Mastering Magento Theme Design
¥99.18
Written in a stepbystep, tutorial style with a lot of code snippets and handson examples to create an advanced Magento theme from scratch, this book is tailormade for web designers and developers. This book is great for developers and web designers who are looking to get a good grounding in how to create custom, responsive, and advanced Magento themes. Readers must have some experience with HTML, PHP, CSS, and Magento theme design. This book will be useful for anybody who already has knowledge of the Magento frontend structure.
SignalR Real-time Application Cookbook
¥90.46
This book contains illustrated code examples to help you create realtime, asynchronous, and bidirectional clientserver applications. Each recipe will concentrate on one specific aspect of application development with SignalR showing you how that aspect can be used proficiently. Different levels of developers will find this book useful. Beginners will be able to learn all the fundamental concepts of SignalR, quickly becoming productive in a difficult arena. Experienced programmers will find in this book a handy and useful collection of readymade solutions to common use cases, which they will be able to enhance as needed. Developers can also use the book as a quick reference to the most important SignalR features. No previous practical experience either with SignalR or with realtime communication in general is required.
Pig Design Patterns
¥99.18
A comprehensive practical guide that walks you through the multiple stages of data management in enterprise and gives you numerous design patterns with appropriate code examples to solve frequent problems in each of these stages. The chapters are organized to mimick the sequential data flow evidenced in Analytics platforms, but they can also be read independently to solve a particular group of problems in the Big Data life cycle. If you are an experienced developer who is already familiar with Pig and is looking for a use case standpoint where they can relate to the problems of data ingestion, profiling, cleansing, transforming, and egressing data encountered in the enterprises. Knowledge of Hadoop and Pig is necessary for readers to grasp the intricacies of Pig design patterns better.
Gitolite Essentials
¥54.49
The book is written to suit an easyreading style, using typical problems in access control to illustrate the need for each Gitolite feature explained. This book is for system administrators or development managers who need to keep a lid on Gitbased development workflows. Basic knowledge of Git as well as of the Unix shell is helpful.
Implementing Samba 4
¥90.46
This book is an implementation tutorial covering stepbystep procedures, examples, and sample code, and has a practical approach to set up a Samba 4 Server as an Active Directory Domain Controller and also set up different Samba 4 server roles. This book is ideal for system administrators who are new to the Samba 4 software, and who are looking to get a good grounding in how to use Samba 4 to implement Active Directory Services. It's assumed that you will have some experience with general system administration, Active Directory, and GNU/Linux systems. Readers are expected to have some test machines (virtual machines), which will be used to execute the examples within this book.
Getting Started with BizTalk Services
¥54.49
A practical book that acts as a clear and concise introduction to BizTalk Services. Full of realworld scenarios, each area of BizTalk Services is explained in detail, essentially enabling you to smoothly design your own integration solutions with minimal effort. This book is intended for those who want to understand BizTalk Services, what it can do, and how to build integration solutions using it in their organizations. If you are a developer, architect, or project manager, this book will quickly get you acquainted with this powerful cloud integration technology. It would be helpful to have some experience with BizTalk Server; however, this is neither required nor assumed. It is recommended to have a sub*ion with Windows Azure to try out the examples in the book.
Learning Primefaces' Extensions Development
¥71.93
This book provides a step by step approach that explains the most important extension components and their features. All the major features are explained by using the JobHub application with supporting screenshots. If you are an intermediate to advanced level user (or developer) who already has a basic working knowledge of PrimeFaces, then this book is for you. The only thing you need to know is Java Server Faces(JSF).
Matplotlib Plotting Cookbook
¥80.65
This book follows a cookbook style approach that puts orthogonal and nonredundant recipes in your hands. Rather than rehashing the user manual, the explanations expose the underlying logic behind Matplotlib. If you are an engineer or scientist who wants to create great visualizations with Python, rather than yet another specialized language, this is the book for you. While there are several very competent plotting packages, Matplotlib is “just” a Python module. Thus, if you know some Python already, you will feel at home from the first steps on. In case you are an application writer, you won't be left out since the integration of Matplolib is covered.
Windows Malware Analysis Essentials
¥90.46
Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set About This Book Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware Understand how to decipher x86 assembly code from source code inside your favourite development environment A step-by-step based guide that reveals malware analysis from an industry insider and demystifies the process Who This Book Is For This book is best for someone who has prior experience with reverse engineering Windows executables and wants to specialize in malware analysis. The book presents the malware analysis thought process using a show-and-tell approach, and the examples included will give any analyst confidence in how to approach this task on their own the next time around. What You Will Learn Use the positional number system for clear conception of Boolean algebra, that applies to malware research purposes Get introduced to static and dynamic analysis methodologies and build your own malware lab Analyse destructive malware samples from the real world (ITW) from fingerprinting and static/dynamic analysis to the final debrief Understand different modes of linking and how to compile your own libraries from assembly code and integrate the codein your final program Get to know about the various emulators, debuggers and their features, and sandboxes and set them up effectively depending on the required scenario Deal with other malware vectors such as pdf and MS-Office based malware as well as *s and shellcode In Detail Windows OS is the most used operating system in the world and hence is targeted by malware writers. There are strong ramifications if things go awry. Things will go wrong if they can, and hence we see a salvo of attacks that have continued to disrupt the normal scheme of things in our day to day lives. This book will guide you on how to use essential tools such as debuggers, disassemblers, and sandboxes to dissect malware samples. It will expose your innards and then build a report of their indicators of compromise along with detection rule sets that will enable you to help contain the outbreak when faced with such a situation. We will start with the basics of computing fundamentals such as number systems and Boolean algebra. Further, you'll learn about x86 assembly programming and its integration with high level languages such as C++.You'll understand how to decipher disassembly code obtained from the compiled source code and map it back to its original design goals. By delving into end to end analysis with real-world malware samples to solidify your understanding, you'll sharpen your technique of handling destructive malware binaries and vector mechanisms. You will also be encouraged to consider analysis lab safety measures so that there is no infection in the process. Finally, we'll have a rounded tour of various emulations, sandboxing, and debugging options so that you know what is at your disposal when you need a specific kind of weapon in order to nullify the malware. Style and approach An easy to follow, hands-on guide with de*ions and screenshots that will help you execute effective malicious software investigations and conjure up solutions creatively and confidently.
Learning Puppet for Windows Server
¥80.65
This book is for Windows administrators seeking to automate the management tasks of Windows servers and clients. Prior experience in Windows administration and a basic knowledge of Linux and Puppet will help you create wonders.
Python Data Science Essentials
¥71.93
If you are an aspiring data scientist and you have at least a working knowledge of data analysis and Python, this book will get you started in data science. Data analysts with experience of R or MATLAB will also find the book to be a comprehensive reference to enhance their data manipulation and machine learning skills.
WebSocket Essentials – Building Apps with HTML5 WebSockets
¥54.49
This book is for web developers who want to learn and implement WebSocket to create interesting apps for modern browsers, leveraging the capabilities of HTML5 with WebSockets.
PostgreSQL 9 Administration Cookbook - Second Edition
¥107.90
Through example-driven recipes, with plenty of code, focused on the most vital features of the latest PostgreSQL version (9.4), both administrators and developers will follow short, specific guides to understand and leverage useful Postgre functionalities to create better and more efficient databases.
Raspberry Pi Blueprints
¥80.65
If you have already undertaken some simple projects with the Raspberry Pi and are looking to enter the exciting work of hardware interaction, then this book is ideal for you.
Selenium Essentials
¥54.49
If you are a developer who wants to migrate from Selenium RC or any other automation tool to Selenium WebDriver, then this book is for you. Knowledge of automation tools is necessary to follow the examples in this book.
Learning Puppet Security
¥71.93
If you are a security professional whose workload is increasing, or a Puppet professional looking to increase your knowledge of security, or even an experienced systems administrator, then this book is for you. This book will take you to the next level of security automation using Puppet. The book requires no prior knowledge of Puppet to get started.
Home Automation with Intel Galileo
¥54.49
This book is for anyone who wants to learn Intel Galileo for home automation and cross-platform software development. No knowledge of programming with Intel Galileo is assumed, but knowledge of the C programming language is essential.
Learning Android Application Testing
¥90.46
If you are an Android developer looking to test your applications or optimize your application development process, then this book is for you. No previous experience in application testing is required.
Responsive Design High Performance
¥54.49
This book is ideal for developers who have experience in developing websites or possess minor knowledge of how responsive websites work. No experience of high-level website development or performance tweaking is required.
Mastering Cocos2d Game Development
¥80.65
If you are a developer who is experienced with Cocos2d and Objective-C, and want to take your game development skills to the next level, this book is going to help you achieve your goal.
CentOS High Availability
¥54.49
This book is targeted at system engineers and system administrators who want to upgrade their knowledge and skills in high availability and want to learn practically how to achieve high availability with CentOS Linux. You are expected to have good CentOS Linux knowledge and basic networking experience.

购物车
个人中心

