Learn how to integrate Artificial Intelligence (AI) into your game for sophisticated and engaging gameplay Who This Book Is For This book has been created for anyone who wants to learn how to develop their own game using Blender and Unity, both of which are freely available, yet very popular and powerful, tools. Not only will you be able to master the tools, but you will also learn the entire process of creating a game from the ground up. What You Will Learn Design and create a game concept that will determine how your game will look and how it will be played Construct 3D models of your game characters and create animations for them before importing them into the game Build the game environment from scratch by constructing the terrain and props, and eventually put it all together to form a scene Import and integrate game assets created in Blender into Unity—for example, setting up textures, materials, animation states, and prefabs Develop game structures including a game flow, user interface diagram, game logic, and a state machine Make the game characters move around and perform certain actions either through player inputs or fully controlled by artificial intelligence Create particles and visual effects to enhance the overall visual aesthetic Deploy the game for various types of platforms In Detail In the wake of the indie game development scene, game development tools are no longer luxury items costing up to millions of dollars but are now affordable by smaller teams or even individual developers. Among these cutting-edge applications, Blender and Unity stand out from the crowd as a powerful combination that allows small-to-no budget indie developers or hobbyists alike to develop games that they have always dreamt of creating. Starting from the beginning, this book will cover designing the game concept, constructing the gameplay, creating the characters and environment, implementing game logic and basic artificial intelligence, and finally deploying the game for others to play. By sequentially working through the steps in each chapter, you will quickly master the skills required to develop your dream game from scratch. Style and approach A step-by-step approach with tons of screenshots and sample code for readers to follow and learn from. Each topic is explained sequentially and placed in context so that readers can get a better understanding of every step in the process of creating a fully functional game.
Windows Malware Analysis Essentials
¥90.46
Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set About This Book Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware Understand how to decipher x86 assembly code from source code inside your favourite development environment A step-by-step based guide that reveals malware analysis from an industry insider and demystifies the process Who This Book Is For This book is best for someone who has prior experience with reverse engineering Windows executables and wants to specialize in malware analysis. The book presents the malware analysis thought process using a show-and-tell approach, and the examples included will give any analyst confidence in how to approach this task on their own the next time around. What You Will Learn Use the positional number system for clear conception of Boolean algebra, that applies to malware research purposes Get introduced to static and dynamic analysis methodologies and build your own malware lab Analyse destructive malware samples from the real world (ITW) from fingerprinting and static/dynamic analysis to the final debrief Understand different modes of linking and how to compile your own libraries from assembly code and integrate the codein your final program Get to know about the various emulators, debuggers and their features, and sandboxes and set them up effectively depending on the required scenario Deal with other malware vectors such as pdf and MS-Office based malware as well as *s and shellcode In Detail Windows OS is the most used operating system in the world and hence is targeted by malware writers. There are strong ramifications if things go awry. Things will go wrong if they can, and hence we see a salvo of attacks that have continued to disrupt the normal scheme of things in our day to day lives. This book will guide you on how to use essential tools such as debuggers, disassemblers, and sandboxes to dissect malware samples. It will expose your innards and then build a report of their indicators of compromise along with detection rule sets that will enable you to help contain the outbreak when faced with such a situation. We will start with the basics of computing fundamentals such as number systems and Boolean algebra. Further, you'll learn about x86 assembly programming and its integration with high level languages such as C++.You'll understand how to decipher disassembly code obtained from the compiled source code and map it back to its original design goals. By delving into end to end analysis with real-world malware samples to solidify your understanding, you'll sharpen your technique of handling destructive malware binaries and vector mechanisms. You will also be encouraged to consider analysis lab safety measures so that there is no infection in the process. Finally, we'll have a rounded tour of various emulations, sandboxing, and debugging options so that you know what is at your disposal when you need a specific kind of weapon in order to nullify the malware. Style and approach An easy to follow, hands-on guide with de*ions and screenshots that will help you execute effective malicious software investigations and conjure up solutions creatively and confidently.
Oracle SOA Suite 12c Administrator's Guide
¥107.90
A guide to everything an Oracle SOA Suite 12c administrator needs to hit the ground running About This Book Understand core administrative tasks such as deployments, purging, startup and shutdown, configuration, and backup and recovery Manage, monitor, and troubleshoot SOA composites and OSB services Follow step-by-step instructions to easily and quickly install a highly available two-node cluster Who This Book Is For With topic areas ranging from the simple to the complex, this book is intended for novice, mid-level, and experienced administrators of the Oracle SOA Suite 12c platform as well as Oracle WebLogic Server and Oracle Database administrators interested in diving into the product. What You Will Learn Navigate Oracle Enterprise Manager Fusion Middleware Control Monitor and manage the Oracle SOA Suite 12 c infrastructure Deploy and promote code Monitor and manage services Configure and administer the environment Manage the dehydration store and enterprise scheduler service Troubleshoot Oracle SOA Suite 12c infrastructure Set up backups, recovery, and high availability In Detail Oracle SOA Suite 12 c is the most comprehensive and integrated infrastructure on the market today that is used for building applications based on service-oriented architecture. With the vast number of features and capabilities that Oracle SOA Suite 12c has to offer comes numerous complexities and challenges for administration. Oracle SOA Suite 12c Administrator's Guide covers all the core areas of administration needed for you to effectively manage and monitor the Oracle SOA Suite environment and its transactions, from deployments, to monitoring, to performance tuning, and much, much more. Manage, monitor, and troubleshoot SOA composites and OSB services from a single product set. Understand core administrative activities such as deployments, purging, startup and shutdown, configuration, backup, and recovery. Also learn about new features such as Oracle Enterprise Scheduler, lazy loading, work manager groups, high availability, and more. Style and approach Presented in a reference guide format where chapters can be read in any sequence, this book explains the core concepts while providing real-world implementation specifics, detailing the what, why, and how of all the administration-related activities that involve Oracle SOA Suite 12c. We take a step-by-step approach and offers tips, instructions, and examples that you can easily follow and execute.
The Dangerous Dandy
¥24.44
Left all but penniless by the death of her husband, Lady Maude Camberley is reduced to scraping a living through gambling and the generosity of Society gentlemen. So when the stupendously wealthy but conceited and cruel Prince Ahmadi of Kahriz offers her ten thousand pounds for the hand in marriage of her young beautiful daughter, Alyna, she accepts at once. Poor Alyna is utterly mortified and horrified as she finds the Prince utterly repulsive and could bear it if he touched her. Her mother will not listen to her pleas as she is frantic for the money the Prince has offered her. Alyna is so desperate that she is on the verge of suicide when a handsome Good Samaritan dissuades her on the bank of the River Thames. He is the handsome and debonair Lord Dorrington, who is instantly struck by Alyna’s plight and he then sets about protecting her from the evil Prince’s clutches. Alynda is adamant that she hates all men and will never marry, but gradually the noble good looks and gentle humour of Lord Dorrington helps to change her mind. And just as she realises that she is in love, the dastardly Prince reappears bent on revenge and she fears desperately for the life of her newfound love.
Building a Home Security System with Raspberry Pi
¥63.21
Build your own sophisticated modular home security system using the popular Raspberry Pi board About This Book This book guides you through building a complete home security system with Raspberry Pi and helps you remotely access it from a mobile device over the Interne It covers the fundamentals of interfacing sensors and cameras with the Raspberry Pi so that you can connect it to the outside world It follows a modular approach so that you can choose the modules and features you want for your customized home security system Who This Book Is For This book is for anyone who is interested in building a modular home security system from scratch using a Raspberry Pi board, basic electronics, sensors, and simple *s. This book is ideal for enthusiastic novice programmers, electronics hobbyists, and engineering professionals. It would be great if you have some basic soldering skills in order to build some of the interface modules. What You Will Learn Understand the concepts behind alarm systems and intrusion detection devices Connect sensors and devices to the on-board digital GPIO ports safely Monitor and control connected devices easily using Bash shell *ing Build an I/O port expander using the I2C bus and connect sensors and anti-tamper circuits Capture and store images using motion detectors and cameras Access and manage your system remotely from your mobile phone Receive intrusion alerts and images through your e-mail Build a sophisticated multi-zone alarm system In Detail The Raspberry Pi is a powerful low-cost credit-card-sized computer, which lends itself perfectly as the controller for a sophisticated home security system. Using the on-board interfaces available, the Raspberry Pi can be expanded to allow the connection of a virtually infinite number of security sensors and devices. The Raspberry Pi has the processing power and interfaces available to build a sophisticated home security system but at a fraction of the cost of commercially available systems. Building a Home Security System with Raspberry Pi starts off by showing you the Raspberry Pi and how to set up the Linux-based operating system. It then guides you through connecting switch sensors and LEDs to the native GPIO connector safely, and how to access them using simple Bash *s. As you dive further in, you’ll learn how to build an input/output expansion board using the I2C interface and power supply, allowing the connection of the large number of sensors needed for a typical home security setup. In the later chapters of the book, we'll look at more sophisticated topics such as adding cameras, remotely accessing the system using your mobile phone, receiving intrusion alerts and images by e-mail, and more. By the end of the book, you will be well-versed with the use of Raspberry Pi to power a home-based security system that sends message alerts whenever it is triggered and will be able to build a truly sophisticated and modular home security system. You will also gain a good understanding of Raspberry Pi's ecosystem and be able to write the functions required for a security system. Style and approach This easy-to-follow guide comprises a series of projects, where every chapter introduces a new concept and at the end of the book, all these concepts are brought together to create an entire home security system. This book features clear diagrams and code every step of the way.
Mastering Linux Shell Scripting
¥63.21
Master the complexities of Bash shell *ing and unlock the power of shell for your enterprise About This Book Identify the high level steps such as verifying user input, using command lines and conditional statements in creating and executing simple shell *s Create and edit dynamic shell *s to manage complex and repetitive tasks Learn about *ing in Perl and programming in Python as a BASH *ing alternative with this practical, step-by-step guide Who This Book Is For Mastering Linux Shell Scripting has been written for Linux administrators who want to automate tasks in their daily lives, saving time and effort. You’ll need to have command-line experience and be familiar with the tasks that you need to automate. What You Will Learn Use the type command to identify the order of command evaluation Create interactive *s that prompt for user input Foster menu structures for operators with little command-line experience Develop *s that dynamically edit web configuration files to produce a new virtual host Write *s that use AWK to search and reports on log files Draft effective *s using functions as building blocks, reducing maintenance and build time Make informed choices by comparing different * languages such as Perl and Python with BASH In Detail Shell *ing is a quick method to prototype a complex application or a problem by automating tasks when working on Linux-based systems. Using both simple one-line commands and command sequences complex problems can be solved with ease, from text processing to backing up sysadmin tools. In this book, you’ll discover everything you need to know to master shell *ing and make informed choices about the elements you employ. Get to grips with the fundamentals of creating and running a * in normal mode, and in debug mode. Learn about various conditional statements' code snippets, and realize the power of repetition and loops in your shell *. Implement functions and edit files using the Stream Editor, * in Perl, program in Python – as well as complete coverage of other *ing languages to ensure you can choose the best tool for your project. Style and approach The book will capture your attention and keep you engaged with the simplicity and clarity of each explanation. Every step is accompanied with screen captures so you can cross-check the results before moving on.
wxPython Application Development Cookbook
¥80.65
Over 80 step-by-step recipes to get you up to speed with building your own wxPython applications About This Book This book empowers you to create rich cross-platform graphical user interfaces using Python It helps you develop applications that can be deployed on Windows, OSX, and Linux The recipes in the book involve real-world applications, giving you a first-hand experience of the practical scenarios Who This Book Is For For those who are familiar with programming in Python and want to start building applications with graphical user interfaces, this book will get you up and running quickly. A basic understanding of the Python programming language and object-oriented concepts are all that is needed. What You Will Learn Create full featured user interfaces Design and develop custom controls Deploy and distribute wxPython applications to Windows, Macintosh OS X, Linux, and other UNIX-like environments Handle and respond to application events Manage and display data using grids Interact with web services from your GUI Use Paint events to draw custom displays Support the display of user interfaces in multiple languages In Detail wxPython is a GUI toolkit for the Python programming language built on top of the cross-platform wxWidgets GUI libraries. wxPython provides a powerful set of tools that allow you to quickly and efficiently building applications that can run on a variety of different platforms. Since wxWidgets provides a wrapper around each platform’s native GUI toolkit, the applications built with wxPython will have a native look and feel wherever they are deployed. This book will provide you with the skills to build highly functional and native looking user interfaces for Python applications on multiple operating system environments. By working through the recipes, you will gain insights into and exposure to creating applications using wxPython. With a wide range of topics covered in the book, there are recipes to get the most basic of beginners started in GUI programming as well as tips to help experienced users get more out of their applications. The recipes will take you from the most basic application constructs all the way through to the deployment of complete applications. Style and approach This book is a collection of step-by-step recipes that introduce the various components and concepts of wxPython in a conversational and easy-to-follow way. Each recipe contains coded examples along with detailed explanations about the key points of each topic. Each topic is designed to introduce and show you how to use a single feature from the wxPython library.
Unity 5 for Android Essentials
¥54.49
This book is perfect for game developers who want to learn how to develop, optimize, and publish games for Android devices in a quick and easy manner using Unity 5. This book assumes a basic knowledge of game design concepts and/or some experience with other game technologies such as Unreal Engine 4, CryEngine, or GameMaker.
Raspberry Pi for Secret Agents - Second Edition
¥45.77
This book is an easy-to-follow guide with practical examples in each chapter. Suitable for the novice and expert alike, each topic provides a fast and easy way to get started with exciting applications and also guides you through setting up the Raspberry Pi as a secret agent toolbox.
Python for Google App Engine
¥54.49
If you are a Python developer, whether you have experience in web applications development or not, and want to rapidly deploy a scalable backend service or a modern web application on Google App Engine, then this book is for you.
Drupal Search Engine Optimization
¥54.49
The book will take a hands-on approach to the process involved in configuring a site for SEO. As SEO is an on-going process – it doesn’t stop once the site is built – the book will provide reusable tips and techniques in order to understand what they have to do after the site is live,This book targets site builders, webmasters and site owners. Advanced technical skills are not required, though the user should be familiar with administering a Drupal website.
Intelligent Document Capture with Ephesoft
¥71.93
Written in easy to follow manner, this book is a complete guide to Document capture with Ephesoft,This book is intended for information technology professionals interested in installing and configuring Ephesoft for their organization, but it is a valuable resource for anyone interested in learning about document capture in general.
OpenLayers Cookbook
¥80.65
This cookbook follows a problem-solution approach to doing important tasks and is packed with examples accompanied by the necessary code and screenshots. If you are a GIS-related professional with some basic knowledge of web technologies and want to start or gain in-depth knowledge of creating web mapping applications, this book is written for you. The recipes are appropriately mixed to suit JavaScript newbies or experts and cover basic to advanced topics on OpenLayers.
Sonar Code Quality Testing Essentials
¥90.46
This is a step-by-step tutorial enriched with practical examples and the necessary screenshots for easy and quick learning. This book is for you if you are a Java developer or a Team Manager familiar with Java and want to ensure the quality of your code using Sonar. You should have a background with Java and unit testing in general.
Microsoft Forefront Identity Manager 2010 R2 Handbook
¥99.18
Throughout the book, we will follow a fictional company, the case study will help you in implementing FIM 2010 R2. All the examples in the book will relate to this fictive company and you will be taken from design, to installation, to configuration of FIM 2010 R2. If you are implementing and managing FIM 2010 R2 in your business, then this book is for you. You will need to have a basic understanding of Microsoft based infrastructure using Active Directory. If you are new to Forefront Identity Management, the case-study approach of this book will help you to understand the concepts and implement them.