万本电子书0元读

万本电子书0元读

Puppet 5 Cookbook
Puppet 5 Cookbook
Thomas Uphill
¥81.74
Write custom plugins for Puppet, including facts, providers, and functions About This Book ? Grasp recipes that work with centralized and decentralized deployments ? Explore language differences and enhancements anticipated in Puppet version 5.x ? Gain expert understanding of Puppet's latest and most advanced features Who This Book Is For Puppet 5 Cookbook is for anyone who builds and administers servers, especially in a web operations context. You’ll need some experience of Linux systems administration, including familiarity with the command line, filesystem, and text editing. No prior programming experience is required. What You Will Learn ? Discover the latest and most advanced features of Puppet ? Bootstrap your Puppet installation using powerful tools like Rake ? Master techniques to deal with centralized and decentralized Puppet deployments ? Use exported resources and forge modules to set up Puppet modules ? Create efficient manifests to streamline your deployments ? Automate Puppet master deployment using Git hooks and PuppetDB ? Make Puppet reliable, performant, and scalable In Detail Puppet is a configuration management system that automates all your IT configurations, giving you control of managing each node.Puppet 5 Cookbook will take you through Puppet's latest and most advanced features, including Docker containers, Hiera, and AWS Cloud Orchestration. Updated with the latest advancements and best practices, this book delves into various aspects of writing good Puppet code, which includes using Puppet community style, checking your manifests with puppet-lint, and learning community best practices with an emphasis on real-world implementation. You will learn to set up, install, and create your first manifests with Puppet version control, and also understand various sysadmin tasks, including managing config files, using Augeas, and generating files from snippets and templates. As the book progresses, you’ll explore virtual resources and use Puppet's resource scheduling and auditing features. In the concluding chapters, you’ll walk through managing applications and writing your own resource types, providers, and external node classifiers. By the end of this book, you will have learned to report, log, and debug your system. Style and approach A recipe-based guide filled with quick step-by-step instructions that are immediately applicable
C# and .NET Core Test Driven Development
C# and .NET Core Test Driven Development
Ayobami Adewole
¥73.02
Learn how to apply a test-driven development process by building ready C# 7 and .NET Core applications. About This Book ? Create tests to quickly detect and resolve issues when writing portable code ? Uncover code integration issues that improve code quality using continuous integration ? Set up and use data-driven unit testing to verify your code Who This Book Is For This book is for .NET developers who would like to build efficient applications by implementing principles of test-driven development. C# programming and working knowledge of VS is assumed. What You Will Learn ? Write flexible, maintainable, and verifiable code for .NET Core ? Write testable code using SOLID principles and dependency injections ? Recognize the characteristics of a good unit test ? Structure and group your unit test ? Use mock objects to handle dependencies ? Set up an end-to-end continuous integration process In Detail This book guides developers to create robust, production-ready C# 7 and .NET Core applications through the practice of test-driven development process. In C# and .NET Core Test-Driven Development, you will learn the different stages of the TDD life cycle, basics of TDD, best practices, and anti-patterns. It will teach you how to create an ASP.NET Core MVC sample application, write testable code with SOLID principles and set up a dependency injection for your sample application. Next, you will learn the xUnit testing framework and learn how to use its attributes and assertions. You’ll see how to create data-driven unit tests and mock dependencies in your code. You will understand the difference between running and debugging your tests on .NET Core on LINUX versus Windows and Visual Studio. As you move forward, you will be able to create a healthy continuous integration process for your sample application using GitHub, TeamCity, Cake, and Microsoft VSTS. By the end of this book, you will have learned how to write clean and robust code through the effective practice of TDD, set up CI build steps to test and build applications as well as how to package application for deployment on NuGet. Style and approach The book explores the concepts of test driven development in depth so readers can apply these proven techniques to build sophisticated software with C# and .NET.
Secret Recipes of the Python Ninja
Secret Recipes of the Python Ninja
Cody Jackson
¥90.46
Test your Python programming skills by solving real-world problems About This Book ? Access built-in documentation tools and improve your code. ? Discover how to make the best use of decorator and generator functions ? Enhance speed and improve concurrency by conjuring tricks from the PyPy project Who This Book Is For Whether you’ve been working with Python for a few years or you’re a seasoned programmer, you’ll have a lot of new tricks to walk away with. What You Will Learn ? Know the differences between .py and .pyc files ? Explore the different ways to install and upgrade Python packages ? Understand the working of the PyPI module that enhances built-in decorators ? See how coroutines are different from generators and how they can simulate multithreading ? Grasp how the decimal module improves floating point numbers and their operations ? Standardize sub interpreters to improve concurrency ? Discover Python’s built-in docstring analyzer In Detail This book covers the unexplored secrets of Python, delve into its depths, and uncover its mysteries. You’ll unearth secrets related to the implementation of the standard library, by looking at how modules actually work. You’ll understand the implementation of collections, decimals, and fraction modules. If you haven’t used decorators, coroutines, and generator functions much before, as you make your way through the recipes, you’ll learn what you’ve been missing out on. We’ll cover internal special methods in detail, so you understand what they are and how they can be used to improve the engineering decisions you make. Next, you’ll explore the CPython interpreter, which is a treasure trove of secret hacks that not many programmers are aware of. We’ll take you through the depths of the PyPy project, where you’ll come across several exciting ways that you can improve speed and concurrency. Finally, we’ll take time to explore the PEPs of the latest versions to discover some interesting hacks. Style and approach Recipe based approach where each problem is solved with the help of step by step instructions.
Splunk Operational Intelligence Cookbook
Splunk Operational Intelligence Cookbook
Josh Diakun,Paul R Johnson,Derek Mock
¥99.18
Leverage Splunk's operational intelligence capabilities to unlock new hidden business insights and drive success About This Book ? Tackle any problems related to searching and analyzing your data with Splunk ? Get the latest information and business insights on Splunk 7.x ? Explore the all new machine learning toolkit in Splunk 7.x Who This Book Is For This book is intended for data professionals who are looking to leverage the Splunk Enterprise platform as a valuable operational intelligence tool. The recipes provided in this book will appeal to individuals from all facets of business, IT, security, product, marketing, and many more! Even the existing users of Splunk who want to upgrade and get up and running with Splunk 7.x will find this book to be of great value. What You Will Learn ? Learn how to use Splunk to gather, analyze, and report on data ? Create dashboards and visualizations that make data meaningful ? Build an intelligent application with extensive functionalities ? Enrich operational data with lookups and workflows ? Model and accelerate data and perform pivot-based reporting ? Apply ML algorithms for forecasting and anomaly detection ? Summarize data for long term trending, reporting, and analysis ? Integrate advanced JavaScript charts and leverage Splunk's API In Detail Splunk makes it easy for you to take control of your data, and with Splunk Operational Cookbook, you can be confident that you are taking advantage of the Big Data revolution and driving your business with the cutting edge of operational intelligence and business analytics. With more than 70 recipes that demonstrate all of Splunk’s features, not only will you find quick solutions to common problems, but you’ll also learn a wide range of strategies and uncover new ideas that will make you rethink what operational intelligence means to you and your organization. You’ll discover recipes on data processing, searching and reporting, dashboards, and visualizations to make data shareable, communicable, and most importantly meaningful. You’ll also find step-by-step demonstrations that walk you through building an operational intelligence application containing vital features essential to understanding data and to help you successfully integrate a data-driven way of thinking in your organization. Throughout the book, you’ll dive deeper into Splunk, explore data models and pivots to extend your intelligence capabilities, and perform advanced searching with machine learning to explore your data in even more sophisticated ways. Splunk is changing the business landscape, so make sure you’re taking advantage of it. Style and approach With more than 70 recipes that demonstrate all of Splunk’s features, not only will you find quick solutions to common problems, but you’ll also learn a wide range of strategies and uncover new ideas that will make you rethink what operational intelligence means to you and your organization.
Big Data Architect’s Handbook
Big Data Architect’s Handbook
Syed Muhammad Fahad Akhtar
¥90.46
A comprehensive end-to-end guide that gives hands-on practice in big data and Artificial Intelligence About This Book ? Learn to build and run a big data application with sample code ? Explore examples to implement activities that a big data architect performs ? Use Machine Learning and AI for structured and unstructured data Who This Book Is For Big Data Architect’s Handbook is for you if you are an aspiring data professional, developer, or IT enthusiast who aims to be an all-round architect in big data. This book is your one-stop solution to enhance your knowledge and carry out easy to complex activities required to become a big data architect. What You Will Learn ? Learn Hadoop Ecosystem and Apache projects ? Understand, compare NoSQL database and essential software architecture ? Cloud infrastructure design considerations for big data ? Explore application scenario of big data tools for daily activities ? Learn to analyze and visualize results to uncover valuable insights ? Build and run a big data application with sample code from end to end ? Apply Machine Learning and AI to perform big data intelligence ? Practice the daily activities performed by big data architects In Detail The big data architects are the “masters” of data, and hold high value in today’s market. Handling big data, be it of good or bad quality, is not an easy task. The prime job for any big data architect is to build an end-to-end big data solution that integrates data from different sources and analyzes it to find useful, hidden insights. Big Data Architect’s Handbook takes you through developing a complete, end-to-end big data pipeline, which will lay the foundation for you and provide the necessary knowledge required to be an architect in big data. Right from understanding the design considerations to implementing a solid, efficient, and scalable data pipeline, this book walks you through all the essential aspects of big data. It also gives you an overview of how you can leverage the power of various big data tools such as Apache Hadoop and ElasticSearch in order to bring them together and build an efficient big data solution. By the end of this book, you will be able to build your own design system which integrates, maintains, visualizes, and monitors your data. In addition, you will have a smooth design flow in each process, putting insights in action. Style and approach Comprehensive guide with a perfect blend of theory, examples and implementation of real-world use-cases
Wireshark 2 Quick Start Guide
Wireshark 2 Quick Start Guide
Charit Mishra
¥50.13
Protect your network as you move from the basics of the Wireshark scenarios to detecting and resolving network anomalies. About This Book ? Learn protocol analysis, optimization and troubleshooting using Wireshark, an open source tool ? Learn the usage of filtering and statistical tools to ease your troubleshooting job ? Quickly perform root-cause analysis over your network in an event of network failure or a security breach Who This Book Is For If you are a security professional or a network enthusiast who is interested in understanding the internal working of networks and packets, then this book is for you. No prior knowledge of Wireshark is needed. What You Will Learn ? Learn how TCP/IP works? ? Install Wireshark and understand its GUI ? Creation and Usage of Filters to ease analysis process ? Understand the usual and unusual behaviour of Protocols ? Troubleshoot network anomalies quickly with help of Wireshark ? Use Wireshark as a diagnostic tool for network security analysis to identify source of malware ? Decrypting wireless traffic ? Resolve latencies and bottleneck issues in the network In Detail Wireshark is an open source protocol analyser, commonly used among the network and security professionals. Currently being developed and maintained by volunteer contributions of networking experts from all over the globe. Wireshark is mainly used to analyze network traffic, analyse network issues, analyse protocol behaviour, etc. - it lets you see what's going on in your network at a granular level. This book takes you from the basics of the Wireshark environment to detecting and resolving network anomalies. This book will start from the basics of setting up your Wireshark environment and will walk you through the fundamentals of networking and packet analysis. As you make your way through the chapters, you will discover different ways to analyse network traffic through creation and usage of filters and statistical features. You will look at network security packet analysis, command-line utilities, and other advanced tools that will come in handy when working with day-to-day network operations. By the end of this book, you have enough skill with Wireshark 2 to overcome real-world network challenges. Style and approach Learn and practice the skills of protocol and network analysis using the tool of the pros, Wireshark.
IBM Db2 11.1 Certification Guide
IBM Db2 11.1 Certification Guide
Mohankumar Saraswatipura,Robert (Kent) Collins
¥73.02
Mastering material for dealing with DBA certification exams About This Book ? Prepare yourself for the IBM C2090-600 certification exam ? Cover over 50 Db2 procedures including database design, performance, and security ? Work through over 150 Q&As to gain confidence on each topic Who This Book Is For The IBM Db2 11.1 Certification Guide is an excellent choice for database administrators, architects, and application developers who are keen to obtain certification in Db2. Basic understanding of Db2 is expected in order to get the most out of this guide. What You Will Learn ? Configure and manage Db2 servers, instances, and databases ? Implement Db2 BLU Acceleration and a DB2 pureScale environment ? Create, manage, and alter Db2 database objects ? Use the partitioning capabilities available within Db2 ? Enforce constraint checking with the SET INTEGRITY command ? Utilize the Db2 problem determination (db2pd) and dsmtop tools ? Configure and manage HADR ? Understand how to encrypt data in transit and at rest In Detail IBM Db2 is a relational database management system (RDBMS) that helps you store, analyze, and retrieve data efficiently. This comprehensive book is designed to help you master all aspects of IBM Db2 database administration and prepare you to take and pass IBM's Certification Exams C2090-600. Building on years of extensive experience, the authors take you through all areas covered by the test. The book delves deep into each certification topic: Db2 server management, physical design, business rules implementation, activity monitoring, utilities, high availability, and security. IBM Db2 11.1 Certification Guide provides you with more than 150 practice questions and answers, simulating real certification examination questions. Each chapter includes an extensive set of practice questions along with carefully explained answers. This book will not just prepare you for the C2090-600 exam but also help you troubleshoot day-to-day database administration challenges. Style and approach A comprehensive certification preparation guide for the C2090-600 exam, covering all the topics in greater detail and with sample questions and answers at the end of each chapter.
Hands-On Cryptography with Python
Hands-On Cryptography with Python
Samuel Bowne
¥54.49
Learn to evaluate and compare data encryption methods and attack cryptographic systems About This Book ? Explore popular and important cryptographic methods ? Compare cryptographic modes and understand their limitations ? Learn to perform attacks on cryptographic systems Who This Book Is For Hands-On Cryptography with Python is for security professionals who want to learn to encrypt and evaluate data, and compare different encryption methods. What You Will Learn ? Protect data with encryption and hashing ? Explore and compare various encryption methods ? Encrypt data using the Caesar Cipher technique ? Make hashes and crack them ? Learn how to use three NIST-recommended systems: AES, SHA, and RSA ? Understand common errors in encryption and exploit them In Detail Cryptography is essential for protecting sensitive information, but it is often performed inadequately or incorrectly. Hands-On Cryptography with Python starts by showing you how to encrypt and evaluate your data. The book will then walk you through various data encryption methods,such as obfuscation, hashing, and strong encryption, and will show how you can attack cryptographic systems. You will learn how to create hashes, crack them, and will understand why they are so different from each other. In the concluding chapters, you will use three NIST-recommended systems: the Advanced Encryption Standard (AES), the Secure Hash Algorithm (SHA), and the Rivest-Shamir-Adleman (RSA). By the end of this book, you will be able to deal with common errors in encryption. Style and approach A practical guide that will help the readers to encrypt their data with ease
Robot Operating System Cookbook
Robot Operating System Cookbook
Kumar Bipin
¥81.74
Leverage the power of ROS to build exciting collaborative robots. About This Book ? Delve into an open source, meta-operating system for your robot ? Get acquainted with tools and libraries for building and running code on multiple platforms ? Use Gazebo to model your robot and create a virtual environment Who This Book Is For If you’re a researcher or engineer with an interest in the problems, solutions, and future research issues that you may encounter in the development of robotic applications, this book is for you. Basic knowledge of C++ and Python programming with the GNU/Linux environment is strongly recommended to assist with understanding the key concepts covered in the book. What You Will Learn ? Explore advanced concepts, such as ROS pluginlib, nodelets, and actionlib ? Work with ROS visualization, profiling, and debugging tools ? Gain experience in robot modeling and simulation using Gazebo ? Understand the ROS Navigation Stack for mobile robots ? Configure a MoveIt! package for a manipulator robot ? Develop an autonomous navigation framework for MAV using ORB SLAM and MoveIt ? Integrate sensors, actuators, and robots into the ROS ecosystem ? Get acquainted with the ROS-Industrial package with hardware support, capabilities, and applications In Detail This book will leverage the power of ROS with an introduction to its core and advanced concepts through exciting recipes. You will get acquainted with the use of different synchronous and asynchronous communication methods, including messages, services, and actions. You will learn how to use the various debugging and visualization tools used in development and how to interface sensors and actuators with the ROS framework. Firstly, you will get to grips with ROS simulation frameworks, such as Gazebo and RotorS for modeling and simulating any physical robot and virtual environment. You will also cover mobile robotics, micro-aerial vehicles, and robotic arms, which are the leading branches of robotic applications. Robot Operating System Cookbook will also guide you in the development of an autonomous navigation framework for both mobile robots and micro-aerial vehicles. Finally, you will explore ROS-Industrial, an open source project that extends the advanced capabilities of ROS software to manufacturing industries. Style and approach The goal of this book is to provide an integrated overview of the concepts and techniques. ROS is not an operating system in the traditional sense of process management and scheduling; rather, it provides a structured communications layer above the host operating systems of a heterogeneous compute cluster.
Mastering pfSense
Mastering pfSense
David Zientara
¥90.46
Install and configure a pfSense router/firewall, and become a pfSense expert in the process. About This Book ? You can always do more to secure your software – so extend and customize your pfSense firewall ? Build a high availability security system that’s fault-tolerant – and capable of blocking potential threats ? Put the principles of better security into practice by implementing examples provided in the text Who This Book Is For This book is for those with at least an intermediate understanding of networking. Prior knowledge of pfSense would be helpful but is not required. Those who have the resources to set up a pfSense firewall, either in a real or virtual environment, will especially benefit, as they will be able to follow along with the examples in the book. What You Will Learn ? Configure pfSense services such as DHCP, Dynamic DNS, captive portal, DNS, NTP and SNMP ? Set up a managed switch to work with VLANs ? Use pfSense to allow, block and deny traffic, and to implement Network Address Translation (NAT) ? Make use of the traffic shaper to lower and raise the priority of certain types of traffic ? Set up and connect to a VPN tunnel with pfSense ? Incorporate redundancy and high availability by utilizing load balancing and the Common Address Redundancy Protocol (CARP) ? Explore diagnostic tools in pfSense to solve network problems In Detail pfSense has the same reliability and stability as even the most popular commercial firewall offerings on the market – but, like the very best open-source software, it doesn’t limit you. You’re in control – you can exploit and customize pfSense around your security needs. Mastering pfSense - Second Edition, covers features that have long been part of pfSense such as captive portal, VLANs, traffic shaping, VPNs, load balancing, Common Address Redundancy Protocol (CARP), multi-WAN, and routing. It also covers features that have been added with the release of 2.4, such as support for ZFS partitions and OpenVPN 2.4. This book takes into account the fact that, in order to support increased cryptographic loads, pfSense version 2.5 will require a CPU that supports AES-NI. The second edition of this book places more of an emphasis on the practical side of utilizing pfSense than the previous edition, and, as a result, more examples are provided which show in step-by-step fashion how to implement many features. Style and approach Practical guide to learn the advanced functionalities of pfSense with minimum fuss.
Mastering Metasploit
Mastering Metasploit
Nipun Jaswal
¥81.74
Discover the next level of network defense with the Metasploit framework About This Book ? Gain the skills to carry out penetration testing in complex and highly-secured environments ? Become a master using the Metasploit framework, develop exploits, and generate modules for a variety of real-world scenarios ? Get this completely updated edition with new useful methods and techniques to make your network robust and resilient Who This Book Is For This book is a hands-on guide to penetration testing using Metasploit and covers its complete development. It shows a number of techniques and methodologies that will help you master the Metasploit framework and explore approaches to carrying out advanced penetration testing in highly secured environments. What You Will Learn ? Develop advanced and sophisticated auxiliary modules ? Port exploits from PERL, Python, and many more programming languages ? Test services such as databases, SCADA, and many more ? Attack the client side with highly advanced techniques ? Test mobile and tablet devices with Metasploit ? Bypass modern protections such as an AntiVirus and IDS with Metasploit ? Simulate attacks on web servers and systems with Armitage GUI ? Script attacks in Armitage using CORTANA scripting In Detail We start by reminding you about the basic functionalities of Metasploit and its use in the most traditional ways. You’ll get to know about the basics of programming Metasploit modules as a refresher and then dive into carrying out exploitation as well building and porting exploits of various kinds in Metasploit. In the next section, you’ll develop the ability to perform testing on various services such as databases, Cloud environment, IoT, mobile, tablets, and similar more services. After this training, we jump into real-world sophisticated scenarios where performing penetration tests are a challenge. With real-life case studies, we take you on a journey through client-side attacks using Metasploit and various scripts built on the Metasploit framework. By the end of the book, you will be trained specifically on time-saving techniques using Metasploit. Style and approach This is a step-by-step guide that provides great Metasploit framework methodologies. All the key concepts are explained details with the help of examples and demonstrations that will help you understand everything you need to know about Metasploit.
Mastering Xamarin.Forms - Second Edition
Mastering Xamarin.Forms - Second Edition
Ed Snider
¥54.49
Create high-quality multi-platform native apps with Xamarin.Forms About This Book ? Packed with real-world scenarios and solutions to help you build professional-grade mobile apps with Xamarin.Forms ? Build an effective mobile app architecture with the Xamarin.Forms toolkit ? Find out how, when, and why you should use architectural patterns and get best practices with Xamarin.Forms Who This Book Is For This book is intended for C# developers who are familiar with the Xamarin platform and the Xamarin.Forms toolkit. If you have already started working with Xamarin.Forms and want to take your app to the next level with higher quality, maintainability, testability, and flexibility, then this book is for you. What You Will Learn ? Implement the Model-View-View-Model (MVVM) pattern and data-binding in Xamarin.Forms mobile apps ? Extend the Xamarin.Forms navigation API with a custom ViewModel-centric navigation service ? Leverage the inversion of control and dependency injection patterns in Xamarin.Forms mobile apps ? Work with online and offline data in Xamarin.Forms mobile apps ? Test business logic in Xamarin.Forms mobile apps ? Use platform-specific APIs to build rich custom user interfaces in Xamarin.Forms mobile apps ? Explore how to improve mobile app quality using Visual Studio AppCenter In Detail Discover how to extend and build upon the components of the Xamarin.Forms toolkit to develop an effective, robust mobile app architecture. Starting with an app built with the basics of the Xamarin.Forms toolkit, you'll go step by step through several advanced topics to create a solution architecture rich with the benefits of good design patterns and best practices. You'll start by introducing a core separation between the app's user interface and its business logic by applying the MVVM pattern and data-binding. Then you focus on building out a layer of plugin-like services that handle platform-specific utilities such as navigation and geo-location, and on how to loosely use these services in the app with inversion of control and dependency injection. Next you connect the app to a live web-based API and set up offline synchronization. Then, you delve into testing the app logic through unit tests. Finally, you set up Visual Studio App Center for monitoring usage and bugs to gain a proactive edge on app quality. Style and approach This easy-to-follow, code-rich guide will walk you through building a real-world Xamarin.Forms mobile app from start to finish. Each chapter builds on the app by applying new advanced capabilities, design patterns, and best practices. Packed with real-world scenarios, this step-by-step guide will help you quickly build professional-grade apps with Xamarin.Forms.
C# 7 and .NET Core 2.0 Blueprints
C# 7 and .NET Core 2.0 Blueprints
Dirk Strauss,Jas Rademeyer
¥90.46
Leverage the features of C# 7 and .NET core 2.0 to build real-world .NET core applications About This Book ? See how to incorporate Entity Framework Core to build ASP .NET core MVC application ? Get hands-on SignalR and NuGet packages ? Work with Reactive Extensions (Rx.Net) using the elasticsearch tool ? Get hands-on with .NET Core MVC, Middleware, Controllers, Views, Layouts, Routing, and authentication ? Implement Azure Service Fabric and Microservices and AWS, S3,Serverless computing ? Work on .NET Core cross-platform functionality ? Run a .NET Core MVC application with Docker compose ? Easy-to-follow real-world projects that get you up and running with the new features of C# 7 and .NET Core 2.0 ? The practical applications will assist you with concepts such as Entity Framework Core, serverless computing, microservices, and more in .NET Core 2.0 ? Explore the workings of Rx.Net and build cross-platform mobile applications using Xamarin Who This Book Is For This book is for .NET developers who would like to master and implement C# 7 and .NET Core 2.0 with practical projects. Basic knowledge of .NET Core and C# is assumed. What You Will Learn ? How to incorporate Entity Framework Core to build ASP .NET Core MVC applications ? Get hands-on experience with SignalR, and NuGet packages ? Working with MongoDB in your ASP.NET Core MVC application ? Get hands-on experience with .NET Core MVC, Middleware, Controllers, Views, Layouts, Routing, and OAuth ? Implementing Azure Functions and learn what Serverless computing means ? See how .NET Core enables cross-platform applications that run on Windows, macOS and Linux ? Running a .NET Core MVC application with Docker Compose In Detail NET Core is a general purpose, modular, cross-platform, and open source implementation of .NET. With the latest release of .NET Core, many more APIs are expected to show up, which will make APIs consistent across .Net Framework, .NET Core, and Xamarin. This step-by-step guide will teach you the essential .NET Core and C# concepts with the help of real-world projects. The book starts with a brief introduction to the latest features of C# 7 and .NET Core 2.0 before moving on to explain how C# 7 can be implemented using the object-oriented paradigm. You'll learn to work with relational data using Entity Framework and see how to use ASP.NET Core practically. This book will show you how .NET Core allows the creations of cross-platform applications. You'll also learn about SignalR to add real-time functionality to your application. Then you will see how to use MongoDB and how to implement MongoDB into your applications. You'll learn about serverless computing and OAuth concepts, along with running ASP.NET Core applications with Docker Compose. This project-based guide uses practical applications to demonstrate these concepts. By the end of the book, you'll be profcient in developing applications using .NET Core 2.0 Style and approach This comprehensive guide uses 11 real-world practical projects to implement .NET Core and C# concepts step by step.
Cloud Security Automation
Cloud Security Automation
Prashant Priyam
¥81.74
Secure public and private cloud workloads with this comprehensive learning guide. About This Book ? Take your cloud security functions to the next level by automation ? Learn to automate your security functions on AWS and OpenStack ? Practical approach towards securing your workloads efficiently Who This Book Is For This book is targeted at DevOps Engineers, Security professionals, or any stakeholders responsible for securing cloud workloads. Prior experience with AWS or OpenStack will be an advantage. What You Will Learn ? Define security for public and private cloud services ? Address the security concerns of your cloud ? Understand Identity and Access Management ? Get acquainted with cloud storage and network security ? Improve and optimize public and private cloud security ? Automate cloud security ? Understand the security compliance requirements of your cloud In Detail Security issues are still a major concern for all IT organizations. For many enterprises, the move to cloud computing has raised concerns for security, but when applications are architected with focus on security, cloud platforms can be made just as secure as on-premises platforms. Cloud instances can be kept secure by employing security automation that helps make your data meet your organization's security policy. This book starts with the basics of why cloud security is important and how automation can be the most effective way of controlling cloud security. You will then delve deeper into the AWS cloud environment and its security services by dealing with security functions such as Identity and Access Management and will also learn how these services can be automated. Moving forward, you will come across aspects such as cloud storage and data security, automating cloud deployments, and so on. Then, you'll work with OpenStack security modules and learn how private cloud security functions can be automated for better time- and cost-effectiveness. Toward the end of the book, you will gain an understanding of the security compliance requirements for your Cloud. By the end of this book, you will have hands-on experience of automating your cloud security and governance. Style and approach This book follows a step-by-step, practical approach to help automate and secure your cloud account structure in an Amazon Web Services (AWS) and OpenStack environment.
Practical Cyber Intelligence
Practical Cyber Intelligence
Wilson Bautista Jr.
¥81.74
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation. About This Book ? Intelligence processes and procedures for response mechanisms ? Master F3EAD to drive processes based on intelligence ? Threat modeling and intelligent frameworks ? Case studies and how to go about building intelligent teams Who This Book Is For This book targets incident managers, malware analysts, reverse engineers, digital forensics specialists, and intelligence analysts; experience in, or knowledge of, security operations, incident responses or investigations is desirable so you can make the most of the subjects presented. What You Will Learn ? Learn about the Observe-Orient-Decide-Act (OODA) loop and it's applicability to security ? Understand tactical view of Active defense concepts and their application in today's threat landscape ? Get acquainted with an operational view of the F3EAD process to drive decision making within an organization ? Create a Framework and Capability Maturity Model that integrates inputs and outputs from key functions in an information security organization ? Understand the idea of communicating with the Potential for Exploitability based on cyber intelligence In Detail Cyber intelligence is the missing link between your cyber defense operation teams, threat intelligence, and IT operations to provide your organization with a full spectrum of defensive capabilities. This book kicks off with the need for cyber intelligence and why it is required in terms of a defensive framework. Moving forward, the book provides a practical explanation of the F3EAD protocol with the help of examples. Furthermore, we learn how to go about threat models and intelligence products/frameworks and apply them to real-life scenarios. Based on the discussion with the prospective author I would also love to explore the induction of a tool to enhance the marketing feature and functionality of the book. By the end of this book, you will be able to boot up an intelligence program in your organization based on the operation and tactical/strategic spheres of Cyber defense intelligence. Style and approach A step-by-step practical guide that will help you master defensive frameworks to secure your system, and the F3EAD protocol to help you boot up an intelligence program in your organization.
Expert GeoServer
Expert GeoServer
Ben Mearns
¥52.31
Explore TensorFlow's capabilities to perform efficient deep learning on images Key Features *Discover image processing for machine vision *Build an effective image classification system using the power of CNNs *Leverage TensorFlow’s capabilities to perform efficient deep learning Book Description TensorFlow is Google’s popular offering for machine learning and deep learning, quickly becoming a favorite tool for performing fast, efficient, and accurate deep learning tasks. Hands-On Deep Learning for Images with TensorFlow shows you the practical implementations of real-world projects, teaching you how to leverage TensorFlow’s capabilities to perform efficient image processing using the power of deep learning. With the help of this book, you will get to grips with the different paradigms of performing deep learning such as deep neural nets and convolutional neural networks, followed by understanding how they can be implemented using TensorFlow. By the end of this book, you will have mastered all the concepts of deep learning and their implementation with TensorFlow and Keras. What you will learn *Build machine learning models particularly focused on the MNIST digits *Work with Docker and Keras to build an image classifier *Understand natural language models to process text and images *Prepare your dataset for machine learning *Create classical, convolutional, and deep neural networks *Create a RESTful image classification server Who this book is for Hands-On Deep Learning for Images with TensorFlow is for you if you are an application developer, data scientist, or machine learning practitioner looking to integrate machine learning into application software and master deep learning by implementing practical projects in TensorFlow. Knowledge of Python programming and basics of deep learning are required to get the best out of this book.
Hands-On Deep Learning for Images with TensorFlow
Hands-On Deep Learning for Images with TensorFlow
Will Ballard
¥43.59
Build modern, fast, and progressive web applications using modern features of PHP 7 and TypeScript Key Features *Explore the latest features of Angular and Laravel to build applications that are powerful, consistent, and maintainable *Develop modern user interfaces with a reusable component-based architecture using Angular 6 and Bootstrap 4 *Learn how to build secure backend APIs with Laravel Book Description Angular, considered as one of the most popular and powerful frontend frameworks, has undergone a major overhaul to embrace emerging web technologies so that developers can build cutting-edge web applications. This book gives you practical knowledge of building modern full-stack web apps from scratch using Angular with a Laravel Restful back end. The book begins with a thorough introduction to Laravel and Angular and its core concepts like custom errors messages, components, routers, and Angular-cli, with each concept being explained first, and then put into practice in the case-study project. With the basics covered, you will learn how sophisticated UI features can be added using NgBootstrao and a component-based architecture. You will learn to extend and customize variables from Bootstrap CSS framework. You will learn how to create secure web application with Angular and Laravel using token based authentication. Finally, you will learn all about progressive web applications and build and deploy a complete fullstack application using Docker and Docker-compose. By the end of this book, you'll gain a solid understanding of Angular 6 and how it interacts with a Laravel 5.x backend What you will learn *Explore the core features of Angular 6 to create sophisticated user interfaces *Use Laravel 5 to its full extent to create a versatile backend layer based on RESTful APIs *Configure a web application in order to accept user-defined data and persist it into the database using server-side APIs *Build an off-line-first application using service-worker and manifest file *Deal with token based authentication on single page application (SPA). *Secure your application against threats and vulnerabilities in a time efficient way *Deploy using Docker and Docker-compose Who this book is for This book targets developers who are new to Angular, Laravel, or both, and are seeking a practical, best-practice approach to development with these technologies. They must have some knowledge of HTML, CSS and JavaScript. Familiarity of PHP is assumed to get the most from this book.
Hands-On Intelligent Agents with OpenAI Gym
Hands-On Intelligent Agents with OpenAI Gym
Praveen Palanisamy
¥69.75
With Hands-On Recommendation Systems with Python, learn the tools and techniques required in building various kinds of powerful recommendation systems (collaborative, knowledge and content based) and deploying them to the web Key Features *Build industry-standard recommender systems *Only familiarity with Python is required *No need to wade through complicated machine learning theory to use this book Book Description Recommendation systems are at the heart of almost every internet business today; from Facebook to Net?ix to Amazon. Providing good recommendations, whether it's friends, movies, or groceries, goes a long way in defining user experience and enticing your customers to use your platform. This book shows you how to do just that. You will learn about the different kinds of recommenders used in the industry and see how to build them from scratch using Python. No need to wade through tons of machine learning theory—you'll get started with building and learning about recommenders as quickly as possible.. In this book, you will build an IMDB Top 250 clone, a content-based engine that works on movie metadata. You'll use collaborative filters to make use of customer behavior data, and a Hybrid Recommender that incorporates content based and collaborative filtering techniques? With this book, all you need to get started with building recommendation systems is a familiarity with Python, and by the time you're fnished, you will have a great grasp of how recommenders work and be in a strong position to apply the techniques that you will learn to your own problem domains. What you will learn *Get to grips with the different kinds of recommender systems *Master data-wrangling techniques using the pandas library *Building an IMDB Top 250 Clone *Build a content based engine to recommend movies based on movie metadata *Employ data-mining techniques used in building recommenders *Build industry-standard collaborative filters using powerful algorithms *Building Hybrid Recommenders that incorporate content based and collaborative fltering Who this book is for If you are a Python developer and want to develop applications for social networking, news personalization or smart advertising, this is the book for you. Basic knowledge of machine learning techniques will be helpful, but not mandatory.
Unity 2018 By Example
Unity 2018 By Example
Alan Thorn
¥78.47
Develop intelligent voice-empowered applications and Chatbots that not only understand voice commands but also respond to it Key Features *Target multiple platforms by creating voice interactions for your applications *Explore real-world examples of how to produce smart and practical virtual assistants *Build a virtual assistant for cars using Android Auto in Xamarin Book Description From touchscreen and mouse-click, we are moving to voice- and conversation-based user interfaces. By adopting Voice User Interfaces (VUIs), you can create a more compelling and engaging experience for your users. Voice User Interface Projects teaches you how to develop voice-enabled applications for desktop, mobile, and Internet of Things (IoT) devices. This book explains in detail VUI and its importance, basic design principles of VUI, fundamentals of conversation, and the different voice-enabled applications available in the market. You will learn how to build your first voice-enabled application by utilizing DialogFlow and Alexa’s natural language processing (NLP) platform. Once you are comfortable with building voice-enabled applications, you will understand how to dynamically process and respond to the questions by using NodeJS server deployed to the cloud. You will then move on to securing NodeJS RESTful API for DialogFlow and Alexa webhooks, creating unit tests and building voice-enabled podcasts for cars. Last but not the least you will discover advanced topics such as handling sessions, creating custom intents, and extending built-in intents in order to build conversational VUIs that will help engage the users. By the end of the book, you will have grasped a thorough knowledge of how to design and develop interactive VUIs. What you will learn *Understand NLP platforms with machine learning *Exploit best practices and user experiences in creating VUI *Build voice-enabled chatbots *Host, secure, and test in a cloud platform *Create voice-enabled applications for personal digital assistant devices *Develop a virtual assistant for cars Who this book is for Voice User Interface Projects is for you if you are a software engineer who wants to develop voice-enabled applications for your personal digital assistant devices such as Amazon Echo and Google Home, along with your car’s virtual assistant systems. Some experience with JavaScript is required.
Learning Robotics using Python
Learning Robotics using Python
Lentin Joseph
¥57.76
Design, simulate, and program interactive robots About This Book ? Design, simulate, build, and program an interactive autonomous mobile robot ? Leverage the power of ROS, Gazebo, and Python to enhance your robotic skills ? A hands-on guide to creating an autonomous mobile robot with the help of ROS and Python Who This Book Is For This book is for those who are conducting research in mobile robotics and autonomous navigation. As well as the robotics research domain, this book is also for the robot hobbyist community. You’re expected to have a basic understanding of Linux commands and Python. What You Will Learn ? Design a differential robot from scratch ? Model a differential robot using ROS and URDF ? Simulate a differential robot using ROS and Gazebo ? Design robot hardware electronics ? Interface robot actuators with embedded boards ? Explore the interfacing of different 3D depth cameras in ROS ? Implement autonomous navigation in ChefBot ? Create a GUI for robot control In Detail Robot Operating System (ROS) is one of the most popular robotics software frameworks in research and industry. It has various features for implementing different capabilities in a robot without implementing them from scratch. This book starts by showing you the fundamentals of ROS so you understand the basics of differential robots. Then, you'll learn about robot modeling and how to design and simulate it using ROS. Moving on, we'll design robot hardware and interfacing actuators. Then, you'll learn to configure and program depth sensors and LIDARs using ROS. Finally, you'll create a GUI for your robot using the Qt framework. By the end of this tutorial, you'll have a clear idea of how to integrate and assemble everything into a robot and how to bundle the software package. Style and approach A step-by-step guide which will help you to create an autonomous mobile robot with the help of ROS and Python. It will help you to understand and implement the fundamental concepts of differential robots and teach you to create differential robot’s simulation using Gazebo.
Hands-On Reinforcement Learning with Python
Hands-On Reinforcement Learning with Python
Sudharsan Ravichandiran
¥63.21
A hands-on guide enriched with examples to master deep reinforcement learning algorithms with Python About This Book ? Your entry point into the world of artificial intelligence using the power of Python ? An example-rich guide to master various RL and DRL algorithms ? Explore various state-of-the-art architectures along with math Who This Book Is For If you’re a machine learning developer or deep learning enthusiast interested in artificial intelligence and want to learn about reinforcement learning from scratch, this book is for you. Some knowledge of linear algebra, calculus, and the Python programming language will help you understand the concepts covered in this book. What You Will Learn ? Understand the basics of reinforcement learning methods, algorithms, and elements ? Train an agent to walk using OpenAI Gym and Tensorflow ? Understand the Markov Decision Process, Bellman’s optimality, and TD learning ? Solve multi-armed-bandit problems using various algorithms ? Master deep learning algorithms, such as RNN, LSTM, and CNN with applications ? Build intelligent agents using the DRQN algorithm to play the Doom game ? Teach agents to play the Lunar Lander game using DDPG ? Train an agent to win a car racing game using dueling DQN In Detail Reinforcement Learning (RL) is the trending and most promising branch of artificial intelligence. Hands-On Reinforcement learning with Python will help you master not only the basic reinforcement learning algorithms but also the advanced deep reinforcement learning algorithms. The book starts with an introduction to Reinforcement Learning followed by OpenAI Gym, and TensorFlow. You will then explore various RL algorithms and concepts, such as Markov Decision Process, Monte Carlo methods, and dynamic programming, including value and policy iteration. This example-rich guide will introduce you to deep reinforcement learning algorithms, such as Dueling DQN, DRQN, A3C, PPO, and TRPO. You will also learn about imagination-augmented agents, learning from human preference, DQfD, HER, and many more of the recent advancements in reinforcement learning. By the end of the book, you will have all the knowledge and experience needed to implement reinforcement learning and deep reinforcement learning in your projects, and you will be all set to enter the world of artificial intelligence. Style and approach This is a hands-on book designed to further expand your machine learning skills by understanding reinforcement to deep reinforcement learning algorithms with applications in Python.