Advanced Penetration Testing for Highly-Secured Environments - Second Edition
¥107.90
Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments About This Book Learn how to build your own pentesting lab environment to practice advanced techniques Customize your own *s, and learn methods to exploit 32-bit and 64-bit programs Explore a vast variety of stealth techniques to bypass a number of protections when penetration testing Who This Book Is For This book is for anyone who wants to improve their skills in penetration testing. As it follows a step-by-step approach, anyone from a novice to an experienced security tester can learn effective techniques to deal with highly secured environments. Whether you are brand new or a seasoned expert, this book will provide you with the skills you need to successfully create, customize, and plan an advanced penetration test. What You Will Learn A step-by-step methodology to identify and penetrate secured environments Get to know the process to test network services across enterprise architecture when defences are in place Grasp different web application testing methods and how to identify web application protections that are deployed Understand a variety of concepts to exploit software Gain proven post-exploitation techniques to exfiltrate data from the target Get to grips with various stealth techniques to remain undetected and defeat the latest defences Be the first to find out the latest methods to bypass firewalls Follow proven approaches to record and save the data from tests for analysis In Detail The defences continue to improve and become more and more common, but this book will provide you with a number or proven techniques to defeat the latest defences on the networks. The methods and techniques contained will provide you with a powerful arsenal of best practices to increase your penetration testing successes. The processes and methodology will provide you techniques that will enable you to be successful, and the step by step instructions of information gathering and intelligence will allow you to gather the required information on the targets you are testing. The exploitation and post-exploitation sections will supply you with the tools you would need to go as far as the scope of work will allow you. The challenges at the end of each chapter are designed to challenge you and provide real-world situations that will hone and perfect your penetration testing skills. You will start with a review of several well respected penetration testing methodologies, and following this you will learn a step-by-step methodology of professional security testing, including stealth, methods of evasion, and obfuscation to perform your tests and not be detected! The final challenge will allow you to create your own complex layered architecture with defences and protections in place, and provide the ultimate testing range for you to practice the methods shown throughout the book. The challenge is as close to an actual penetration test assignment as you can get! Style and approach The book follows the standard penetration testing stages from start to finish with step-by-step examples. The book thoroughly covers penetration test expectations, proper scoping and planning, as well as enumeration and foot printing
Learning C# by Developing Games with Unity 5.x - Second Edition
¥80.65
Develop your first interactive 2D platformer game by learning the fundamentals of C# About This Book Get to grips with the fundamentals of *ing in C# with Unity Create an awesome, 2D platformer game from scratch using the principles of object-oriented programming and coding in C# This is a step-by-step guide to learn the fundamentals of C# *ing to develop GameObjects and master the basics of the new UI system in Unity Who This Book Is For The book is targeted at beginner level Unity developers with no programming experience. If you are a Unity developer and you wish to learn how to write C# *s and code by creating games, then this book is for you. What You Will Learn Understand the fundamentals of variables, methods, and code syntax in C# Get to know about techniques to turn your game idea into working project Use loops and collections efficiently in Unity to reduce the amount of code Develop a game using the object-oriented programming principles Generate infinite levels for your game Create and code a good-looking functional UI system for your game Publish and share your game with users In Detail Unity is a cross-platform game engine that is used to develop 2D and 3D video games. Unity 5 is the latest version, released in March 2015, and adds a real-time global illumination to the games, and its powerful new features help to improve a game’s efficiency. This book will get you started with programming behaviors in C# so you can create 2D games in Unity. You will begin by installing Unity and learning about its features, followed by creating a C# *. We will then deal with topics such as unity *ing for you to understand how codes work so you can create and use C# variables and methods. Moving forward, you will find out how to create, store, and retrieve data from collection of objects. You will also develop an understanding of loops and their use, and you’ll perform object-oriented programming. This will help you to turn your idea into a ready-to-code project and set up a Unity project for production. Finally, you will discover how to create the GameManager class to manage the game play loop, generate game levels, and develop a simple UI for the game. By the end of this book, you will have mastered the art of applying C# in Unity. Style and approach This is a step-by-step guide to developing a game from scratch by applying the fundamentals of C# and Unity *ing.
Mastering Wireshark
¥90.46
Analyze data network like a professional by mastering Wireshark - From 0 to 1337 About This Book Master Wireshark and train it as your network sniffer Impress your peers and get yourself pronounced as a network doctor Understand Wireshark and its numerous features with the aid of this fast-paced book packed with numerous screenshots, and become a pro at resolving network anomalies Who This Book Is For Are you curious to know what’s going on in a networkDo you get frustrated when you are unable to detect the cause of problems in your networksThis is where the book comes into play. Mastering Wireshark is for developers or network enthusiasts who are interested in understanding the internal workings of networks and have prior knowledge of using Wireshark, but are not aware about all of its functionalities. What You Will Learn Install Wireshark and understand its GUI and all the functionalities of it Create and use different filters Analyze different layers of network protocols and know the amount of packets that flow through the network Decrypt encrypted wireless traffic Use Wireshark as a diagnostic tool and also for network security analysis to keep track of malware Troubleshoot all the network anomalies with help of Wireshark Resolve latencies and bottleneck issues in the network In Detail Wireshark is a popular and powerful tool used to analyze the amount of bits and bytes that are flowing through a network. Wireshark deals with the second to seventh layer of network protocols, and the analysis made is presented in a human readable form. Mastering Wireshark will help you raise your knowledge to an expert level. At the start of the book, you will be taught how to install Wireshark, and will be introduced to its interface so you understand all its functionalities. Moving forward, you will discover different ways to create and use capture and display filters. Halfway through the book, you’ll be mastering the features of Wireshark, analyzing different layers of the network protocol, looking for any anomalies. As you reach to the end of the book, you will be taught how to use Wireshark for network security analysis and configure it for troubleshooting purposes. Style and approach Every chapter in this book is explained to you in an easy way accompanied by real-life examples and screenshots of the interface, making it easy for you to become an expert at using Wireshark.
OpenStack Trove Essentials
¥63.21
Build your own cloud based Database as a Service using OpenStack Trove About This Book Familiarize yourself with the concept of Database as a Service and make your existing system scalable and efficient with OpenStack Trove Minimize the administrative tasks and complexities of managing your cloud infrastructure This is a fast-paced guide to datastore management on the OpenStack platform using OpenStack Trove Who This Book Is For If you are a DBA / system administrator / architect, or a student who wants to build a Database as a Service based on OpenStack, this book is for you. You should have a basic knowledge of OpenStack components, RDBMS/NoSQL, IaaS, and cloud computing. What You Will Learn Get to grips with the basics of OpenStack and the prerequisites to install Trove Understand the expectations of DBaaS and how Trove can help you achieve them Set up a basic installation of DevStack (Development Stack) in a virtual box Install Trove and utilize its configuration groups to manage and tune databases Use Image builder to create guest images for Trove Utilize Trove to provision your first database instance Back up and restore your databases with the help of Trove In Detail OpenStack has become an extremely popular solution to build public and private clouds with. Database as a Service (DBaaS) enables the delivery of more agile database services at lower costs. Some other benefits of DBaaS are secure database deployments and compliance to standards and best practices. Trove is a DBaaS built on OpenStack and is becoming more popular by the day. Since Trove is one of the most recent projects of OpenStack, DBAs and system administrators can find it difficult to set up and run a DBaaS using OpenStack Trove. This book helps DBAs make that step. We start by introducing you to the concepts of DBaaS and how is it implemented using OpenStack Trove. Following this, we look at implementing OpenStack and deploying Trove. Moving on, you will learn to create guest images to be used with Trove. We then look at how to provision databases in self-service mode, and how to perform administration tasks such as backup and recovery, and fine-tuning databases. At the end of the book, we will examine some advanced features of Trove such as replication. Style and approach This fast-paced, step-by-step guide introduces you to DBaaS, OpenStack Trove, and its components, leading you through building your own Cloud-based DBaaS. Using the DevStack deployment method, you will spend less time on installing OpenStack so you can devote more time to learning how to provision and manage databases in a DBaaS environment.
Flask By Example
¥63.21
Unleash the full potential of the Flask web framework by creating simple yet powerful web applications About This Book The most up-to-date book on Flask on the market Create your own world-class applications and master the art of Flask by unravelling its enigma through this journey This step-by-step tutorial is packed with examples on blending different technologies with Flask to get you up and running Who This Book Is For Have you looked at PHP and hated the clunky bloated syntaxOr looked at .Net and wished it was more open and flexibleMaybe you’ve tried your hand at GUI libraries in Python and found them hard to useIf your answer to any one of these questions is a yes, then this is just the book for you. It is also intended for people who know the basics of Python and want to learn how to use it to build powerful solutions with a web front-end. What You Will Learn Build three web applications from the ground up using the powerful Python micro framework, Flask. Dynamically display data to your viewers, based on their requests Store user and static data in SQL and NoSQL databases and use this data to power your web applications Create a good user experience by combining HTML, CSS, and JavaScript Harness the convenience of freely available APIs, including OpenWeatherMap, Open Exchange Rates, and bitly Extend your applications to build advanced functionality, such as a user account control system using Flask-Login Learn about web application security and defend against common attacks, such as SQL injection and XSS In Detail This book will take you on a journey from learning about web development using Flask to building fully functional web applications. In the first major project, we develop a dynamic Headlines application that displays the latest news headlines along with up-to-date currency and weather information. In project two, we build a Crime Map application that is backed by a MySQL database, allowing users to submit information on and the location of crimes in order to plot danger zones and other crime trends within an area. In the final project, we combine Flask with more modern technologies, such as Twitter's Bootstrap and the NoSQL database MongoDB, to create a Waiter Caller application that allows restaurant patrons to easily call a waiter to their table. This pragmatic tutorial will keep you engaged as you learn the crux of Flask by working on challenging real-world applications. Style and approach This book will provide you with rich, practical experience of Flask. Every technology, that is employed along with Flask is comprehensively introduced, while the book focusses on developing web applications. Pointers to educational material are always given if you want to gain in-depth knowledge of the various technologies used.
Mobile Application Penetration Testing
¥90.46
Explore real-world threat scenarios, attacks on mobile applications, and ways to counter them About This Book Gain insights into the current threat landscape of mobile applications in particular Explore the different options that are available on mobile platforms and prevent circumventions made by attackers This is a step-by-step guide to setting up your own mobile penetration testing environment Who This Book Is For If you are a mobile application evangelist, mobile application developer, information security practitioner, penetration tester on infrastructure web applications, an application security professional, or someone who wants to learn mobile application security as a career, then this book is for you. This book will provide you with all the skills you need to get started with Android and iOS pen-testing. What You Will Learn Gain an in-depth understanding of Android and iOS architecture and the latest changes Discover how to work with different tool suites to assess any application Develop different strategies and techniques to connect to a mobile device Create a foundation for mobile application security principles Grasp techniques to attack different components of an Android device and the different functionalities of an iOS device Get to know secure development strategies for both iOS and Android applications Gain an understanding of threat modeling mobile applications Get an in-depth understanding of both Android and iOS implementation vulnerabilities and how to provide counter-measures while developing a mobile app In Detail Mobile security has come a long way over the last few years. It has transitioned from "should it be done?" to "it must be done!"Alongside the growing number of devises and applications, there is also a growth in the volume of Personally identifiable information (PII), Financial Data, and much more. This data needs to be secured. This is why Pen-testing is so important to modern application developers. You need to know how to secure user data, and find vulnerabilities and loopholes in your application that might lead to security breaches. This book gives you the necessary skills to security test your mobile applications as a beginner, developer, or security practitioner. You'll start by discovering the internal components of an Android and an iOS application. Moving ahead, you'll understand the inter-process working of these applications. Then you'll set up a test environment for this application using various tools to identify the loopholes and vulnerabilities in the structure of the applications. Finally, after collecting all information about these security loop holes, we'll start securing our applications from these threats. Style and approach This is an easy-to-follow guide full of hands-on examples of real-world attack simulations. Each topic is explained in context with respect to testing, and for the more inquisitive, there are more details on the concepts and techniques used for different platforms.
Cisco UCS Cookbook
¥90.46
Over 40 practical recipes to get your hands dirty with the powerful Cisco UCS and overcome various challenges About This Book Master the skills of minimizing cost, enabling your business to work faster by reducing cycle times for reporting and improving overall revenue Work through hands-on recipes for efficient deployment approaches, see computing techniques, and explore new operational models with UCS Render a better work-flow management, ensure effective monitoring, and learn new deployment paradigms for the operational infrastructure with the help of this book Who This Book Is For This book is for competent system/network or storage administrators who are working with Cisco UCS, but now want to learn new ways to compute UCS. What You Will Learn Familiarize yourself with information on the latest information on memory management practices, virtualization architectures, and the specific technical advantages of UCS Get a concrete understanding of integrating processes and techniques to ensure effective convergence of LAN/SAN Get to know the best practices of Cisco UCS, EMC Storage, and VMware vSphere Master migrating data from other band servers or Blade to Cisco UCS Comprehend how to replicate and back up UCS to remote sites UCS Assimilate innovative techniques to deploy UCS to leverage its full potential Gather information on installing and configuring automatic and manual Pinning Discover ways to integrate a system in Cisco UCS In Detail Cisco Unified Computing System (UCS) is a data center server platform that is used for computing, deploying, and storing resources in data center environments. This cookbook aims to teach you about various tasks you can implement to improve your existing method of configuring and deploying UCS. You will start by learning how to upgrade your firmware on Brocade and Cisco Fibre Channel Switch and will move on to enhance your knowledge of LAN connectivity. We will then discuss how to configure Windows 2008 and 2012 local boot in Cisco UCS. Next, you will learn how to install the operating system on Cisco UCS and use Cisco UCS Power Calculator to calculate the UCS consumption. Finally, we’ll take a look at backup solutions. By the end of the book, you will know several ways to build and compute in data center environment using Cisco UCS. Style and approach This guide explains every task in a conversational and easy-to-follow style. You can open this book up to the task you want to learn and will be able to perform that task by the end of the recipe.
Test-Driven iOS Development with Swift
¥71.93
Create fully-featured and highly functional iOS apps by writing tests firstAbout This BookLearn test-driven principles to help you build apps with fewer bugs and better designsBecome more efficient while working with Swift to move on to your next project faster!Learn how to incorporate all of the principles of test-driven development (TDD) in to your daily programming workflowWho This Book Is ForIf debugging iOS apps is a nerve-racking task for you and you are looking for a fix, this book is for you.What You Will LearnImplement TDD in swift application developmentGet to know the fundamentals, life cycle, and benefits of TDDExplore the tools and frameworks to effectively use TDDDevelop models and controllers driven by testsConstruct the network layer using stubsUse functional tests to ensure the app works as plannedAutomate and streamline the building, analysing, testing, and archiving of your iOS appsIn DetailTest-driven development (TDD) is a proven way to find software bugs early. Writing tests before your code improves the structure and maintainability of your app.Test-driven iOS Development with Swift will help you understand the process of TDD and how it impacts your applications written in Swift. Through practical, real-world examples, you’ll start seeing how to implement TDD in context. We will begin with an overview of your TDD workflow and then deep-dive into unit testing concepts and code cycles. We will showcase the workings of functional tests, which will help you improve the user interface. Finally, you will learn about automating deployments and continuous integration to run an environment.Style and approachThis is an easy-to-follow example-driven tutorial, packed with lots of tips and tricks that explore TDD bit-by-bit in the process of making an iOS application.
Learning Cython Programming - Second Edition
¥63.21
Learn the fundamentals of Cython to extend the legacy of your applicationsAbout This BookLearn how to extend C applications with pure Python codeGet more from Python – you’ll not only learn Cython, you’ll also unlock a greater understanding of how to harness PythonPacked with tips and tricks that make Cython look easy, dive into this accessible programming guide and find out what happens when you bring C and Python together!Who This Book Is ForThis book is for developers who are familiar with the basics of C and Python programming and wish to learn Cython programming to extend their applications.What You Will LearnReuse Python logging in CMake an IRC bot out of your C applicationExtend an application so you have a web server for rest callsPractice Cython against your C++ codeDiscover tricks to work with Python ConfigParser in CCreate Python bindings for native librariesFind out about threading and concurrency related to GILExpand Terminal Multiplexer Tmux with CythonIn DetailCython is a hybrid programming language used to write C extensions for Python language. Combining the practicality of Python and speed and ease of the C language it’s an exciting language worth learning if you want to build fast applications with ease.This new edition of Learning Cython Programming shows you how to get started, taking you through the fundamentals so you can begin to experience its unique powers.You’ll find out how to get set up, before exploring the relationship between Python and Cython. You’ll also look at debugging Cython, before moving on to C++ constructs, Caveat on C++ usage, Python threading and GIL in Cython. Finally, you’ll learn object initialization and compile time, and gain a deeper insight into Python 3, which will help you not only become a confident Cython developer, but a much more fluent Python developer too.Style and approachThis practical and a fast-paced guide gives you all the information you need to start programming using Cython.
Mastering Puppet - Second Edition
¥90.46
Master Puppet for configuration management of your systems in an enterprise deploymentAbout This BookThis book is an advanced guide to using and deploying Puppet 4 in your organization with a special focus on issues faced in larger enterprise deploymentsFrom an experienced author, learn to deal with scaling, performance, and multiple developers with the help of real-world examplesThis is the most up-to-date guide on Puppet, and covers the advanced concepts of Puppet 4Who This Book Is ForThis book is for those who have intermediate knowledge of Puppet and are looking to deploy it in their environment. Some idea how to write simple modules for configuration management with Puppet is a prerequisite for this book.What You Will LearnScale out your Puppet infrastructure using proxying techniquesAutomate your code promotion workflow using Git and r10kSolve real-world problems using public modules from the Puppet ForgeUse Hiera to separate the data of your configuration from the code of your configurationWrite your own custom facts in RubyExtend Puppet with your own custom facts, modules, and typesUse exported resources to orchestrate change between machinesDebug a puppetserver using Java techniquesIn DetailPuppet is a configuration management system and a language. It was written for and by system administrators to manage large numbers of systems efficiently and prevent configuration drifts.Mastering Puppet deals with the issues faced when scaling out Puppet to handle large numbers of nodes. It will show you how to fit Puppet into your enterprise and allow many developers to work on your Puppet code simultaneously. In addition, you will learn to write custom facts and roll your own modules to solve problems. Next, popular options for performing reporting and orchestration tasks will be introduced in this book. Moving over to troubleshooting techniques, which will be very useful. The concepts presented are useful to any size organization.By the end of the book, you will know how to deal with problems of scale and exceptions in your code, automate workflows, and support multiple developers working simultaneously.Style and approachThis book is a step-wise guide packed with examples to help you configure complex systems in Puppet.
Unreal Engine 4 Game Development Essentials
¥80.65
Master the basics of Unreal Engine 4 to build stunning video gamesAbout This BookGet to grips with the user interface of Unreal Engine 4 and find out more about its various robust featuresCreate dream video games with the help of the different tools Unreal Engine 4 offersCreate video-games and fully utilize the power of Unreal Engine 4 to bring games to life through this step-by-step guideWho This Book Is ForIf you have a basic understanding of working on a 3D environment and you are interested in video game development, then this book is for you. A solid knowledge of C++ will come in handy.What You Will LearnDownload both the binary and source version of Unreal Engine 4 and get familiar with the UIGet to know more about the Material Editor and how it worksAdd a post process to the scene and alter it to get a unique look for your sceneAcquaint yourself with the unique and exclusive feature of Unreal Engine 4—BlueprintsFind out more about Static and Dynamic lighting and the difference between various lightsUse Matinee to create cut scenesCreate a health bar for the player with the use of Unreal Motion Graphics (UMG)Get familiar with Cascade Particle EditorIn DetailUnreal Engine 4 is a complete suite of game development tools that gives you power to develop your game and seamlessly deploy it to iOS and Android devices. It can be used for the development of simple 2D games or even stunning high-end visuals. Unreal Engine features a high degree of portability and is a tool used by many game developers today.This book will introduce you to the very popular Unreal 4 engine with hands-on instructions to build stunning video games. You will begin by creating a new project or prototype by learning the essentials of Unreal engine, then you’ll get an understanding of how the World Browser can help to improve performance of our game. Next, we’ll create a level of detailed models and materials to further improve performance. After that, you’ll see how to import textures, create different materials, and see what materials can do in terms of post-processing. Finally, you will get acquainted with the Paper2D tool and the blueprints system to further increase our project's performance with Engine’s scalability tools.Style and approachThis step-by-step guide will help you gain practical knowledge about Unreal Engine through detailed de*ions of all the tools offered by Unreal Engine.
Real-Time Big Data Analytics
¥80.65
Design, process, and analyze large sets of complex data in real timeAbout This BookGet acquainted with transformations and database-level interactions, and ensure the reliability of messages processed using StormImplement strategies to solve the challenges of real-time data processingLoad datasets, build queries, and make recommendations using Spark SQLWho This Book Is ForIf you are a Big Data architect, developer, or a programmer who wants to develop applications/frameworks to implement real-time analytics using open source technologies, then this book is for you.What You Will LearnExplore big data technologies and frameworksWork through practical challenges and use cases of real-time analytics versus batch analyticsDevelop real-word use cases for processing and analyzing data in real-time using the programming paradigm of Apache StormHandle and process real-time transactional dataOptimize and tune Apache Storm for varied workloads and production deploymentsProcess and stream data with Amazon Kinesis and Elastic MapReducePerform interactive and exploratory data analytics using Spark SQLDevelop common enterprise architectures/applications for real-time and batch analyticsIn DetailEnterprise has been striving hard to deal with the challenges of data arriving in real time or near real time.Although there are technologies such as Storm and Spark (and many more) that solve the challenges of real-time data, using the appropriate technology/framework for the right business use case is the key to success. This book provides you with the skills required to quickly design, implement and deploy your real-time analytics using real-world examples of big data use cases.From the beginning of the book, we will cover the basics of varied real-time data processing frameworks and technologies. We will discuss and explain the differences between batch and real-time processing in detail, and will also explore the techniques and programming concepts using Apache Storm.Moving on, we’ll familiarize you with “Amazon Kinesis” for real-time data processing on cloud. We will further develop your understanding of real-time analytics through a comprehensive review of Apache Spark along with the high-level architecture and the building blocks of a Spark program.You will learn how to transform your data, get an output from transformations, and persist your results using Spark RDDs, using an interface called Spark SQL to work with Spark.At the end of this book, we will introduce Spark Streaming, the streaming library of Spark, and will walk you through the emerging Lambda Architecture (LA), which provides a hybrid platform for big data processing by combining real-time and precomputed batch data to provide a near real-time view of incoming data.Style and approachThis step-by-step is an easy-to-follow, detailed tutorial, filled with practical examples of basic and advanced features.Each topic is explained sequentially and supported by real-world examples and executable code snippets.
Nagios Core Administration Cookbook - Second Edition
¥90.46
Over 90 hands-on recipes that will employ Nagios Core as the anchor of monitoring on your networkAbout This BookMaster the advanced configuration techniques of Nagios Core to model your network better by improving hosts, services, and contactsFilter and improve the notifications that Nagios Core sends in response to failed checks, which can greatly assist you when diagnosing problemsPull Nagios Core's data into a database to write clever custom reports of your own deviseWho This Book Is ForIf you are a network or system administrator and are looking for instructions and examples on working with Nagios Core, then this book is for you. Some basic shell command-line experience is required, and some knowledge of *ing would be helpful when we discuss how plugins work.What You Will LearnManage the configuration of Nagios Core with advanced techniques to achieve fine detail in your checksFind, install, and even write your own check pluginsFilter notifications to send them to the right people or programs at the right timeWork around difficult network accessibility issues and delegate checks to other machinesTweak a Nagios Core server to achieve both high performance and redundancy in case of disasterProcess the results of checks performed by other machines to monitor backups and similar processesExtend Nagios Core to allow advanced *ing, reporting, and network visualization behaviorIn DetailNagios Core is an open source monitoring framework suitable for any network that ensures both internal and customer-facing services are running correctly and manages notification and reporting behavior to diagnose and fix outages promptly. It allows very fine configuration of exactly when, where, what, and how to check network services to meet both the uptime goals of your network and systems team and the needs of your users.This book shows system and network administrators how to use Nagios Core to its fullest as a monitoring framework for checks on any kind of network services, from the smallest home network to much larger production multi-site services. You will discover that Nagios Core is capable of doing much more than pinging a host or to see whether websites respond.The recipes in this book will demonstrate how to leverage Nagios Core's advanced configuration, *ing hooks, reports, data retrieval, and extensibility to integrate it with your existing systems, and to make it the rock-solid center of your network monitoring world.Style and approachEach chapter contains a set of step-by-step recipes to perform an example of a commonly performed task related to network administration. The book begins by focusing closely on the properties and configuration of Nagios Core itself, and gradually moves on to other pieces of software that can support, manage, and extend the system.
Moodle 3 Administration - Third Edition
¥90.46
An administrator’s guide to configuring, securing, customizing, and extending MoodleAbout This BookLearn how to plan, install, optimize, customize, and configure MoodleGuarantee a cutting-edge learning experience in a secure and customizable environment while optimizing your day-to-day workloadA one-stop guide with a problem-solution approach and a wide range of real-world examplesWho This Book Is ForIf you are a technician, systems administrator, or part of academic staff, this is the book for you. This book is ideal for anyone who has to administer a Moodle system. Whether you are dealing with a small-scale local Moodle system or a large-scale multi-site Virtual Learning Environment, this book will assist you with any administrative task. Some basic Moodle knowledge is helpful, but not essential.What You Will LearnInstall and update Moodle on multiple platforms manually and via CLI and GITManage courses and categories, users and cohorts, as well as rolesGet Moodle hooked up to repositories, portfolios, and open badgesConfigure Moodle for mobile usage, accessibility, localization, communication, and collaborationGuarantee backups, security and privacy, and achieve maximum performance via the Moodle Universal Cache and the new cron systemConfigure the Moodle events system to generate comprehensive reports, statistics, and learning analyticsNetwork Moodle with Mahara and extend it with third-party add-ons and via LTICustomize Moodle web services to enable mobile learning and integration with other IT systemsIn DetailMoodle is the de facto standard for open source learning platforms. However, setting up and managing a learning environment can be a complex task since it covers a wide range of technical, organizational, and pedagogical topics. This ranges from basic user and course management, to configuring plugins and design elements, all the way to system settings, performance optimization, events frameworks, and so on.This book concentrates on basic tasks such as how to set up and configure Moodle and how to perform day-to-day administration activities, and progresses on to more advanced topics that show you how to customize and extend Moodle, manage courses, cohorts, and users, and how to work with roles and capabilities. You’ll learn to configure Moodle plugins and ensure your VLE conforms to pedagogical and technical requirements in your organization. You’ll then learn how to integrate the VLE via web services and network it with other sites, including Mahara, and extend your system via plugins and LTI. By the end of this book, you will be able to set up an efficient, fully fledged, and secure Moodle system.Style and approachThe book takes a problem-solution approach to fall in line with your day-to-day operations. This is a one-stop reference for any task you will ever come across when administering a Moodle site of any shape and size.
Scala Design Patterns
¥99.18
Write efficient, clean, and reusable code with ScalaAbout This BookUnleash the power of Scala and apply it in the real worldIncrease your efficiency by leveraging the power of Creational, Structural, Behavioural, and Functional design patternsBuild object oriented and functional applications quickly and effectivelyWho This Book Is ForIf you want to increase your understanding of Scala and apply it to real-life application development, then this book is for you. We’ve also designed the book to be used as a quick reference guide while creating applications. Previous Scala programming knowledge is expected.What You Will LearnImmerse yourself in industry-standard design patterns—structural, creational, and behavioral—to create extraordinary applicationsFeel the power of traits and their application in ScalaImplement abstract and self types and build clean design patternsBuild complex entity relationships using structural design patternsCreate applications faster by applying functional design patternsIn DetailScala has become increasingly popular in many different IT sectors. The language is exceptionally feature-rich which helps developers write less code and get faster results. Design patterns make developer’s lives easier by helping them write great software that is easy to maintain, runs efficiently and is valuable to the company or people concerned.You will learn about the various features of Scala and be able to apply well-known, industry-proven design patterns in your work. The book starts off by focusing on some of the most interesting features of Scala while using practical real-world examples. We will also cover the popular "Gang of Four" design patterns and show you how to incorporate functional patterns effectively. By the end of this book, you will have enough knowledge and understanding to quickly assess problems and come up with elegant solutions.Style and approachThe design patterns in the book will be explained using real-world, step-by-step examples. For each design pattern, there will be hints about when to use it and when to look for something more suitable. This book can also be used as a practical guide, showing you how to leverage design patterns effectively.
3D Printing Designs: Octopus Pencil Holder
¥35.96
Learn to design and 3D print organic and functional designs using BlenderAbout This BookLearn how to make complex shapes by editing basic onesMake printable objects from multiple shapes and partsLearn how to design from scratch, without a reference to physical objectsWho This Book Is ForYou should have basic knowledge of Blender and 3D printing and be interested in printing your first object.What You Will LearnGet to know the guiding principles required to create 3D printer-friendly modelsUnderstand material characteristics, printing specifications, tolerances, and design tipsMaster the art of modifying basic shapes with Blender's powerful editing tools: extrude, loop cuts, and other transformationsLearn techniques of editing complex meshes, smoothing, combining shapes, and exporting them into STL files for printingIn DetailThis book will cover the very basic but essential techniques you need to model an organic and functional object for 3D printing using Blender.Starting with pen and paper and then moving on to the computer, you will create your first project in Blender, add basic geometric shapes, and use techniques such as extruding and subdividing to transform these shapes into complex meshes. You will learn how modifiers can automatically refine the shape further and combine multiple shapes into a single 3D printable model.By the end of the book, you will have gained enough practical hands-on experience to be able to create a 3D printable object of your choice, which in this case is a 3D print-ready octopus pencil holder.Style and approachThis is a starter project designed to introduce you to your first real-world 3D printing designs, where you'll learn how to handle the fundamental principles of 3D printing design and have your hands on your reward in no time.
Kali Linux Web Penetration Testing Cookbook
¥90.46
Over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2About This BookFamiliarize yourself with the most common web vulnerabilities a web application faces, and understand how attackers take advantage of themSet up a penetration testing lab to conduct a preliminary assessment of attack surfaces and run exploitsLearn how to prevent vulnerabilities in web applications before an attacker can make the most of itWho This Book Is ForThis book is for IT professionals, web developers, security enthusiasts, and security professionals who want an accessible reference on how to find, exploit, and prevent security vulnerabilities in web applications. You should know the basics of operating a Linux environment and have some exposure to security technologies and tools.What You Will LearnSet up a penetration testing laboratory in a secure wayFind out what information is useful to gather when performing penetration tests and where to look for itUse crawlers and spiders to investigate an entire website in minutesDiscover security vulnerabilities in web applications in the web browser and using command-line toolsImprove your testing efficiency with the use of automated vulnerability scannersExploit vulnerabilities that require a complex setup, run custom-made exploits, and prepare for extraordinary scenariosSet up Man in the Middle attacks and use them to identify and exploit security flaws within the communication between users and the web serverCreate a malicious site that will find and exploit vulnerabilities in the user's web browserRepair the most common web vulnerabilities and understand how to prevent them becoming a threat to a site's securityIn DetailWeb applications are a huge point of attack for malicious hackers and a critical area for security professionals and penetration testers to lock down and secure. Kali Linux is a Linux-based penetration testing platform and operating system that provides a huge array of testing tools, many of which can be used specifically to execute web penetration testing.This book will teach you, in the form step-by-step recipes, how to detect a wide array of vulnerabilities, exploit them to analyze their consequences, and ultimately buffer attackable surfaces so applications are more secure, for you and your users.Starting from the setup of a testing laboratory, this book will give you the skills you need to cover every stage of a penetration test: from gathering information about the system and the application to identifying vulnerabilities through manual testing and the use of vulnerability scanners to both basic and advanced exploitation techniques that may lead to a full system compromise. Finally, we will put this into the context of OWASP and the top 10 web application vulnerabilities you are most likely to encounter, equipping you with the ability to combat them effectively. By the end of the book, you will have the required skills to identify, exploit, and prevent web application vulnerabilities.Style and approachTaking a recipe-based approach to web security, this book has been designed to cover each stage of a penetration test, with de*ions on how tools work and why certain programming or configuration practices can become security vulnerabilities that may put a whole system, or network, at risk. Each topic is presented as a sequence of tasks and contains a proper explanation of why each task is performed and what it accomplishes.
OpenGL Game Development By Example
¥107.90
Design and code your own 2D and 3D games efficiently using OpenGL and C++ About This Book Create 2D and 3D games completely, through a series of end-to-end game projects Learn to render high performance 2D and 3D graphics using OpenGL Implement a rudimentary game engine using step-by-step code Who This Book Is For If you are a prospective game developer with some experience using C++, then this book is for you. Both prospective and experienced game programmers will find nuggets of wisdom and practical advice as they learn to code two full games using OpenGL, C++, and a host of related tools. What You Will Learn Set up your development environment in Visual Studio using OpenGL Use 2D and 3D coordinate systems Implement an input system to handle the mouse and the keyboard Create a state machine to handle complex changes in the game Load, display, and manipulate both 2D and 3D graphics Implement collision detection and basic physics Discover the key components needed to complete a polished game Handle audio files and implement sound effects and music In Detail OpenGL is one of the most popular rendering SDKs used to develop games. OpenGL has been used to create everything from 3D masterpieces running on desktop computers to 2D puzzles running on mobile devices. You will learn to apply both 2D and 3D technologies to bring your game idea to life. There is a lot more to making a game than just drawing pictures and that is where this book is unique! It provides a complete tutorial on designing and coding games from the setup of the development environment to final credits screen, through the creation of a 2D and 3D game. The book starts off by showing you how to set up a development environment using Visual Studio, and create a code framework for your game. It then walks you through creation of two games–a 2D platform game called Roboracer 2D and a 3D first-person space shooter game–using OpenGL to render both 2D and 3D graphics using a 2D coordinate system. You'll create sprite classes, render sprites and animation, and navigate and control the characters. You will also learn how to implement input, use audio, and code basic collision and physics systems. From setting up the development environment to creating the final credits screen, the book will take you through the complete journey of creating a game engine that you can extend to create your own games. Style and approach An easy-to-follow guide full of code examples to illustrate every concept and help you build a 2D and 3D game from scratch, while learning the key tools that surround a typical OpenGL project.
Mapbox Cookbook
¥71.93
Over 35 recipes to design and implement uniquely styled maps using the Mapbox platform About This Book Design and develop beautifully styled maps using TileMill, MapBox Studio, and CartoCSS Get to grips with the mapbox.js and Leaflet to create visually stunning web and mobile applications An easy-to-follow, quick reference guide to integrate powerful APIs and services like Foursquare, Fusion Tables, Geoserver, and CartoDB to populate your maps Who This Book Is For If you are a web developer seeking for GIS expertise on how to create, style, and publish interactive and unique styled maps, then this book is for you. Basic knowledge of programming and java*s is assumed. What You Will Learn Get accustomed to the MapBox Editor to visually style your maps Learn everything about CartoCSS, and how it will help you fine tune your styled maps Use MapBox Studio and Tilemill to generate your own tiles and vector maps Publish your maps using a variety of technologies like node.js, PHP, and Geoserver Integrate with third party APIs and services to populate your maps with public or private data Create many different map visualization styles like choropleth and heat maps, add interactivity, and even learn how to animate data over time Work with many different data formats and external services to create robust maps Learn to use MapBox GL to create a mobile application In Detail Maps are an essential element in today’s location aware applications. Right from displaying earth surface information to creating thematic maps displaying plethora of information, most of the developers lack the necessary knowledge to create customizable maps with combination of various tools and libraries. The MapBox platform is one such platform which offers all the tools and API required to create and publish a totally customizable map. Starting with building your first map with the online MapBox Editor, we will take you all the way to building advanced web and mobile applications with totally customizable map styles. Through the course of chapters we’ll learn CartoCSS styling language and understand the various components of MapBox platform and their corresponding JavaScript API. In the initial few chapters we will dive deeper into the TileMill and MapBox Studio components of MapBox and use them to generate custom styled map tiles and vector maps. Furthermore, we will publish these custom maps using PHP, node.js and third party tools like Geoserver. We’ll also learn to create different visualizations and map styles like a choropleth map, a heat map and add user interactivity using a UFTGrid. Moving on, we dive into advanced concepts and focus on integration with third party services like Foursquare, Google FusionTables, CartoDB, and Torque to help you populate and even animate your maps. In the final chapter we’ll learn to use the Mapbox SDK to create and publish interactive maps for the iOS platform. By the end of this book, you will learn about MapBox GL and how to create a fully functional, location-aware mobile app, using the maps styles created in the recipes. Style and approach An easy-to-use recipe driven book that will not just serve code samples, but also explains all the theory and concepts required to fully understand each recipe.
Magento 2 Cookbook
¥80.65
Over 50 practical recipes that will help you realize the full potential of Magento in order to build a professional online store About This Book Take advantage of the latest features in Magento 2 to set up an e-commerce store that fits your business needs Packed with several advanced recipes, not just to manage your online store, but to extend and design it as well Written in a cookbook style, you can pick and choose your recipe to carry out your day- to- day Magento store tasks Who This Book Is For The book is for existing Magento users who want to gain further expertise and insights into managing, designing, and extending their online store in Magento to fit their business needs. Working knowledge of Magento and basic familiarity with programming is expected. What You Will Learn Set up a Magento 2 project on Apache or Nginx. Transfer your Magento 1 database to Magento 2 using the Magento 2 system tools. Boost the performance of Magento 2 by enabling different types of caching. Build a Magento 2 multi-store by creating a root catalog, subdirectories, and products. Create and manage pages, blocks, and front-end apps. Manage your Magento store by setting up the correct TAX rules. Design custom themes within the Magento 2 framework. Create basic and advanced extensions using Magento 2. In Detail Magento 2 is an open source e-commerce platform that has all the functionality to function from small to large online stores. It is preferred by developers and merchants due to its new architecture, which makes it possible to extend the functionalities with plugins, a lot of which are now created by the community. This merchant and developer guide is packed with recipes that cover all aspects of Magento 2. The recipes start with simple how-to’s then delve into more advanced topics as the book progresses. We start with the basics of setting up a Magento 2 project on Apache or Nginx. Next, you will learn about basics including system tools and caching to get your Magento 2 system ready for the real work. We move on to simple tasks such as managing your store and catalog configuration. When you are familiar with this, we cover more complex features such as module and extension development. Then we will jump to the final part: advanced Magento 2 extensions. By the end of this book, you’ll be competent with all the development phases of Magento 2 and its most common elements. Style and approach Step by step guide for real world tasks for Magento users to gain a more advanced insight on managing, extending and designing their e-commerce store to fit their business needs.
Troubleshooting OpenStack
¥54.49
Get unstuck and start stacking! About This Book Easily fix the nagging problems that commonly plague OpenStack and become the go-to person in your organization Get better equipped to troubleshoot and solve common problems in performance, availability, and automation that confront production-ready OpenStack environments Save time and decrease frustration by solving significant issues that arise from OpenStack deployments pertaining to storage and networking Who This Book Is For You will need a basic understanding of OpenStack, Linux, and Cloud computing. If you have an understanding of Linux, this book will help you leverage that knowledge in the world of OpenStack, giving you confidence to tackle most issues that may arise. What You Will Learn Diagnose and remediate authentication and authorization problems in Keystone Fix common issues with images served through Glance Master the art of troubleshooting Neutron networking Navigate and overcome problems with Nova Troubleshoot and resolve Cinder block storage issues Identify and correct Swift object storage problems Isolate and fix issues caused by Heat orchestration Leverage Ceilometer and other metering and monitoring tools for effective troubleshooting In Detail OpenStack is a collection of software projects that work together to provide a cloud fabric. OpenStack is one of the fastest growing open source projects in history that unlocks cloud computing for everyone. With OpenStack, you are able to create public or private clouds on your own hardware. The flexibility and control afforded by OpenStack puts the cloud within reach of anyone willing to learn this technology. Starting with an introduction to OpenStack troubleshooting tools, we’ll walk through each OpenStack service and how you can quickly diagnose, troubleshoot, and correct problems in your OpenStack. Understanding the various projects and how they interact is essential for anyone attempting to troubleshoot an OpenStack cloud. We will start by explaining each of the major components and the dependencies between them, and move on to show you how to identify and utilize an effective set of OpenStack troubleshooting tools and fix common Keystone problems. Next, we will expose you to common errors and problems you may encounter when using the OpenStack Block Storage service (Cinder). We will then examine Heat, the OpenStack Orchestration Service, where you will learn how to trace errors, determine their root cause, and effectively correct the issue. Finally, you will get to know the best practices to architect your OpenStack cloud in order to achieve optimal performance, availability, and reliability. Style and approach This is straight-to-the point guide to fixing your OpenStack cluster. Common problems are identified and suggestions to resolve these problems are presented in a simple, easy-to-understand manner.

购物车
个人中心

