Building Websites with e107
¥71.93
This book is hands-on. As you work through the small business/e-commerce enabled example web site, you will learn how to install, upgrade, configure, and use the various basic features of the e107 Content Management System. The book contains a number of screen shots to reinforce that each step that you perform is correct. This book is primarily for entrepreneurs, small office/home office, small businesses and non-profit agencies who would like to have interactive, business and/or e-commerce web sites at a low cost without sacrificing power or usability. No knowledge of PHP programming, Apache, or MySQL is required.
Building Websites with PHP-Nuke
¥63.21
Written in a clear, easy to read style, the book provides a tutorial on setting up a website with PHP-Nuke. Each topic is tackled in a clear, practical way with many examples to consolidate your learning. This book is written to help you create a fully-featured website as quickly as possible. Basic knowledge of HTML will help if you intend to explore customizing your own theme, and a basic knowledge of PHP will help if you want to get the most from the chapters on extending PHP-Nuke.
Unity Android Game Development by Example Beginner's Guide
¥80.65
Unity Android Game Development by Example Beginner's Guide consists of different game application examples. No prior experience with programming, Android, or Unity is required. You will learn everything from scratch and will have an organized flow of information specifically designed for complete beginners to Unity.Great for developers new to Unity, Android, or both, this book will walk you through everything you need to know about game development for the Android mobile platform. No experience with programming, Android, or Unity is required. Most of the assets used in each chapter project are provided with the book, but it is assumed that you have some access to basic image and model creation software. You will also need access to an Android powered device.
Zend Framework 2 Cookbook
¥90.46
This book is written in a practical, cookbook style with numerous examples and recipes. This style allows you to go both directly to your topic of interest or follow topics throughout a chapter to gain an in-depth knowledge of certain areas.'Zend Framework 2 Cookbook" is for PHP developers who are fairly advanced in programming in PHP. It will also be useful for developers who have a keen interest in expanding their knowledge outside the boundaries of simply *ing pages together. As unit testing and MVC will be discussed, it is beneficial for the reader to know what these technologies are, although experience with developing applications is not necessarily essential.
CodeIgniter 2 Cookbook
¥90.46
Presented in a recipe-based format, you are led step-by-step through each aspect of CodeIgniter, allowing you to dip in and out as you choose.CodeIgniter 2 Cookbook is for intermediate to advanced PHP developers who want to begin using the powerful CodeIgniter framework to create web applications. Familiarity with CodeIgniter isn’t essential, but it will be useful if you have been introduced to the framework before.
QlikView 11 para Desarrolladores
¥107.90
Los ejercicios de este libro tienen un enfoque de tutorial paso a paso y en los que al mismo tiempo se van presentando mejores prácticas de desarrollo. El libro está estructurado de forma que puede ser leído de inicio a fin o leer solamente partes del mismo.Este libro va dirigido a desarrolladores y usuarios que quieren aprender a crear aplicaciones de Inteligencia de Negocios con QlikView. Desarrolladores que ya hayan usado QlikView por un tiempo podrán encontrar recomendaciones útiles y mejores prácticas para hacer uso más efectivo de QlikView. Este libro solamente cubre QlikView Desktop. Implementaciones en QlikView Server y Publisher est?an fuera del alcance de este libro. Este libro no va enfocado a administradores de servidores QlikView.
Hadoop Cluster Deployment
¥63.21
This book is a step-by-step tutorial filled with practical examples which will show you how to build and manage a Hadoop cluster along with its intricacies.This book is ideal for database administrators, data engineers, and system administrators, and it will act as an invaluable reference if you are planning to use the Hadoop platform in your organization. It is expected that you have basic Linux skills since all the examples in this book use this operating system. It is also useful if you have access to test hardware or virtual machines to be able to follow the examples in the book.
Instant Windows PowerShell Functions
¥45.77
Enhance your knowledge of Windows PowerShell and get to grips with its latest features
Multithreading in C# 5.0 Cookbook
¥90.46
Cookbook.Multithreading in C# 5.0 Cookbook is written for existing C# developers who want a complete, professional, and authoritative guide to multithreading. You don’t need any experience with multithreaded programming to use this book.
Implementing AppFog
¥54.49
This book is a practical, hands-on guide to implementing and deploying apps on the AppFog platform.Implementing AppFog is for developers who want to be able to upload applications to the cloud, and for implementation specialists, who implement and deploy apps on the AppFog platform. It is best to have Ruby installed, but we will walk you through the installation process if you do not already have it. It would be ideal to have some knowledge of cloud computing and know about the basics of database and network deployment.
VMware vCloud Security
¥71.93
VMware vCloud Security provides the reader with in depth knowledge and practical exercises sufficient to implement a secured private cloud using VMware vCloud Director and vCloud Networking and Security.This book is primarily for technical professionals with system administration and security administration skills with significant VMware vCloud experience who want to learn about advanced concepts of vCloud security and compliance.
Microsoft Hyper-V Cluster Design
¥107.90
This book is written in a friendly and practical style with numerous tutorials centred on common as well as atypical Hyper-V cluster designs. This book also features a sample cluster design throughout to help you learn how to design a Hyper-V in a real-world scenario.Microsoft Hyper-V Cluster Design is perfect for the systems administrator who has a good understanding of Windows Server in an Active Directory domain and is ready to expand into a highly available virtualized environment. It only expects that you will be familiar with basic hypervisor terminology.
Cuckoo Malware Analysis
¥68.66
This book is a step-by-step, practical tutorial for analyzing and detecting malware and performing digital investigations. This book features clear and concise guidance in an easily accessible format.Cuckoo Malware Analysis is great for anyone who wants to analyze malware through programming, networking, disassembling, forensics, and virtualization. Whether you are new to malware analysis or have some experience, this book will help you get started with Cuckoo Sandbox so you can start analysing malware effectively and efficiently.
L?VE2d for Lua Game Programming
¥54.49
This book follows a tutorial approach with examples and step-by-step instructions to help explain the key concepts of the L?VE framework as well as everything you need to know about game development using the Lua programming language.L?VE2d for Lua Game Programming is for anyone who is interested in learning about desktop game development.
Web Penetration Testing with Kali Linux
¥90.46
Web Penetration Testing with Kali Linux contains various penetration testing methods using BackTrack that will be used by the reader. It contains clear step-by-step instructions with lot of screenshots. It is written in an easy to understand language which will further simplify the understanding for the user."Web Penetration Testing with Kali Linux" is ideal for anyone who is interested in learning how to become a penetration tester. It will also help the users who are new to Kali Linux and want to learn the features and differences in Kali versus Backtrack, and seasoned penetration testers who may need a refresher or reference on new tools and techniques. Basic familiarity with web-based programming languages such as PHP, JavaScript and MySQL will also prove helpful.
Test-Driven iOS Development with Swift
¥71.93
Create fully-featured and highly functional iOS apps by writing tests firstAbout This BookLearn test-driven principles to help you build apps with fewer bugs and better designsBecome more efficient while working with Swift to move on to your next project faster!Learn how to incorporate all of the principles of test-driven development (TDD) in to your daily programming workflowWho This Book Is ForIf debugging iOS apps is a nerve-racking task for you and you are looking for a fix, this book is for you.What You Will LearnImplement TDD in swift application developmentGet to know the fundamentals, life cycle, and benefits of TDDExplore the tools and frameworks to effectively use TDDDevelop models and controllers driven by testsConstruct the network layer using stubsUse functional tests to ensure the app works as plannedAutomate and streamline the building, analysing, testing, and archiving of your iOS appsIn DetailTest-driven development (TDD) is a proven way to find software bugs early. Writing tests before your code improves the structure and maintainability of your app.Test-driven iOS Development with Swift will help you understand the process of TDD and how it impacts your applications written in Swift. Through practical, real-world examples, you’ll start seeing how to implement TDD in context. We will begin with an overview of your TDD workflow and then deep-dive into unit testing concepts and code cycles. We will showcase the workings of functional tests, which will help you improve the user interface. Finally, you will learn about automating deployments and continuous integration to run an environment.Style and approachThis is an easy-to-follow example-driven tutorial, packed with lots of tips and tricks that explore TDD bit-by-bit in the process of making an iOS application.
3D Printing Designs: Octopus Pencil Holder
¥35.96
Learn to design and 3D print organic and functional designs using BlenderAbout This BookLearn how to make complex shapes by editing basic onesMake printable objects from multiple shapes and partsLearn how to design from scratch, without a reference to physical objectsWho This Book Is ForYou should have basic knowledge of Blender and 3D printing and be interested in printing your first object.What You Will LearnGet to know the guiding principles required to create 3D printer-friendly modelsUnderstand material characteristics, printing specifications, tolerances, and design tipsMaster the art of modifying basic shapes with Blender's powerful editing tools: extrude, loop cuts, and other transformationsLearn techniques of editing complex meshes, smoothing, combining shapes, and exporting them into STL files for printingIn DetailThis book will cover the very basic but essential techniques you need to model an organic and functional object for 3D printing using Blender.Starting with pen and paper and then moving on to the computer, you will create your first project in Blender, add basic geometric shapes, and use techniques such as extruding and subdividing to transform these shapes into complex meshes. You will learn how modifiers can automatically refine the shape further and combine multiple shapes into a single 3D printable model.By the end of the book, you will have gained enough practical hands-on experience to be able to create a 3D printable object of your choice, which in this case is a 3D print-ready octopus pencil holder.Style and approachThis is a starter project designed to introduce you to your first real-world 3D printing designs, where you'll learn how to handle the fundamental principles of 3D printing design and have your hands on your reward in no time.
Kali Linux Web Penetration Testing Cookbook
¥90.46
Over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2About This BookFamiliarize yourself with the most common web vulnerabilities a web application faces, and understand how attackers take advantage of themSet up a penetration testing lab to conduct a preliminary assessment of attack surfaces and run exploitsLearn how to prevent vulnerabilities in web applications before an attacker can make the most of itWho This Book Is ForThis book is for IT professionals, web developers, security enthusiasts, and security professionals who want an accessible reference on how to find, exploit, and prevent security vulnerabilities in web applications. You should know the basics of operating a Linux environment and have some exposure to security technologies and tools.What You Will LearnSet up a penetration testing laboratory in a secure wayFind out what information is useful to gather when performing penetration tests and where to look for itUse crawlers and spiders to investigate an entire website in minutesDiscover security vulnerabilities in web applications in the web browser and using command-line toolsImprove your testing efficiency with the use of automated vulnerability scannersExploit vulnerabilities that require a complex setup, run custom-made exploits, and prepare for extraordinary scenariosSet up Man in the Middle attacks and use them to identify and exploit security flaws within the communication between users and the web serverCreate a malicious site that will find and exploit vulnerabilities in the user's web browserRepair the most common web vulnerabilities and understand how to prevent them becoming a threat to a site's securityIn DetailWeb applications are a huge point of attack for malicious hackers and a critical area for security professionals and penetration testers to lock down and secure. Kali Linux is a Linux-based penetration testing platform and operating system that provides a huge array of testing tools, many of which can be used specifically to execute web penetration testing.This book will teach you, in the form step-by-step recipes, how to detect a wide array of vulnerabilities, exploit them to analyze their consequences, and ultimately buffer attackable surfaces so applications are more secure, for you and your users.Starting from the setup of a testing laboratory, this book will give you the skills you need to cover every stage of a penetration test: from gathering information about the system and the application to identifying vulnerabilities through manual testing and the use of vulnerability scanners to both basic and advanced exploitation techniques that may lead to a full system compromise. Finally, we will put this into the context of OWASP and the top 10 web application vulnerabilities you are most likely to encounter, equipping you with the ability to combat them effectively. By the end of the book, you will have the required skills to identify, exploit, and prevent web application vulnerabilities.Style and approachTaking a recipe-based approach to web security, this book has been designed to cover each stage of a penetration test, with de*ions on how tools work and why certain programming or configuration practices can become security vulnerabilities that may put a whole system, or network, at risk. Each topic is presented as a sequence of tasks and contains a proper explanation of why each task is performed and what it accomplishes.
OpenGL Game Development By Example
¥107.90
Design and code your own 2D and 3D games efficiently using OpenGL and C++ About This Book Create 2D and 3D games completely, through a series of end-to-end game projects Learn to render high performance 2D and 3D graphics using OpenGL Implement a rudimentary game engine using step-by-step code Who This Book Is For If you are a prospective game developer with some experience using C++, then this book is for you. Both prospective and experienced game programmers will find nuggets of wisdom and practical advice as they learn to code two full games using OpenGL, C++, and a host of related tools. What You Will Learn Set up your development environment in Visual Studio using OpenGL Use 2D and 3D coordinate systems Implement an input system to handle the mouse and the keyboard Create a state machine to handle complex changes in the game Load, display, and manipulate both 2D and 3D graphics Implement collision detection and basic physics Discover the key components needed to complete a polished game Handle audio files and implement sound effects and music In Detail OpenGL is one of the most popular rendering SDKs used to develop games. OpenGL has been used to create everything from 3D masterpieces running on desktop computers to 2D puzzles running on mobile devices. You will learn to apply both 2D and 3D technologies to bring your game idea to life. There is a lot more to making a game than just drawing pictures and that is where this book is unique! It provides a complete tutorial on designing and coding games from the setup of the development environment to final credits screen, through the creation of a 2D and 3D game. The book starts off by showing you how to set up a development environment using Visual Studio, and create a code framework for your game. It then walks you through creation of two games–a 2D platform game called Roboracer 2D and a 3D first-person space shooter game–using OpenGL to render both 2D and 3D graphics using a 2D coordinate system. You'll create sprite classes, render sprites and animation, and navigate and control the characters. You will also learn how to implement input, use audio, and code basic collision and physics systems. From setting up the development environment to creating the final credits screen, the book will take you through the complete journey of creating a game engine that you can extend to create your own games. Style and approach An easy-to-follow guide full of code examples to illustrate every concept and help you build a 2D and 3D game from scratch, while learning the key tools that surround a typical OpenGL project.
Mobile Application Penetration Testing
¥90.46
Explore real-world threat scenarios, attacks on mobile applications, and ways to counter them About This Book Gain insights into the current threat landscape of mobile applications in particular Explore the different options that are available on mobile platforms and prevent circumventions made by attackers This is a step-by-step guide to setting up your own mobile penetration testing environment Who This Book Is For If you are a mobile application evangelist, mobile application developer, information security practitioner, penetration tester on infrastructure web applications, an application security professional, or someone who wants to learn mobile application security as a career, then this book is for you. This book will provide you with all the skills you need to get started with Android and iOS pen-testing. What You Will Learn Gain an in-depth understanding of Android and iOS architecture and the latest changes Discover how to work with different tool suites to assess any application Develop different strategies and techniques to connect to a mobile device Create a foundation for mobile application security principles Grasp techniques to attack different components of an Android device and the different functionalities of an iOS device Get to know secure development strategies for both iOS and Android applications Gain an understanding of threat modeling mobile applications Get an in-depth understanding of both Android and iOS implementation vulnerabilities and how to provide counter-measures while developing a mobile app In Detail Mobile security has come a long way over the last few years. It has transitioned from "should it be done?" to "it must be done!"Alongside the growing number of devises and applications, there is also a growth in the volume of Personally identifiable information (PII), Financial Data, and much more. This data needs to be secured. This is why Pen-testing is so important to modern application developers. You need to know how to secure user data, and find vulnerabilities and loopholes in your application that might lead to security breaches. This book gives you the necessary skills to security test your mobile applications as a beginner, developer, or security practitioner. You'll start by discovering the internal components of an Android and an iOS application. Moving ahead, you'll understand the inter-process working of these applications. Then you'll set up a test environment for this application using various tools to identify the loopholes and vulnerabilities in the structure of the applications. Finally, after collecting all information about these security loop holes, we'll start securing our applications from these threats. Style and approach This is an easy-to-follow guide full of hands-on examples of real-world attack simulations. Each topic is explained in context with respect to testing, and for the more inquisitive, there are more details on the concepts and techniques used for different platforms.
Cisco UCS Cookbook
¥90.46
Over 40 practical recipes to get your hands dirty with the powerful Cisco UCS and overcome various challenges About This Book Master the skills of minimizing cost, enabling your business to work faster by reducing cycle times for reporting and improving overall revenue Work through hands-on recipes for efficient deployment approaches, see computing techniques, and explore new operational models with UCS Render a better work-flow management, ensure effective monitoring, and learn new deployment paradigms for the operational infrastructure with the help of this book Who This Book Is For This book is for competent system/network or storage administrators who are working with Cisco UCS, but now want to learn new ways to compute UCS. What You Will Learn Familiarize yourself with information on the latest information on memory management practices, virtualization architectures, and the specific technical advantages of UCS Get a concrete understanding of integrating processes and techniques to ensure effective convergence of LAN/SAN Get to know the best practices of Cisco UCS, EMC Storage, and VMware vSphere Master migrating data from other band servers or Blade to Cisco UCS Comprehend how to replicate and back up UCS to remote sites UCS Assimilate innovative techniques to deploy UCS to leverage its full potential Gather information on installing and configuring automatic and manual Pinning Discover ways to integrate a system in Cisco UCS In Detail Cisco Unified Computing System (UCS) is a data center server platform that is used for computing, deploying, and storing resources in data center environments. This cookbook aims to teach you about various tasks you can implement to improve your existing method of configuring and deploying UCS. You will start by learning how to upgrade your firmware on Brocade and Cisco Fibre Channel Switch and will move on to enhance your knowledge of LAN connectivity. We will then discuss how to configure Windows 2008 and 2012 local boot in Cisco UCS. Next, you will learn how to install the operating system on Cisco UCS and use Cisco UCS Power Calculator to calculate the UCS consumption. Finally, we’ll take a look at backup solutions. By the end of the book, you will know several ways to build and compute in data center environment using Cisco UCS. Style and approach This guide explains every task in a conversational and easy-to-follow style. You can open this book up to the task you want to learn and will be able to perform that task by the end of the recipe.

购物车
个人中心

