万本电子书0元读

万本电子书0元读

Getting Started with Unity 5.x 2D Game Development
Getting Started with Unity 5.x 2D Game Development
Francesco Sapio
¥80.65
Build a tower defense game and earn delectable C# treats by baking cupcakes and fighting fearsome sweet-toothed pandas About This Book Build a complete and exciting 2D Tower Defense game from scratch. Understand and learn to perform each phase of the game development pipeline Homework and exercises to improve your skills and take them to the next level Who This Book Is For If you are looking forward to get started with 2D game development, either if you are a newcomer to this world, or you came from 3D games or other game engines, this book is for you. Although there are many references to other resources throughout the book, it is assumed that you have a general understanding of C# and its syntax and structure. What You Will Learn Import and set up assets for 2D game development Design and implement dynamic and responsive User Interfaces Create and handle complex animation systems Unlock all the potentiality of the physics engine Implement Artificial Intelligence algorithms to give intelligence to your NPCs Script gameplay and overall bring your ideas to life In Detail Want to get started in the world of 2D game development with UnityThis book will take your hand and guide you through this amazing journey to let you know exactly what you need to build the games you want to build, without sacrificing quality. You will build a solid understanding of Unity 5.x, by focusing with the embedded tools to develop 2D games. In learning about these, along with accurate explanations and practical examples, you will design, develop, learn how to market and publish a delectable Tower Defense game about cupcakes versus pandas. Each chapter in this book is structured to give you a full understanding on a specific aspect of the workflow pipeline. Each of these aspects are essential for developing games in Unity. In a step-by-step approach, you will learn about each of the following phases: Game Design, Asset Importing, Scripting, User Interfaces, Animations, Physics, Artificial Intelligence, Gameplay Programming, Polishing and Improving, Marketing, Publishing and much more. This book provides you with exercises and homework at the end of each chapter so that you can level up your skills as a Unity game developer. In addition, each of these parts are centered on a common point of discussion with other learners just like you. Therefore, by sharing your ideas with other people you will not only develop your skills but you will also build a network. Style and approach This is a fun step-by-step approach in the whole pipeline of 2D game development in Unity, which is explained in a conversational and easy-to-follow style. Each topic is explained sequentially, allowing you to experience both basics and advanced features of Unity. By doing this, the book is able to provide you with a solid grasp on each of the topics. In this way, by engaging with the book’s content, exploring the additional references to further readings and completing the homework sections, you are able to challenge yourself and apply what you know in a variety of ways. Once you have finished reading this book, you will be well on your way to developing games from start to finish!
Learning Kibana 5.0
Learning Kibana 5.0
Bahaaldine Azarmi
¥71.93
Exploit the visualization capabilities of Kibana and build powerful interactive dashboards About This Book Introduction to data-driven architecture and the Elastic stack Build effective dashboards for data visualization and explore datasets with Elastic Graph A comprehensive guide to learning scalable data visualization techniques in Kibana Who This Book Is For If you are a developer, data visualization engineer, or data scientist who wants to get the best of data visualization at scale then this book is perfect for you. A basic understanding of Elasticsearch and Logstash is required to make the best use of this book. What You Will Learn How to create visualizations in Kibana Ingest log data, structure an Elasticsearch cluster, and create visualization assets in Kibana Embed Kibana visualization on web pages Scaffold, develop, and deploy new Kibana & Timelion customizations Build a metrics dashboard in Timelion based on time series data Use the Graph plugin visualization feature and leverage a graph query Create, implement, package, and deploy a new custom plugin Use Prelert to solve anomaly detection challenges In Detail Kibana is an open source data visualization platform that allows you to interact with your data through stunning, powerful graphics. Its simple, browser-based interface enables you to quickly create and share dynamic dashboards that display changes to Elasticsearch queries in real time. In this book, you’ll learn how to use the Elastic stack on top of a data architecture to visualize data in real time. All data architectures have different requirements and expectations when it comes to visualizing the data, whether it’s logging analytics, metrics, business analytics, graph analytics, or scaling them as per your business requirements. This book will help you master Elastic visualization tools and adapt them to the requirements of your project. You will start by learning how to use the basic visualization features of Kibana 5. Then you will be shown how to implement a pure metric analytics architecture and visualize it using Timelion, a very recent and trendy feature of the Elastic stack. You will learn how to correlate data using the brand-new Graph visualization and build relationships between documents. Finally, you will be familiarized with the setup of a Kibana development environment so that you can build a custom Kibana plugin. By the end of this book you will have all the information needed to take your Elastic stack skills to a new level of data visualization. Style and approach This book takes a comprehensive, step-by-step approach to working with the visualization aspects of the Elastic stack. Every concept is presented in a very easy-to-follow manner that shows you both the logic and method of implementation. Real world cases are referenced to highlight how each of the key concepts can be put to practical use.
Learning PowerCLI - Second Edition
Learning PowerCLI - Second Edition
Robert van den Nieuwendijk
¥90.46
Learn to leverage the power of PowerCLI to automate your VMware vSphere environment with ease About This Book This is first book on the market that will enlighten you on the latest version of PowerCLI and how to implement it Effectively manage virtual machines, networks, and reports with the latest features of PowerCLI A comprehensive and practical book on automating VMware vSphere Who This Book Is For This book is ideal for you if you want to learn how to automate your VMware vSphere or vCloud infrastructure by getting the most out of PowerCLI. It’s assumed that you have some experience in administrating a vSphere or vCloud environment. Knowledge of Microsoft’s Windows PowerShell is not a prerequisite. What You Will Learn Explore PowerShell and PowerCLI cmdlets and their output objects See how to manage virtual machines and work with virtual networks Manage vCloud Director from PowerCLI Use Site Recovery Manager from PowerCLI to create a disaster recovery solution Manage NSX and vRealize Automation using REST API with PowerCLI Create and configure vSphere HA and DRS clusters Use vSphere Update Manager with PowerCLI to create patch baselines and scan hosts Explore reporting techniques to retrieve log files In Detail VMware vSphere PowerCLI, a free extension to Microsoft Windows PowerShell, enables you to automate the management of a VMware vSphere or vCloud environment. This book will show you how to automate your tasks and make your job easier. Starting with an introduction to the basics of PowerCLI, the book will teach you how to manage your vSphere and vCloud infrastructure from the command line. To help you manage a vSphere host overall, you will learn how to manage vSphere ESXi hosts, host profiles, host services, host firewall, and deploy and upgrade ESXi hosts using Image Builder and Auto Deploy. The next chapter will not only teach you how to create datastore and datastore clusters, but you’ll also work with profile-driven and policy-based storage to manage your storage. To create a disaster recovery solution and retrieve information from vRealize Operations, you will learn how to use Site Recovery Manager and vRealize Operations respectively. Towards the end, you’ll see how to use the REST APIs from PowerShell to manage NSX and vRealize Automation and create patch baselines, scan hosts against the baselines for missing patches, and re-mediate hosts. By the end of the book, you will be capable of using the best tool to automate the management and configuration of VMware vSphere. Style and approach This comprehensive book will teach system administrators everything about PowerCLI 6 and how to utilize it to automate VMware vSphere.
Microsoft System Center 2016 Service Manager Cookbook - Second Edition
Microsoft System Center 2016 Service Manager Cookbook - Second Edition
Anders Asp (MVP)
¥107.90
Discover over 100 practical recipes to help you master the art of IT service management for your organization About This Book Unleash the capabilities of Microsoft System Center 2016 Service Manager Master the skills of configuring, deploying, managing, and troubleshooting your Service Manager 2016 This book contains practical recipes that leverage the key and newly added features and functionalities of Microsoft System Center 2016 Service Manager Who This Book Is For This book will be useful to IT professionals including SCSM administrators who want to configure and administer System Center Service Manager 2016 and understand how to solve specific problems and scenarios that arise. It will also be useful to users of Service Manager 2012 who want to learn about the new features and capabilities of the Service Manager 2016 release. It will be ideal if you have Service Manager experience as well as experience with other System Center products. What You Will Learn See a practical implementation of the ITSM framework and processes based on ITIL Deploy and configure the new Service Manager HTML5 Self-Service Portal along with Service Catalog design and configuration Get to know about Incident, Problem, and Change Management processes and configuration Get to grips with performing advanced personalization in Service Manager Discover how to set up and use automation with and within Service Manager 2016 Work with Service Manager Data Warehouse Find out what Security Roles are and how to implement them Learn how to upgrade from SCSM 2012 R2 to SCSM 2016 In Detail System Center Service Manager (SCSM) is an integrated platform that offers a simplified data center management experience by implementing best practices such as Incident Management, Service Request, and Change Control to achieve efficient service delivery across your organization. This book provides you with real-world recipes that can be used immediately and will show you how to configure and administer SCSM 2016. You’ll also find out how to solve particular problems and scenarios to take this tool further. You’ll start with recipes on implementing ITSM frameworks and processes and configuring Service Level Agreements (SLAs). Then, you'll work through deploying and configuring the HTML5 Self-Service Portal, configuring Incident and Problem Management, and designing and configuring Change and Release Management. You'll also learn about security roles and overall Microsoft SCSM 2016 administration. Toward the end of the book, we’ll look at advanced topics, such as presenting the wealth of information stored within the Service Manager Data Warehouse, standardizing SCSM deployments, and implementing automation. Style and approach This book will enlighten you on Microsoft System Center 2016 Service Manager through recipes that can be implemented directly in any enterprise. You can read the book from start to end if you’re a beginner, or just open up any chapter and start following the recipes as a reference for advanced users. This book consists of a pool of step-by-step recipes on how to perform activities in Service Manager.
Alfresco One 5.x Developer’s Guide - Second Edition
Alfresco One 5.x Developer’s Guide - Second Edition
Benjamin Chevallereau
¥80.65
Discover what it means to be an expert developer by exploring the latest features available to you in Alfresco One 5.x About This Book Create reliable and secure enterprise apps with the latest Alfresco One 5.x platform Explore all the latest Alfresco One 5.x APIs such as the CMIS API, Alfresco One API, and the integrated RESTful API to get more out of your enterprise apps Unleash the power of the latest JavaScript engine and the JavaScript API for Alfresco to customize your existing apps for the Alfresco 5 platform Who This Book Is For If you’re an enterprise app developer who wants to create custom applications with Alfresco, then this book is for you. Previous knowledge with Alfresco would be helpful but is not necessary. What You Will Learn Create and manage a custom content model Configure the Alfresco Share user interface Build a new AngularJS 2.0 application Create business process definitions using Activiti Designer Discover the most common extensions provided by Alfresco Configure Alfresco to authenticate against LDAP, including & chaining" LDAP with Alfresco authentication Get familiar with the latest features of Alfresco Mobile SDK, Smart Search, and the new Angular framework In Detail Do you want to create more reliable and secure solutions for enterprise appsAlfresco One 5.x is your gateway to developing the best industry-standard enterprise apps and this book will help you to become a pro with Alfresco One 5.x development. This book will help you create a complete fully featured app for your organization and while you create that perfect app, you will explore and implement the new and intriguing features of Alfresco. The book starts with an introduction to the Alfresco platform and you’ll see how to configure and customize it. You will learn how to work with the content in a content management system and how you can extend it to your own use case. Next, you will find out how to work with Alfresco Share, an all-purpose user interface for general document management, and customize it. Moving on, you write web *s that create, read, and delete data in the back-end repository. Further on from that, you’ll work with a set of tools that Alfresco provides; to generate a basic AnglularJS application supporting use cases, to name a few authentication, document list, document view. Finally, you’ll learn how to develop your own Alfresco Mobile app and understand how Smart Folders and Search manager work. By the end of the book, you’ll know how to configure Alfresco to authenticate against LDAP, be able to set up Single Sign-On (SSO), and work with Alfresco’s security services. Style and approach This book takes a step-by-step practical tutorial-style approach helping you create a complete enterprise app using Alfresco.
Docker Networking Cookbook
Docker Networking Cookbook
Jon Langemak
¥90.46
60 practical recipes that help you gain expertise with Docker networking and understand the underlying constructs that make it all work About This Book Enhance your Docker networking skills and protect your organization using advanced networking functions Learn how to use third party tools to extend Docker networking This practical and recipe-based book demonstrates the different ways in which you can network containers leveraging the Docker engine. Who This Book Is For The book is for system administrators as well as developers who are well versed with the concepts of Docker and have basic knowledge of Docker networking. You should also have sound knowledge of networking in general. What You Will Learn Configure Linux networking primitives used by Docker networking Build and deploy user-defined Docker networks Examine the different options for resolving and linking containers Implement custom networks for Docker to consume Discover third-party networking plugins such as Weave and Flannel Work through solutions to secure Docker containers and networks Observe methodologies for troubleshooting container networks Explore advanced and experimental Docker networking features In Detail Networking functionality in Docker has changed considerably since its first release, evolving to offer a rich set of built-in networking features, as well as an extensible plugin model allowing for a wide variety of networking functionality. This book explores Docker networking capabilities from end to end. Begin by examining the building blocks used by Docker to implement fundamental containing networking before learning how to consume built-in networking constructs as well as custom networks you create on your own. Next, explore common third-party networking plugins, including detailed information on how these plugins inter-operate with the Docker engine. Consider available options for securing container networks, as well as a process for troubleshooting container connectivity. Finally, examine advanced Docker networking functions and their relevant use cases, tying together everything you need to succeed with your own projects. Style and approach This practical recipe-based book will take readers to next level of Docker networking. It covers relevant use cases and the advanced features of Docker
Gamification with Unity 5.x
Gamification with Unity 5.x
Lauren S. Ferro
¥80.65
Build exhilarating gaming experiences using a wide range of game elements in Unity 5.x About This Book Achieve your goals in a fun-filled way by creating gamification projects from scratch Leverage the Unity 5.X toolkit to create stunning and appealing projects Make your transition towards a pro project manager/ developer by learning tricks and techniques Who This Book Is For If you are a project manager, game developer, or programmer who wants to create successful end-to-end gamification projects from scratch, then this is the book for you. You do not need any previous experience of working with Unity 5.X. All the details required to make the most of gamifying your projects are provided in the book. What You Will Learn Assess your learners’ abilities by setting up challenges and quests Implement the game elements that relate to the project into Unity Publish your own task management application to better engage readers Improve your design using methods of playtesting and iteration Issue OpenBadges to recognize achievements and set up an online database to store your users achievements. In Detail Are you looking at implementing gamification techniques for your business and wondering where to get a complete rundown of all the tricks and techniquesWell, you have come to the right place! This book will start right from the basics such as gameplay elements and their functionalities before gradually moving onto creating your first gamification project from scratch. You’ll be given the tools and shown how to perform various techniques for creating gamified applications in different contexts. Finally, you will implement various game elements into Unity, publish your own task management application, and get to know the best practices and approaches when designing gamified experiences. Style and approach This book takes a real-world case studies approach, moving ahead in a step-by-step tutorial manner. You will create your own project from scratch, and the practical examples will help you create a successful gamification project.
Learning iOS Penetration Testing
Learning iOS Penetration Testing
Swaroop Yermalkar
¥71.93
Secure your iOS applications and uncover hidden vulnerabilities by conducting penetration testsAbout This BookAchieve your goal to secure iOS devices and applications with the help of this fast paced manualFind vulnerabilities in your iOS applications and fix them with the help of this example-driven guideAcquire the key skills that will easily help you to perform iOS exploitation and forensics with greater confidence and a stronger understandingWho This Book Is ForThis book is for IT security professionals who want to conduct security testing of applications. This book will give you exposure to diverse tools to perform penetration testing. This book will also appeal to iOS developers who would like to secure their applications, as well as security professionals. It is easy to follow for anyone without experience of iOS pentesting.What You Will LearnUnderstand the basics of iOS app development, deployment, security architecture, application signing, application sandboxing, and OWASP TOP 10 for mobileSet up your lab for iOS app pentesting and identify sensitive information stored locallyPerform traffic analysis of iOS devices and catch sensitive data being leaked by side channelsModify an application’s behavior using runtime analysisAnalyze an application’s binary for security protectionAcquire the knowledge required for exploiting iOS devicesLearn the basics of iOS forensicsIn DetailiOS has become one of the most popular mobile operating systems with more than 1.4 million apps available in the iOS App Store. Some security weaknesses in any of these applications or on the system could mean that an attacker can get access to the device and retrieve sensitive information. This book will show you how to conduct a wide range of penetration tests on iOS devices to uncover vulnerabilities and strengthen the system from attacks.Learning iOS Penetration Testing discusses the common vulnerabilities and security-related shortcomings in an iOS application and operating system, and will teach you to conduct static and dynamic analysis of iOS applications.This practical guide will help you uncover vulnerabilities in iOS phones and applications. We begin with basics of iOS security and dig deep to learn about traffic analysis, code analysis, and various other techniques. Later, we discuss the various utilities, and the process of reversing and auditing.Style and approachThis fast-paced and practical guide takes a step-by-step approach to penetration testing with the goal of helping you secure your iOS devices and apps quickly.
Getting Started with ResearchKit
Getting Started with ResearchKit
Edward Cessna
¥80.65
Enter the era of medical research using mobile devices with the help of this guide on ResearchKit!About This BookCreate a simple clinical research app using most aspects of ResearchKitBuild a simple survey with various data types with the results printed on the screen.A step-by-step guide introducing Apple's ResearchKit and techniques to incorporate it into various apps.Who This Book Is ForThis book is aimed at medical researchers with basic iOS coding knowledge and iOS developers looking to create clinical research apps.What You Will LearnLearn to create customized consent formGet introduced to two backend services: a simple backend server using Sinatra and Sage BridgeBuild a custom task (a conditional survey example) and a navigable taskGet an Overview of ResearchKit's open source repository and App CoreInteraction with the hardware of the device including the gyro and the motion sensorsLearn the basics of this revolutionary technologyGet introduced to the barebones app and learn to write your first codeIn DetailResearchKit is an open source software development framework from Apple that lets you easily create mobile applications for clinical research studies. ResearchKit provides you the ability to orchestrate the administration of tasks and recording of the results. ResearchKit provides tasks in order to perform informed consent, active tasks, and surveys.Starting with the basics of the ResearchKit framework, this books walks you through the steps of creating iOS applications that could serve as the basis of a clinical research mobile app.This book will introduce readers to ResearchKit and how to turn your iPhone into into a clinical research tool. The book will start off by installing and building the research framework in line with the researcher's needs; during this, the reader will learn to embed ResearchKit in the application and create a small task.After this, the book will go a little deeper into creating modules for surveys, consents, and so on. The book will also cover the various aspects of privacy and security with regard to participant data, and how to build dashboards for visualizing medical data and results in line with the researcher's requirements: data backends, JSON serialization and deserialization, and so on.Readers will be able to fully utilize ResearchKit for medical research, will be able to get more and more patients to participate in their surveys, and will gain insights from the surveys using the dashboards created.Style and approachA hands-on guide with ample screenshots for you to follow and learn about ResearchKit. Each topic is explained sequentially and placed in context so that you can get a better understanding of every step in the process of creating clinical research apps.
Advanced Oracle PL/SQL Developer's Guide - Second Edition
Advanced Oracle PL/SQL Developer's Guide - Second Edition
Saurabh K. Gupta
¥107.90
Master the advanced concepts of PL/SQL for professional-level certification and learn the new capabilities of Oracle Database 12cAbout This BookLearn advanced application development features of Oracle Database 12c and prepare for the 1Z0-146 examinationBuild robust and secure applications in Oracle PL/SQL using the best practicesPacked with feature demonstrations and illustrations that will help you learn and understand the enhanced capabilities of Oracle Database 12cWho This Book Is ForThis book is for Oracle developers responsible for database management. Readers are expected to have basic knowledge of Oracle Database and the fundamentals of PL/SQL programming. Certification aspirants can use this book to prepare for 1Z0-146 examination in order to be an Oracle Certified Professional in Advanced PL/SQL.What You Will LearnLearn and understand the key SQL and PL/SQL features of Oracle Database 12cUnderstand the new Multitenant architecture and Database In-Memory option of Oracle Database 12cKnow more about the advanced concepts of the Oracle PL/SQL language such as external procedures, securing data using Virtual Private Database (VPD), SecureFiles, and PL/SQL code tracing and profilingImplement Virtual Private Databases to prevent unauthorized data accessTrace, analyze, profile, and debug PL/SQL code while developing database applicationsIntegrate the new application development features of Oracle Database 12c with the current conceptsDiscover techniques to analyze and maintain PL/SQL codeGet acquainted with the best practices of writing PL/SQL code and develop secure applicationsIn DetailOracle Database is one of the most popular databases and allows users to make efficient use of their resources and to enhance service levels while reducing the IT costs incurred. Oracle Database is sometimes compared with Microsoft SQL Server, however, Oracle Database clearly supersedes SQL server in terms of high availability and addressing planned and unplanned downtime. Oracle PL/SQL provides a rich platform for application developers to code and build scalable database applications and introduces multiple new features and enhancements to improve development experience.Advanced Oracle PL/SQL Developer's Guide, Second Edition is a handy technical reference for seasoned professionals in the database development space. This book starts with a refresher of fundamental concepts of PL/SQL, such as anonymous block, subprograms, and exceptions, and prepares you for the upcoming advanced concepts. The next chapter introduces you to the new features of Oracle Database 12c, not limited to PL/SQL. In this chapter, you will understand some of the most talked about features such as Multitenant and Database In-Memory. Moving forward, each chapter introduces advanced concepts with the help of demonstrations, and provides you with the latest update from Oracle Database 12c context. This helps you to visualize the pre- and post-applications of a feature over the database releases. By the end of this book, you will have become an expert in PL/SQL programming and will be able to implement advanced concepts of PL/SQL for efficient management of Oracle Database.Style and approach The book follows the structure of the Oracle Certification examination but doesn't restrict itself to the exam objectives. Advanced concepts have been explained in an easy-to-understand style, supported with feature demonstrations and case illustrations.
Test-Driven iOS Development with Swift
Test-Driven iOS Development with Swift
Dr. Dominik Hauser
¥71.93
Create fully-featured and highly functional iOS apps by writing tests firstAbout This BookLearn test-driven principles to help you build apps with fewer bugs and better designsBecome more efficient while working with Swift to move on to your next project faster!Learn how to incorporate all of the principles of test-driven development (TDD) in to your daily programming workflowWho This Book Is ForIf debugging iOS apps is a nerve-racking task for you and you are looking for a fix, this book is for you.What You Will LearnImplement TDD in swift application developmentGet to know the fundamentals, life cycle, and benefits of TDDExplore the tools and frameworks to effectively use TDDDevelop models and controllers driven by testsConstruct the network layer using stubsUse functional tests to ensure the app works as plannedAutomate and streamline the building, analysing, testing, and archiving of your iOS appsIn DetailTest-driven development (TDD) is a proven way to find software bugs early. Writing tests before your code improves the structure and maintainability of your app.Test-driven iOS Development with Swift will help you understand the process of TDD and how it impacts your applications written in Swift. Through practical, real-world examples, you’ll start seeing how to implement TDD in context. We will begin with an overview of your TDD workflow and then deep-dive into unit testing concepts and code cycles. We will showcase the workings of functional tests, which will help you improve the user interface. Finally, you will learn about automating deployments and continuous integration to run an environment.Style and approachThis is an easy-to-follow example-driven tutorial, packed with lots of tips and tricks that explore TDD bit-by-bit in the process of making an iOS application.
Learning CoreOS
Learning CoreOS
Kingston Smiler. S
¥71.93
Your one-stop guide for building, configuring, maintaining, and deploying one of the world's fastest growing OSes About This Book Understand the features of CoreOS and learn to administrate and secure a CoreOS environment Develop, test, and deploy cloud services and applications more quickly and efficiently inside lightweight containers using CoreOS This is a complete tutorial on CoreOS, which is the preferred OS for cloud computing as it contains components that facilitate cloud management Who This Book Is For This book is for cloud or enterprise administrators and application developers who would like to gain knowledge about CoreOS to deploy a cloud application or micro-services on a cluster of cloud servers. It is also aimed at administrators with basic networking experience. You do not need to have any knowledge of CoreOS. What You Will Learn Understand the benefits of CoreOS as a cloud orchestration platform Learn about lightweight containers and various container frameworks such as Docker and RKT in CoreOS Manage services and containers across cluster using Fleet and systemd Set up a CoreOS environment using Vagrant Create and manage CoreOS clusters Discover the service parameters using etcd Find out about chaining services running on the cluster using Flannel / Rudder and Weave Create a virtual tenant network and service chaining using OVS In Detail CoreOS is an open source operating system developed upon the Linux kernel. The rise of CoreOS is directly related to the rise of Docker (a Linux container management system). It is a minimal operating system layer and takes a different approach to automating the deployment of containers. The major difference between CoreOS and other Linux distributions is that CoreOS was designed to deploy hundreds of servers. CoreOS immensely helps the users to create systems, which are easy to scale and manage, making life easier for all, be it developer, QA, or deployer. This book is all about setting up, deploying, and using CoreOS to manage clusters and clouds. It will help you understand what CoreOS is and its benefits as a cloud orchestration platform. First, we’ll show you how to set up a simple CoreOS instance with single node in the cluster and how to run a Docker container inside the CoreOS instance. Next, you’ll be introduced to Fleet and systemd, and will deploy and distribute Docker services across different nodes in cluster using Fleet. Later, you’ll be briefed about running services in a cluster with constraints, publishing the services already running on the cluster to new services, and making your services interact with each other. We conclude by teaching you about advanced container networking. By the end of the book, you will know the salient features of CoreOS and will be able to deploy, administrate, and secure a CoreOS environment. Style and approach This practical guide covers the basics and advanced topics related to CoreOS and lightweight containers. The topics are covered in an easy-to-follow manner with each feature explained in detail, beginning with a brief overview and followed by an explanation of its corresponding configuration files.
Advanced Penetration Testing for Highly-Secured Environments - Second Edition
Advanced Penetration Testing for Highly-Secured Environments - Second Edition
Lee Allen
¥107.90
Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments About This Book Learn how to build your own pentesting lab environment to practice advanced techniques Customize your own *s, and learn methods to exploit 32-bit and 64-bit programs Explore a vast variety of stealth techniques to bypass a number of protections when penetration testing Who This Book Is For This book is for anyone who wants to improve their skills in penetration testing. As it follows a step-by-step approach, anyone from a novice to an experienced security tester can learn effective techniques to deal with highly secured environments. Whether you are brand new or a seasoned expert, this book will provide you with the skills you need to successfully create, customize, and plan an advanced penetration test. What You Will Learn A step-by-step methodology to identify and penetrate secured environments Get to know the process to test network services across enterprise architecture when defences are in place Grasp different web application testing methods and how to identify web application protections that are deployed Understand a variety of concepts to exploit software Gain proven post-exploitation techniques to exfiltrate data from the target Get to grips with various stealth techniques to remain undetected and defeat the latest defences Be the first to find out the latest methods to bypass firewalls Follow proven approaches to record and save the data from tests for analysis In Detail The defences continue to improve and become more and more common, but this book will provide you with a number or proven techniques to defeat the latest defences on the networks. The methods and techniques contained will provide you with a powerful arsenal of best practices to increase your penetration testing successes. The processes and methodology will provide you techniques that will enable you to be successful, and the step by step instructions of information gathering and intelligence will allow you to gather the required information on the targets you are testing. The exploitation and post-exploitation sections will supply you with the tools you would need to go as far as the scope of work will allow you. The challenges at the end of each chapter are designed to challenge you and provide real-world situations that will hone and perfect your penetration testing skills. You will start with a review of several well respected penetration testing methodologies, and following this you will learn a step-by-step methodology of professional security testing, including stealth, methods of evasion, and obfuscation to perform your tests and not be detected! The final challenge will allow you to create your own complex layered architecture with defences and protections in place, and provide the ultimate testing range for you to practice the methods shown throughout the book. The challenge is as close to an actual penetration test assignment as you can get! Style and approach The book follows the standard penetration testing stages from start to finish with step-by-step examples. The book thoroughly covers penetration test expectations, proper scoping and planning, as well as enumeration and foot printing
OpenStack Trove Essentials
OpenStack Trove Essentials
Alok Shrivastwa
¥63.21
Build your own cloud based Database as a Service using OpenStack Trove About This Book Familiarize yourself with the concept of Database as a Service and make your existing system scalable and efficient with OpenStack Trove Minimize the administrative tasks and complexities of managing your cloud infrastructure This is a fast-paced guide to datastore management on the OpenStack platform using OpenStack Trove Who This Book Is For If you are a DBA / system administrator / architect, or a student who wants to build a Database as a Service based on OpenStack, this book is for you. You should have a basic knowledge of OpenStack components, RDBMS/NoSQL, IaaS, and cloud computing. What You Will Learn Get to grips with the basics of OpenStack and the prerequisites to install Trove Understand the expectations of DBaaS and how Trove can help you achieve them Set up a basic installation of DevStack (Development Stack) in a virtual box Install Trove and utilize its configuration groups to manage and tune databases Use Image builder to create guest images for Trove Utilize Trove to provision your first database instance Back up and restore your databases with the help of Trove In Detail OpenStack has become an extremely popular solution to build public and private clouds with. Database as a Service (DBaaS) enables the delivery of more agile database services at lower costs. Some other benefits of DBaaS are secure database deployments and compliance to standards and best practices. Trove is a DBaaS built on OpenStack and is becoming more popular by the day. Since Trove is one of the most recent projects of OpenStack, DBAs and system administrators can find it difficult to set up and run a DBaaS using OpenStack Trove. This book helps DBAs make that step. We start by introducing you to the concepts of DBaaS and how is it implemented using OpenStack Trove. Following this, we look at implementing OpenStack and deploying Trove. Moving on, you will learn to create guest images to be used with Trove. We then look at how to provision databases in self-service mode, and how to perform administration tasks such as backup and recovery, and fine-tuning databases. At the end of the book, we will examine some advanced features of Trove such as replication. Style and approach This fast-paced, step-by-step guide introduces you to DBaaS, OpenStack Trove, and its components, leading you through building your own Cloud-based DBaaS. Using the DevStack deployment method, you will spend less time on installing OpenStack so you can devote more time to learning how to provision and manage databases in a DBaaS environment.
Mastering Puppet - Second Edition
Mastering Puppet - Second Edition
Thomas Uphill
¥90.46
Master Puppet for configuration management of your systems in an enterprise deploymentAbout This BookThis book is an advanced guide to using and deploying Puppet 4 in your organization with a special focus on issues faced in larger enterprise deploymentsFrom an experienced author, learn to deal with scaling, performance, and multiple developers with the help of real-world examplesThis is the most up-to-date guide on Puppet, and covers the advanced concepts of Puppet 4Who This Book Is ForThis book is for those who have intermediate knowledge of Puppet and are looking to deploy it in their environment. Some idea how to write simple modules for configuration management with Puppet is a prerequisite for this book.What You Will LearnScale out your Puppet infrastructure using proxying techniquesAutomate your code promotion workflow using Git and r10kSolve real-world problems using public modules from the Puppet ForgeUse Hiera to separate the data of your configuration from the code of your configurationWrite your own custom facts in RubyExtend Puppet with your own custom facts, modules, and typesUse exported resources to orchestrate change between machinesDebug a puppetserver using Java techniquesIn DetailPuppet is a configuration management system and a language. It was written for and by system administrators to manage large numbers of systems efficiently and prevent configuration drifts.Mastering Puppet deals with the issues faced when scaling out Puppet to handle large numbers of nodes. It will show you how to fit Puppet into your enterprise and allow many developers to work on your Puppet code simultaneously. In addition, you will learn to write custom facts and roll your own modules to solve problems. Next, popular options for performing reporting and orchestration tasks will be introduced in this book. Moving over to troubleshooting techniques, which will be very useful. The concepts presented are useful to any size organization.By the end of the book, you will know how to deal with problems of scale and exceptions in your code, automate workflows, and support multiple developers working simultaneously.Style and approachThis book is a step-wise guide packed with examples to help you configure complex systems in Puppet.
Unreal Engine 4 Game Development Essentials
Unreal Engine 4 Game Development Essentials
Satheesh PV
¥80.65
Master the basics of Unreal Engine 4 to build stunning video gamesAbout This BookGet to grips with the user interface of Unreal Engine 4 and find out more about its various robust featuresCreate dream video games with the help of the different tools Unreal Engine 4 offersCreate video-games and fully utilize the power of Unreal Engine 4 to bring games to life through this step-by-step guideWho This Book Is ForIf you have a basic understanding of working on a 3D environment and you are interested in video game development, then this book is for you. A solid knowledge of C++ will come in handy.What You Will LearnDownload both the binary and source version of Unreal Engine 4 and get familiar with the UIGet to know more about the Material Editor and how it worksAdd a post process to the scene and alter it to get a unique look for your sceneAcquaint yourself with the unique and exclusive feature of Unreal Engine 4—BlueprintsFind out more about Static and Dynamic lighting and the difference between various lightsUse Matinee to create cut scenesCreate a health bar for the player with the use of Unreal Motion Graphics (UMG)Get familiar with Cascade Particle EditorIn DetailUnreal Engine 4 is a complete suite of game development tools that gives you power to develop your game and seamlessly deploy it to iOS and Android devices. It can be used for the development of simple 2D games or even stunning high-end visuals. Unreal Engine features a high degree of portability and is a tool used by many game developers today.This book will introduce you to the very popular Unreal 4 engine with hands-on instructions to build stunning video games. You will begin by creating a new project or prototype by learning the essentials of Unreal engine, then you’ll get an understanding of how the World Browser can help to improve performance of our game. Next, we’ll create a level of detailed models and materials to further improve performance. After that, you’ll see how to import textures, create different materials, and see what materials can do in terms of post-processing. Finally, you will get acquainted with the Paper2D tool and the blueprints system to further increase our project's performance with Engine’s scalability tools.Style and approachThis step-by-step guide will help you gain practical knowledge about Unreal Engine through detailed de*ions of all the tools offered by Unreal Engine.
Mobile Application Penetration Testing
Mobile Application Penetration Testing
Vijay Kumar Velu
¥90.46
Explore real-world threat scenarios, attacks on mobile applications, and ways to counter them About This Book Gain insights into the current threat landscape of mobile applications in particular Explore the different options that are available on mobile platforms and prevent circumventions made by attackers This is a step-by-step guide to setting up your own mobile penetration testing environment Who This Book Is For If you are a mobile application evangelist, mobile application developer, information security practitioner, penetration tester on infrastructure web applications, an application security professional, or someone who wants to learn mobile application security as a career, then this book is for you. This book will provide you with all the skills you need to get started with Android and iOS pen-testing. What You Will Learn Gain an in-depth understanding of Android and iOS architecture and the latest changes Discover how to work with different tool suites to assess any application Develop different strategies and techniques to connect to a mobile device Create a foundation for mobile application security principles Grasp techniques to attack different components of an Android device and the different functionalities of an iOS device Get to know secure development strategies for both iOS and Android applications Gain an understanding of threat modeling mobile applications Get an in-depth understanding of both Android and iOS implementation vulnerabilities and how to provide counter-measures while developing a mobile app In Detail Mobile security has come a long way over the last few years. It has transitioned from "should it be done?" to "it must be done!"Alongside the growing number of devises and applications, there is also a growth in the volume of Personally identifiable information (PII), Financial Data, and much more. This data needs to be secured. This is why Pen-testing is so important to modern application developers. You need to know how to secure user data, and find vulnerabilities and loopholes in your application that might lead to security breaches. This book gives you the necessary skills to security test your mobile applications as a beginner, developer, or security practitioner. You'll start by discovering the internal components of an Android and an iOS application. Moving ahead, you'll understand the inter-process working of these applications. Then you'll set up a test environment for this application using various tools to identify the loopholes and vulnerabilities in the structure of the applications. Finally, after collecting all information about these security loop holes, we'll start securing our applications from these threats. Style and approach This is an easy-to-follow guide full of hands-on examples of real-world attack simulations. Each topic is explained in context with respect to testing, and for the more inquisitive, there are more details on the concepts and techniques used for different platforms.
Troubleshooting OpenStack
Troubleshooting OpenStack
Tony Campbell
¥54.49
Get unstuck and start stacking! About This Book Easily fix the nagging problems that commonly plague OpenStack and become the go-to person in your organization Get better equipped to troubleshoot and solve common problems in performance, availability, and automation that confront production-ready OpenStack environments Save time and decrease frustration by solving significant issues that arise from OpenStack deployments pertaining to storage and networking Who This Book Is For You will need a basic understanding of OpenStack, Linux, and Cloud computing. If you have an understanding of Linux, this book will help you leverage that knowledge in the world of OpenStack, giving you confidence to tackle most issues that may arise. What You Will Learn Diagnose and remediate authentication and authorization problems in Keystone Fix common issues with images served through Glance Master the art of troubleshooting Neutron networking Navigate and overcome problems with Nova Troubleshoot and resolve Cinder block storage issues Identify and correct Swift object storage problems Isolate and fix issues caused by Heat orchestration Leverage Ceilometer and other metering and monitoring tools for effective troubleshooting In Detail OpenStack is a collection of software projects that work together to provide a cloud fabric. OpenStack is one of the fastest growing open source projects in history that unlocks cloud computing for everyone. With OpenStack, you are able to create public or private clouds on your own hardware. The flexibility and control afforded by OpenStack puts the cloud within reach of anyone willing to learn this technology. Starting with an introduction to OpenStack troubleshooting tools, we’ll walk through each OpenStack service and how you can quickly diagnose, troubleshoot, and correct problems in your OpenStack. Understanding the various projects and how they interact is essential for anyone attempting to troubleshoot an OpenStack cloud. We will start by explaining each of the major components and the dependencies between them, and move on to show you how to identify and utilize an effective set of OpenStack troubleshooting tools and fix common Keystone problems. Next, we will expose you to common errors and problems you may encounter when using the OpenStack Block Storage service (Cinder). We will then examine Heat, the OpenStack Orchestration Service, where you will learn how to trace errors, determine their root cause, and effectively correct the issue. Finally, you will get to know the best practices to architect your OpenStack cloud in order to achieve optimal performance, availability, and reliability. Style and approach This is straight-to-the point guide to fixing your OpenStack cluster. Common problems are identified and suggestions to resolve these problems are presented in a simple, easy-to-understand manner.
Magento 2 Cookbook
Magento 2 Cookbook
Ray Bogman
¥80.65
Over 50 practical recipes that will help you realize the full potential of Magento in order to build a professional online store About This Book Take advantage of the latest features in Magento 2 to set up an e-commerce store that fits your business needs Packed with several advanced recipes, not just to manage your online store, but to extend and design it as well Written in a cookbook style, you can pick and choose your recipe to carry out your day- to- day Magento store tasks Who This Book Is For The book is for existing Magento users who want to gain further expertise and insights into managing, designing, and extending their online store in Magento to fit their business needs. Working knowledge of Magento and basic familiarity with programming is expected. What You Will Learn Set up a Magento 2 project on Apache or Nginx. Transfer your Magento 1 database to Magento 2 using the Magento 2 system tools. Boost the performance of Magento 2 by enabling different types of caching. Build a Magento 2 multi-store by creating a root catalog, subdirectories, and products. Create and manage pages, blocks, and front-end apps. Manage your Magento store by setting up the correct TAX rules. Design custom themes within the Magento 2 framework. Create basic and advanced extensions using Magento 2. In Detail Magento 2 is an open source e-commerce platform that has all the functionality to function from small to large online stores. It is preferred by developers and merchants due to its new architecture, which makes it possible to extend the functionalities with plugins, a lot of which are now created by the community. This merchant and developer guide is packed with recipes that cover all aspects of Magento 2. The recipes start with simple how-to’s then delve into more advanced topics as the book progresses. We start with the basics of setting up a Magento 2 project on Apache or Nginx. Next, you will learn about basics including system tools and caching to get your Magento 2 system ready for the real work. We move on to simple tasks such as managing your store and catalog configuration. When you are familiar with this, we cover more complex features such as module and extension development. Then we will jump to the final part: advanced Magento 2 extensions. By the end of this book, you’ll be competent with all the development phases of Magento 2 and its most common elements. Style and approach Step by step guide for real world tasks for Magento users to gain a more advanced insight on managing, extending and designing their e-commerce store to fit their business needs.
Learning C# by Developing Games with Unity 5.x - Second Edition
Learning C# by Developing Games with Unity 5.x - Second Edition
Greg Lukosek
¥80.65
Develop your first interactive 2D platformer game by learning the fundamentals of C# About This Book Get to grips with the fundamentals of *ing in C# with Unity Create an awesome, 2D platformer game from scratch using the principles of object-oriented programming and coding in C# This is a step-by-step guide to learn the fundamentals of C# *ing to develop GameObjects and master the basics of the new UI system in Unity Who This Book Is For The book is targeted at beginner level Unity developers with no programming experience. If you are a Unity developer and you wish to learn how to write C# *s and code by creating games, then this book is for you. What You Will Learn Understand the fundamentals of variables, methods, and code syntax in C# Get to know about techniques to turn your game idea into working project Use loops and collections efficiently in Unity to reduce the amount of code Develop a game using the object-oriented programming principles Generate infinite levels for your game Create and code a good-looking functional UI system for your game Publish and share your game with users In Detail Unity is a cross-platform game engine that is used to develop 2D and 3D video games. Unity 5 is the latest version, released in March 2015, and adds a real-time global illumination to the games, and its powerful new features help to improve a game’s efficiency. This book will get you started with programming behaviors in C# so you can create 2D games in Unity. You will begin by installing Unity and learning about its features, followed by creating a C# *. We will then deal with topics such as unity *ing for you to understand how codes work so you can create and use C# variables and methods. Moving forward, you will find out how to create, store, and retrieve data from collection of objects. You will also develop an understanding of loops and their use, and you’ll perform object-oriented programming. This will help you to turn your idea into a ready-to-code project and set up a Unity project for production. Finally, you will discover how to create the GameManager class to manage the game play loop, generate game levels, and develop a simple UI for the game. By the end of this book, you will have mastered the art of applying C# in Unity. Style and approach This is a step-by-step guide to developing a game from scratch by applying the fundamentals of C# and Unity *ing.
Mastering Wireshark
Mastering Wireshark
Charit Mishra
¥90.46
Analyze data network like a professional by mastering Wireshark - From 0 to 1337 About This Book Master Wireshark and train it as your network sniffer Impress your peers and get yourself pronounced as a network doctor Understand Wireshark and its numerous features with the aid of this fast-paced book packed with numerous screenshots, and become a pro at resolving network anomalies Who This Book Is For Are you curious to know what’s going on in a networkDo you get frustrated when you are unable to detect the cause of problems in your networksThis is where the book comes into play. Mastering Wireshark is for developers or network enthusiasts who are interested in understanding the internal workings of networks and have prior knowledge of using Wireshark, but are not aware about all of its functionalities. What You Will Learn Install Wireshark and understand its GUI and all the functionalities of it Create and use different filters Analyze different layers of network protocols and know the amount of packets that flow through the network Decrypt encrypted wireless traffic Use Wireshark as a diagnostic tool and also for network security analysis to keep track of malware Troubleshoot all the network anomalies with help of Wireshark Resolve latencies and bottleneck issues in the network In Detail Wireshark is a popular and powerful tool used to analyze the amount of bits and bytes that are flowing through a network. Wireshark deals with the second to seventh layer of network protocols, and the analysis made is presented in a human readable form. Mastering Wireshark will help you raise your knowledge to an expert level. At the start of the book, you will be taught how to install Wireshark, and will be introduced to its interface so you understand all its functionalities. Moving forward, you will discover different ways to create and use capture and display filters. Halfway through the book, you’ll be mastering the features of Wireshark, analyzing different layers of the network protocol, looking for any anomalies. As you reach to the end of the book, you will be taught how to use Wireshark for network security analysis and configure it for troubleshooting purposes. Style and approach Every chapter in this book is explained to you in an easy way accompanied by real-life examples and screenshots of the interface, making it easy for you to become an expert at using Wireshark.
1 2 3 4 5 6 7