
Mastering Sass
¥80.65
Create interactive and responsive cross-browser apps with SASS and Compass About This Book Create data-intensive, highly scalable apps using Sass and COMPASS Master the concepts of Sass and COMPASS and unleash your potential to develop enterprise-grade apps This book is an experts’ guide on leveraging Sass and COMPASS features Who This Book Is For This book is aimed at those who know CSS3 and HTML5 quite well and who've built a few small-to-medium-sized websites from scratch using Sass and Compass. What You Will Learn Master Sass and Compass features Familiarize yourself with CSS and HTML concepts that are vital for a good Sass workflow. Build real-world websites focusing on layouts and content aspects Work on a grid system using Compass and Susy Automate your workflow with Gulp Write functions and mixins to leverage the control flow In Detail CSS and Sass add elegance and excellence to the basic language, and consist of a CSS-compatible syntax that allows you to use variables, nested rules, mixins, inline imports, and much more. This book will start with an overview of the features in Sass and Compass, most of which you'll already be familiar; however, this will ensure you know what’s expected as the book goes deeper into Sass and Compass. Next you will learn CSS and HTML concepts that are vital to a good Sass workflow. After all, Sass exists to simplify writing CSS, but it won’t teach you how to make clean, scalable, reusable CSS. For that, you need to understand some basic concepts of OOCSS, SMACCS, and Atomic Design. Once you’ve brushed up on the important concepts, it’s time to write some Sass. Mainly you’ll write a few functions and mixins that really leverage control flow using @if / @else loops and you’ll learn how to figure out when and why things are going wrong before they bring you to a stop. Moving further, you’ll learn how to use @debug, @warn and @error to properly handle errors. You’ll also learn about Gulp and how to use it to automate your workflow and reduce your repetitive tasks. And finally you’ll learn about sourcemaps. With sourcemaps, you’ll be able to write, debug, and view your Sass and Compass all from within the browser. It’ll even LiveReload too! As a bonus, you’ll take a look at that funky Flexbox, currently all the rage! You’ll learn how powerful and flexible it really is, and how you can use it with Compass. Best of all, it falls back very gracefully indeed! In fact, you’ll be able to apply it to any existing project without having to change a line of the original CSS. Style and approach This book will provide readers with practical, actionable expertise to enhance their knowledge

Mastering Oculus Rift Development
¥90.46
Explore the new frontier of virtual reality with the Oculus Rift and bring the VR revolution to your own projects About This Book Create immersive 3D games especially designed for the Oculus Rift platform Build complex realistic virtual reality (VR) games with the Unity Engine Create striking VR environments with advanced graphical techniques Who This Book Is For This book is for aspiring indie developers and VR enthusiasts who want to bring their ideas into virtual reality with a new platform that provides an unprecedented level of realism and immersion. What You Will Learn Increase immersion with 3D audio and intuitive interfaces Create group VR experiences using multi-player networking Design fun and engaging mechanics that utilize VR principles Explore the best ways to navigate and interact using the Oculus Rift Design intuitive ways to navigate and interact with scenes in VR Add stunning realism to a scene with three-dimensional audio Invent mechanics and features that take full advantage of VR hardware In Detail Virtual reality (VR) is changing the world of gaming and entertainment as we know it. VR headsets such as the Oculus Rift immerse players in a virtual world by tracking their head movements and simulating depth, giving them the feeling that they are actually present in the environment. We will first use the Oculus SDK in the book and will then move on to the widely popular Unity Engine, showing you how you can add that extra edge to your VR games using the power of Unity. In this book, you’ll learn how to take advantage of this new medium by designing around each of its unique features. This book will demonstrate the Unity 5 game engine, one of most widely-used engines for VR development, and will take you through a comprehensive project that covers everything necessary to create and publish a complete VR experience for the Oculus Rift. You will also be able to identify the common perils and pitfalls of VR development to ensure that your audience has the most comfortable experience possible. By the end of the book, you will be able to create an advanced VR game for the Oculus Rift, and you’ll have everything you need to bring your ideas into a new reality. Style and approach This book takes a step-by-step tutorial approach with illustrative examples to help you implement the projects on your own. The book lets you first get to grips with the Oculus SDK and then moves on to the Unity Engine to add realistic graphics and features in your games.

OpenCV 3 Computer Vision Application Programming Cookbook - Third Edition
¥90.46
Recipes to help you build computer vision applications that make the most of the popular C++ library OpenCV 3 About This Book Written to the latest, gold-standard specification of OpenCV 3 Master OpenCV, the open source library of the computer vision community Master fundamental concepts in computer vision and image processing Learn about the important classes and functions of OpenCV with complete working examples applied to real images Who This Book Is For OpenCV 3 Computer Vision Application Programming Cookbook Third Edition is appropriate for novice C++ programmers who want to learn how to use the OpenCV library to build computer vision applications. It is also suitable for professional software developers who wish to be introduced to the concepts of computer vision programming. It can also be used as a companion book for university-level computer vision courses. It constitutes an excellent reference for graduate students and researchers in image processing and computer vision. What You Will Learn Install and create a program using the OpenCV library Process an image by manipulating its pixels Analyze an image using histograms Segment images into homogenous regions and extract meaningful objects Apply image filters to enhance image content Exploit the image geometry in order to relay different views of a pictured scene Calibrate the camera from different image observations Detect people and objects in images using machine learning techniques Reconstruct a 3D scene from images In Detail Making your applications see has never been easier with OpenCV. With it, you can teach your robot how to follow your cat, write a program to correctly identify the members of One Direction, or even help you find the right colors for your redecoration. OpenCV 3 Computer Vision Application Programming Cookbook Third Edition provides a complete introduction to the OpenCV library and explains how to build your first computer vision program. You will be presented with a variety of computer vision algorithms and exposed to important concepts in image and video analysis that will enable you to build your own computer vision applications. This book helps you to get started with the library, and shows you how to install and deploy the OpenCV library to write effective computer vision applications following good programming practices. You will learn how to read and write images and manipulate their pixels. Different techniques for image enhancement and shape analysis will be presented. You will learn how to detect specific image features such as lines, circles or corners. You will be introduced to the concepts of mathematical morphology and image filtering. The most recent methods for image matching and object recognition are described, and you’ll discover how to process video from files or cameras, as well as how to detect and track moving objects. Techniques to achieve camera calibration and perform multiple-view analysis will also be explained. Finally, you’ll also get acquainted with recent approaches in machine learning and object classification. Style and approach This book will arm you with the basics you need to start writing world-aware applications right from a pixel level all the way through to processing video sequences.

TensorFlow Machine Learning Cookbook
¥99.18
Explore machine learning concepts using the latest numerical computing library — TensorFlow — with the help of this comprehensive cookbook About This Book Your quick guide to implementing TensorFlow in your day-to-day machine learning activities Learn advanced techniques that bring more accuracy and speed to machine learning Upgrade your knowledge to the second generation of machine learning with this guide on TensorFlow Who This Book Is For This book is ideal for data scientists who are familiar with C++ or Python and perform machine learning activities on a day-to-day basis. Intermediate and advanced machine learning implementers who need a quick guide they can easily navigate will find it useful. What You Will Learn Become familiar with the basics of the TensorFlow machine learning library Get to know Linear Regression techniques with TensorFlow Learn SVMs with hands-on recipes Implement neural networks and improve predictions Apply NLP and sentiment analysis to your data Master CNN and RNN through practical recipes Take TensorFlow into production In Detail TensorFlow is an open source software library for Machine Intelligence. The independent recipes in this book will teach you how to use TensorFlow for complex data computations and will let you dig deeper and gain more insights into your data than ever before. You’ll work through recipes on training models, model evaluation, sentiment analysis, regression analysis, clustering analysis, artificial neural networks, and deep learning – each using Google’s machine learning library TensorFlow. This guide starts with the fundamentals of the TensorFlow library which includes variables, matrices, and various data sources. Moving ahead, you will get hands-on experience with Linear Regression techniques with TensorFlow. The next chapters cover important high-level concepts such as neural networks, CNN, RNN, and NLP. Once you are familiar and comfortable with the TensorFlow ecosystem, the last chapter will show you how to take it to production. Style and approach This book takes a recipe-based approach where every topic is explicated with the help of a real-world example.

MQTT Essentials - A Lightweight IoT Protocol
¥71.93
This step-by-step guide will help you gain a deep understanding of the lightweight MQTT protocol. We’ll begin with the specific vocabulary of MQTT and its working modes, followed by installing a Mosquitto MQTT broker. Then, you will use best practices to secure the MQTT Mosquitto broker to ensure that only authorized clients are able to publish and receive messages. Once you have secured the broker with the appropriate configuration, you will develop a solution that controls a drone with Python. Further on, you will use Python on a Raspberry Pi 3 board to process commands and Python on Intel Boards (Joule, Edison and Galileo). You will then connect to the MQTT broker, subscribe to topics, send messages, and receive messages in Python. You will also develop a solution that interacts with sensors in Java by working with MQTT messages. Moving forward, you will work with an asynchronous API with callbacks to make the sensors interact with MQTT messages. Following the same process, you will develop an iOS app with Swift 3, build a website that uses WebSockets to connect to the MQTT broker, and control home automation devices with HTML5, JavaScript code, Node.js and MQTT messages What you will learn ?Understand how MQTTv3.1 and v3.1.1 works in detail ?Install and secure a Mosquitto MQTT broker by following best practices ?Design and develop IoT solutions combined with mobile and web apps that use MQTT messages to communicate ?Explore the features included in MQTT for IoT and Machine-to-Machine communications ?Publish and receive MQTT messages with Python, Java, Swift, JavaScript, and Node.js ?Implement the security best practices while setting up the MQTT Mosquitto broker

Kali Linux Intrusion and Exploitation Cookbook
¥80.65
Over 70 recipes for system administrators or DevOps to master Kali Linux 2 and perform effective security assessments About This Book ?Set up a penetration testing lab to conduct a preliminary assessment of attack surfaces and run exploits ?Improve your testing efficiency with the use of automated vulnerability scanners ?Work through step-by-step recipes to detect a wide array of vulnerabilities, exploit them to analyze their consequences, and identify security anomalies Who This Book Is For This book is intended for those who want to know more about information security. In particular, it's ideal for system administrators and system architects who want to ensure that the infrastructure and systems they are creating and managing are secure. This book helps both beginners and intermediates by allowing them to use it as a reference book and to gain in-depth knowledge. What You Will Learn ?Understand the importance of security assessments over merely setting up and managing systems/processes ?Familiarize yourself with tools such as OPENVAS to locate system and network vulnerabilities ?Discover multiple solutions to escalate privileges on a compromised machine ?Identify security anomalies in order to make your infrastructure secure and further strengthen it ?Acquire the skills to prevent infrastructure and application vulnerabilities ?Exploit vulnerabilities that require a complex setup with the help of Metasploit In Detail With the increasing threats of breaches and attacks on critical infrastructure, system administrators and architects can use Kali Linux 2.0 to

AWS Administration Cookbook
¥80.65
Amazon Web Services (AWS) is a bundled remote computing service that provides cloud computing infrastructure over the Internet with storage, bandwidth, and customized support for application programming interfaces (API). Implementing these services to efficiently administer your cloud environments is a core task. This book will help you build and administer your cloud environment with AWS. We'll begin with the AWS fundamentals, and you'll build the foundation for the recipes you'll work on throughout the book. Next, you will find out how to manage multiple accounts and set up consolidated billing. You will then learn to set up reliable and fast hosting for static websites, share data between running instances, and back up your data for compliance. Moving on, you will find out how to use the compute service to enable consistent and fast instance provisioning, and will see how to provision storage volumes and autoscale an application server. Next, you'll discover how to effectively use the networking and database service of AWS. You will also learn about the different management tools of AWS along with securing your AWS cloud. Finally, you will learn to estimate the costs for your cloud. By the end of the book, you will be able to easily administer your AWS cloud. What you will learn ?Discover the best practices to achieve an automated repeatable infrastructure in AWS ?Bring down your IT costs by managing AWS successfully and deliver high availability, fault tolerance, and scalability ?Make any website faster with static and dynamic caching ?Create monitoring and alerting dashboards using CloudWatch ?Migrate a database to AWS ?Set up consolidated billing to achieve simple and effective cost management with accounts ?Host a domain and find out how you can automate health checks About the Author Lucas Chan has been working in tech since 1995 in a variety of development, systems admin, and DevOps roles. He is currently a senior consultant and engineer at Versent and technical director at Stax. He's been running production workloads on AWS for over 10 years. He's also a member of the APAC AWS warriors program and holds all five of the available AWS certifications. Rowan Udell has been working in development and operations for 15 years. He has held a variety of positions, such as SRE, frontend developer, backend developer, consultant, technical lead, and team leader. His travels have seen him work in start-ups and enterprises in the finance, education, and web industries in Australia and Canada. He currently works as a senior consultant with Versent, an AWS Advanced Partner in Sydney. He specializes in serverless applications and architectures on AWS, and contributes actively in the Serverless Framework community.

Building Blockchain Projects
¥80.65
Key Features ?Create powerful, end-to-end applications for Blockchain using Ethereum ?Write your first program using the Solidity programming language ?Change the way you think and design your applications by using the all new database-Blockchain Book De*ion Blockchain is a decentralized ledger that maintains a continuously growing list of data records that are secured from tampering and revision. Every user is allowed to connect to the network, send new transactions to it, verify transactions, and create new blocks, making it permission-less. This book will teach you what Blockchain is, how it maintains data integrity, and how to create real-world Blockchain projects using Ethereum. With interesting real-world projects, you will learn how to write smart contracts which run exactly as programmed without any chance of fraud, censorship, or third-party interference, and build end-to-end applications for Blockchain. You will learn about concepts such as cryptography in cryptocurrencies, ether security, mining , smart contracts, solidity, and more. You will also learn about web sockets, various API services for Ethereum, and much more. The blockchain is the main technical innovation of bitcoin, where it serves as the public ledger for bitcoin transactions. What you will learn ?Walk through the basics of the Blockchain technology ?Implement Blockchain's technology and its features, and see what can be achieved using them ?Build DApps using Solidity and Web3.js ?Understand the geth command and cryptography ?Create Ethereum wallets ?Explore consortium blockchain

ServiceNow IT Operations Management
¥80.65
Align your business requirements with IT by implementing ServiceNow IT Operations with ease. About This Book ?Written to the latest specification, it will cover basic to advanced concepts and architecture. ?Take a service-centric approach to operations management and consolidate all your resource data into a single system IT record. ?Beat the key challenge of managing multiple business operations (even running globally) over a complex IT infrastructure and see immediate results. Who This Book Is For The book is aimed at System administrators, IT operations and IT managers who plan to implement ServiceNow IT Operations Management for their organization. They have no knowledge of ServiceNow ITOM. What You Will Learn ?Step by step guide in setting up each features with in ServiceNow ITOM ?Install and configure the required application or plugin ?Integrate with other provider services as deemed appropriate ?Explore Orchestration capabilities and how to analyze the data ?Learn about the ServiceNow graphical interface ?Integrate with other applications within ServiceNow ?Aims to cover the fundamentals concepts to advanced concepts ?Best practices and advanced features In Detail ServiceNow ITOM enables infrastructure and processes to be managed in a highly automated manner. It contains various segments that ensure its applications and enterprise infrastructures are optimized for high performance and helps in creating a lean and agile organization through service-level visibility and automation. This book will be a

Getting Started with Gulp – Second Edition
¥54.49
"Key Features ?Gain a solid understanding of Gulp and write your own custom tasks from scratch ?Discover ways to add additional functionality to improve your tasks ?Get up-and-running with new features added to the latest version of Gulp Book De*ion This book is a hands-on guide to get you up to speed with gulp. You will quickly learn how to install, configure, and run your own build system. It will instill you with the ability to automate several common development tasks to vastly improve your development workflow. This book first demonstrates various Gulp use cases before running through the steps of configuring, running, and customizing Gulp, providing you with core concepts of gulp, node.js, and npm. Diving a bit deeper into the gulp ecosystem, we will discuss when and why to use a node module instead of a gulp plugin. We will also go over a few issues that we can run into while using gulp and learn about ways to work around them to improve your gulp experience. By the end of this book, you will be able to create your very own gulp build from scratch, create and maintain tasks and project builds, and automate your workflow with plugins and custom tasks. What you will learn ?How to use a command-line interface. ?Learn about Gulp, Node.js, and npm and how they work together. ?Create a Gulpfile from scratch and implement it into a project. ?Write basic tasks that will concatenate, minify, compress, and pre-process your files. ?Write advanced tasks that will run a local server, sync file changes to your browser, and allow you to write client-side JavaScript using ES2015. "

Software Architecture with Python
¥90.46
"Key Features ?Identify design issues and make the necessary adjustments to achieve improved performance ?Understand practical architectural quality attributes from the perspective of a practicing engineer and architect using Python ?Gain knowledge of architectural principles and how they can be used to provide accountability and rationale for architectural decisions Book De*ion This book starts off by explaining how Python fits into an application architecture. As you move along, you will understand the architecturally significant demands and how to determine them. Later, you'll get a complete understanding of the different architectural quality requirements that help an architect to build a product that satisfies business needs, such as maintainability/reusability, testability, scalability, performance, usability, and security. You will use various techniques such as incorporating DevOps, Continuous Integration, and more to make your application robust. You will understand when and when not to use object orientation in your applications. You will be able to think of the future and design applications that can scale proportionally to the growing business. The focus is on building the business logic based on the business process documentation and which frameworks are to be used when. We also cover some important patterns that are to be taken into account while solving design problems as well as those in relatively new domains such as the Cloud. This book will help you understand the ins and outs of Python so that you can make those critical design decisions that not just live up to but also surpass the expectations of your clients. What you will learn ?Build programs with the right architectural attributes ?Use Enterprise Architectural Patterns to solve scalable problems on the Web ?Understand design patterns from a Python perspective ?Optimize the performance testing tools in Python ?Deploy code in remote environments or on the Cloud using Python ?Secure architecture applications in Python About the Author Anand Balachandran Pillai is an Engineering and Technology professional with over 18 years of experience in the software industry in Product Engineering, Software Design & Architecture and Research. He has a Bachelor's degree in Mechanical Engineering from the Indian Institute of Technology, Madras. He has worked at companies such as Yahoo!, McAfee, and Infosys in the roles of Lead Engineer and Architect in product development teams, to build new products. His interests lie in Software Performance Engineering, High Scalability Architectures, Security and Open source communities. He often works with startups in lead technical or consulting role. He is the founder of the Bangalore Python Users Group and a Fellow of the Python Software Foundation (PSF). Anand is currently working as Senior Architect of Yegii Inc. "

Mastering Machine Learning with R - Second Edition
¥90.46
This book will teach you advanced techniques in machine learning with the latest code in R 3.3.2. You will delve into statistical learning theory and supervised learning; design efficient algorithms; learn about creating Recommendation Engines; use multi-class classification and deep learning; and more. You will explore, in depth, topics such as data mining, classification, clustering, regression, predictive modeling, anomaly detection, boosted trees with XGBOOST, and more. More than just knowing the outcome, you'll understand how these concepts work and what they do. With a slow learning curve on topics such as neural networks, you will explore deep learning, and more. By the end of this book, you will be able to perform machine learning with R in the cloud using AWS in various scenarios with different datasets. What you will learn ?Gain deep insights into the application of machine learning tools in the industry ?Manipulate data in R efficiently to prepare it for analysis ?Master the skill of recognizing techniques for effective visualization of data ?Understand why and how to create test and training data sets for analysis ?Master fundamental learning methods such as linear and logistic regression ?Comprehend advanced learning methods such as support vector

Effective Amazon Machine Learning
¥90.46
Predictive analytics is a complex domain requiring coding skills, an understanding of the mathematical concepts underpinning machine learning algorithms, and the ability to create compelling data visualizations. Following AWS simplifying Machine learning, this book will help you bring predictive analytics projects to fruition in three easy steps: data preparation, model tuning, and model selection. This book will introduce you to the Amazon Machine Learning platform and will implement core data science concepts such as classification, regression, regularization, overfitting, model selection, and evaluation. Furthermore, you will learn to leverage the Amazon Web Service (AWS) ecosystem for extended access to data sources, implement realtime predictions, and run Amazon Machine Learning projects via the command line and the Python SDK. Towards the end of the book, you will also learn how to apply these services to other problems, such as text mining, and to more complex datasets. What you will learn ?Learn how to use the Amazon Machine Learning service from scratch for predictive analytics ?Gain hands-on experience of key Data Science concepts ?Solve classic regression and classification problems ?Run projects programmatically via the command line and the Python SDK

Learning Apache Cassandra - Second Edition
¥80.65
Cassandra is a distributed database that stands out thanks to its robust feature set and intuitive interface, while providing high availability and scalability of a distributed data store. This book will introduce you to the rich feature set offered by Cassandra, and empower you to create and manage a highly scalable, performant and fault-tolerant database layer. The book starts by explaining the new features implemented in Cassandra 3.x and get you set up with Cassandra. Then you'll walk through data modeling in Cassandra and the rich feature set available to design a flexible schema. Next you'll learn to create tables with composite partition keys, collections and user-defined types and get to know different methods to avoid denormalization of data. You will then proceed to create user-defined functions and aggregates in Cassandra. Then, you will set up a multi node cluster and see how the dynamics of Cassandra change with it. Finally, you will implement some application-level optimizations using a Java client. By the end of this book, you'll be fully equipped to build powerful, scalable Cassandra database layers for your applications. What you will learn ?Install Cassandra ?Create keyspaces and tables with multiple clustering columns to organize related data ?Use secondary indexes and materialized views to avoid denormalization of data

Enterprise Application Architecture with .NET Core
¥90.46
If you want to design and develop enterprise applications using .NET Core as the development framework and learn about industry-wide best practices and guidelines, then this book is for you. The book starts with a brief introduction to enterprise architecture, which will help you to understand what enterprise architecture is and what the key components are. It will then teach you about the types of patterns and the principles of software development, and explain the various aspects of distributed computing to keep your applications effective and scalable. These chapters act as a catalyst to start the practical implementation, and design and develop applications using different architectural approaches, such as layered architecture, service oriented architecture, microservices and cloud-specific solutions. Gradually, you will learn about the different approaches and models of the Security framework and explore various authentication models and authorization techniques, such as social media-based authentication and safe storage using app secrets. By the end of the book, you will get to know the concepts and usage of the emerging fields, such as DevOps, BigData, architectural practices, and Artificial Intelligence.

Game Development Patterns and Best Practices
¥80.65
Utilize proven solutions to solve common problems in game development About This Book ?Untangle your game development workflow, make cleaner code, and create structurally solid games ?Implement key programming patterns that will enable you to make efficient AI and remove duplication ?Optimize your game using memory management techniques Who This Book Is For If you are a game developer who wants to solve commonly-encountered issues or have some way to communicate to other developers in a standardized format, then this book is for you. Knowledge of basic game programming principles and C++ programming is assumed. What You Will Learn ?Learn what design patterns are and why you would want to use them ?Reduce the maintenance burden with well-tested, cleaner code ?Employ the singleton pattern effectively to reduce your compiler workload ?Use the factory pattern to help you create different objects with the same creation logic and reduce coding time ?Improve game performance with Object Pools ?Allow game play to interact with physics or graphics in an abstract way ?Refractor your code to remove common code smells In Detail You've learned how to program, and you've probably created some simple games at some point, but now you want to build larger projects and find out how to resolve your problems. So instead of a coder, you might now want to think like a game developer or software engineer. To organize your code well, you need certain tools to do so, and that's what this book is all about. You will learn techniques to

The Monster Trilogy
¥68.28
Dracula Unbound, Frankenstein Unbound and Moreau’s Other Island all together in one eBook. All of Aliss’ Monster Trilogy in one place. Moreau’s Other Island Welcome to Dr Moreau’s other island. Place of untold horros. Home of the Beast Men… Available for the first time in eBook. He stands very tall, long prosthetic limbs glistening in the harsh sun, withered body swaying, carbine and whip clasped in artificial hands. Man-beasts cower on the sand as he brandishes his gun in the air. He is Dr Moreau, ruler of the fabulous, grotesque island, where humans are as brutes and brutes as humans, where the future of the entire human race is being reprogrammed. The place of untold horrors. The place of the New Man. Frankenstein Unbound When Joe Bodenland is suddenly transported back in time to the year 1816, his first reaction is of eager curiosity rather than distress… This is Aldiss’ response to Mary Shelley’s Frankenstein, available for the first time in eBook. When Joe Bodenland is suddenly transported back in time to the year 1816, his first reaction is of eager curiosity rather than distress. Certainly the Switzerland in which he finds himself, with its charming country inns, breathtaking landscapes and gentle, unmechanised pace of life, is infinitely preferable to the America of 2020 where the games of politicians threaten total annihilation. But after meeting the brooding young Victor Frankenstein, Joe realises that this world is more complex than the one he left behind. Is Frankenstein real, or are both Joe and he living out fictional lives? Dracula Unbound A dramatic reworking of the vampire myth in a way that only Brian Aldiss can… Available for the first time in eBook. When Bram Stoker was writing his famous novel, Dracula, at the end of the 19th century he received a visitor named Joe Bodenland. While the real Count Dracula came from the distant past, Joe arrived from Stoker’s future – on a desperate mission to save humanity from the undead.

Frankenstein Unbound (The Monster Trilogy)
¥34.14
When Joe Bodenland is suddenly transported back in time to the year 1816, his first reaction is of eager curiosity rather than distress… This is Aldiss’ response to Mary Shelley’s Frankenstein, available for the first time in eBook. When Joe Bodenland is suddenly transported back in time to the year 1816, his first reaction is of eager curiosity rather than distress. Certainly the Switzerland in which he finds himself, with its charming country inns, breathtaking landscapes and gentle, unmechanised pace of life, is infinitely preferable to the America of 2020 where the games of politicians threaten total annihilation. But after meeting the brooding young Victor Frankenstein, Joe realises that this world is more complex than the one he left behind. Is Frankenstein real, or are both Joe and he living out fictional lives? BRIAN SAYS: Developed as a tribute to Mary Shelley’s work, following the writing of Billion Year Spree, with its proposal, since widely adopted, that Frankenstein is the first seminal work to which the label “SF” can be logically attached. Frankenstein makes a female monster to accompany the male; Bodenland, lost from our time, hunts down first Frankenstein and then the monsters, becoming monstrous himself in the process.

Enterprise Cloud Security and Governance
¥80.65
Build a resilient cloud architecture to tackle data disasters with ease About This Book ? Gain a firm grasp of Cloud data security and governance, irrespective of your Cloud platform ? Practical examples to ensure you secure your Cloud environment efficiently ? A step-by-step guide that will teach you the unique techniques and methodologies of Cloud data governance Who This Book Is For If you are a cloud security professional who wants to ensure cloud security and data governance no matter the environment, then this book is for you. A basic understanding of working on any cloud platform would be beneficial. What You Will Learn ? Configure your firewall and Network ACL ? Protect your system against DDOS and application-level attacks ? Explore cryptography and data security for your cloud ? Get to grips with configuration management tools to automate your security tasks ? Perform vulnerability scanning with the help of the standard tools in the industry ? Learn about central log management In Detail Modern day businesses and enterprises are moving to the Cloud, to improve efficiency and speed, achieve flexibility and cost effectiveness, and for on-demand Cloud services. However, enterprise Cloud security remains a major concern because migrating to the public Cloud requires transferring some control over organizational assets to the Cloud provider. There are chances these assets can be mismanaged and therefore, as a Cloud security professional, you need to be armed with techniques to help businesses minimize the risks and misuse of business data. The book starts with the basics of Cloud security and offers an understanding of various policies, governance, and compliance challenges in Cloud. This helps you build a strong foundation before you dive deep into understanding what it takes to design a secured network infrastructure and a well-architected application using various security services in the Cloud environment. Automating security tasks, such as Server Hardening with Ansible, and other automation services, such as Monit, will monitor other security daemons and take the necessary action in case these security daemons are stopped maliciously. In short, this book has everything you need to secure your Cloud environment with. It is your ticket to obtain industry-adopted best practices for developing a secure, highly available, and fault-tolerant architecture for organizations. Style and approach This book follows a step-by-step, practical approach to secure your applications and data when they are located remotely.

Cloud Native programming with Golang
¥80.65
Discover practical techniques to build cloud-native apps that are scalable, reliable, and always available. About This Book ? Build well-designed and secure microservices. Enrich your microservices with continous integration and monitoring. ? Containerize your application with Docker ? Deploy your application to AWS. Learn how to utilize the powerful AWS services from within your application Who This Book Is For This book is for developers who want to begin building secure, resilient, robust, and scalable Go applications that are cloud native. Some knowledge of the Go programming language should be sufficient.To build the front-end application, you will also need some knowledge of JavaScript programming. What You Will Learn ? Understand modern software applications architectures ? Build secure microservices that can effectively communicate with other services ? Get to know about event-driven architectures by diving into message queues such as Kafka, Rabbitmq, and AWS SQS. ? Understand key modern database technologies such as MongoDB, and Amazon’s DynamoDB ? Leverage the power of containers ? Explore Amazon cloud services fundamentals ? Know how to utilize the power of the Go language to access key services in the Amazon cloud such as S3, SQS, DynamoDB and more. ? Build front-end applications using ReactJS with Go ? Implement CD for modern applications In Detail Cloud computing and microservices are two very important concepts in modern software architecture. They represent key skills that ambitious software engineers need to acquire in order to design and build software applications capable of performing and scaling. Go is a modern cross-platform programming language that is very powerful yet simple; it is an excellent choice for microservices and cloud applications. Go is gaining more and more popularity, and becoming a very attractive skill.. The book will take you on a journey into the world of microservices and cloud computing with the help of Go. It will start by covering the software architectural patterns of cloud applications, as well as practical concepts regarding how to scale, distribute, and deploy those applications. You will also learn how to build a JavaScript-based front-end for your application, using TypeScript and React. From there, we dive into commercial cloud offerings by covering AWS. Finally, we conclude our book by providing some overviews of other concepts and technologies that the reader can explore to move from where the book leaves off. Style and approach This book provides practical techniques, code examples, and architectural patterns required to build cloud native microservices in the Go language. It progresses through the subjects in a step-by-step manner. In each step, we cover the technical concepts behind it, the design considerations, and the code needed to build it.

Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition
¥63.21
Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition presents wireless pentesting from the ground up, and has been updated with the latest methodologies, including full coverage of the KRACK attack. About This Book ? Learn wireless penetration testing with Kali Linux ? Detect hidden wireless networks and discover their names ? Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing ? Develop your encryption cracking skills and gain an insight into the methods used by attackers and the underlying technologies that facilitate these attacks Who This Book Is For Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition is suitable for anyone who wants to learn more about pentesting and how to understand and defend against the latest wireless network attacks. What You Will Learn ? Understand the KRACK attack in full detail ? Create a wireless lab for your experiments ? Sniff out wireless packets, hidden networks, and SSIDs ? Capture and crack WPA-2 keys ? Sniff probe requests and track users through their SSID history ? Attack radius authentication systems ? Sniff wireless traffic and collect interesting data ? Decrypt encrypted traffic with stolen keys In Detail As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of the professional penetration tester. This has been highlighted again recently with the discovery of the KRACK attack which enables attackers to potentially break into Wi-Fi networks encrypted with WPA2. The Kali Linux security distribution comes with a myriad of tools used for networking attacks and detecting security loopholes. Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition has been updated to Kali Linux 2017.3 with the latest methodologies, including full coverage of the KRACK attack and how to defend against it. The book presents wireless pentesting from the ground up, introducing all elements of penetration testing with each new technology. You'll learn various wireless testing methodologies by example, from the basics of wireless routing and encryption through to detailed coverage of hacking methods and attacks such as the Hirte and Caffe Latte. Style and approach Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition is a practical, hands-on guide to modern wi-fi network hacking. It covers both the theory and practice of wireless pentesting, offering detailed, real-world coverage of the latest vulnerabilities and attacks.