万本电子书0元读

万本电子书0元读

Geospatial Development By Example with Python
Geospatial Development By Example with Python
Pablo Carreira
¥90.46
Build your first interactive map and build location-aware applications using cutting-edge examples in PythonAbout This BookLearn the full geo-processing workflow using Python with open source packagesCreate press-quality styled maps and data visualization with high-level and reusable codeProcess massive datasets efficiently using parallel processingWho This Book Is ForGeospatial Development By Example with Python is intended for beginners or advanced developers in Python who want to work with geographic data. The book is suitable for professional developers who are new to geospatial development, for hobbyists, or for data scientists who want to move into some simple development.What You Will LearnPrepare a development environment with all the tools needed for geo-processing with PythonImport point data and structure an application using Python’s resourcesCombine point data from multiple sources, creating intuitive and functional representations of geographic objectsFilter data by coordinates or attributes easily using pure PythonMake press-quality and replicable maps from any dataDownload, transform, and use remote sensing data in your mapsMake calculations to extract information from raster data and show the results on beautiful mapsHandle massive amounts of data with advanced processing techniquesProcess huge satellite images in an efficient wayOptimize geo-processing times with parallel processingIn DetailFrom Python programming good practices to the advanced use of analysis packages, this book teaches you how to write applications that will perform complex geoprocessing tasks that can be replicated and reused.Much more than simple *s, you will write functions to import data, create Python classes that represent your features, and learn how to combine and filter them.With pluggable mechanisms, you will learn how to visualize data and the results of analysis in beautiful maps that can be batch-generated and embedded into documents or web pages.Finally, you will learn how to consume and process an enormous amount of data very efficiently by using advanced tools and modern computers’ parallel processing capabilities.Style and approachThis easy-to-follow book is filled with hands-on examples that illustrate the construction of three sample applications of how to write reusable and interconnected Python code for geo-processing.
Windows Server 2012 Hyper-V Cookbook
Windows Server 2012 Hyper-V Cookbook
Leandro Carvalho
¥90.46
"Windows Server 2012 Hyper-V Cookbook" is a practical cookbook packed with recipes showing and explaining all the features and components of Hyper-V. You’ll learn from best practices, tips and tricks and examples of how to automate daily and common tasks. If you are an administrator who wants to master Microsoft Server Virtualization with Windows Server 2012 Hyper-V, then this book is for you. You should be comfortable with virtualization concepts and practices, and knowledge of previous versions of Windows Server would be an advantage.
HTML5 Graphics & Data Visualization Cookbook
HTML5 Graphics & Data Visualization Cookbook
Ben Fhala
¥90.46
This cookbook is organized in a linear, progressive way allowing it to be read from start to finish, as well as to be used as a useful resource for specific tasks. The HTML5 examples and recipes will have you making dynamic, interactive, and animated charts and graphs in no time. You don't need to have a background in HTML5 or Canvas but you do need to have a basic understanding of how HTML works and know how to code in any language (preferably in JavaScript). In this book we will not explain how to learn to code but how to create projects and how to plan and execute them in the process.
Marmalade SDK Mobile Game Development Essentials
Marmalade SDK Mobile Game Development Essentials
Sean Scaplehorn
¥90.46
A practical tutorial that's easy to follow with lots of tips, examples and diagrams, including a full game project that grows with each chapter,This book targets Professional and Indie game developers who want to develop games quickly and easily to run across a huge range of smartphones and tablets. You are expected to have some experience writing games using C++ on other platforms. Its aim is to show how to take your existing skills and apply them to writing games for mobile devices (including iOS and Android) by explaining the use of the Marmalade SDK,Familiarity with games and 3D graphics programming would be helpful. No knowledge of specific mobile SDKs such as iOS or Android is required.
Oracle APEX Best Practices
Oracle APEX Best Practices
Alex Nuijten
¥90.46
In clearly written chapters you will be guided through different aspects of Oracle Application Express. Varying from setting up your environment to maximizing SQL and PL/SQL. Examples are given based on a simple but appealing case. This book is filled with best practices on how to make the most of Oracle APEX. Developers beginning with application development as well as those who are experienced will benefit from this book. You will need to have basic knowledge of SQL and PL/SQL to follow the examples in this book.
XNA 4 3D Game Development by Example: Beginner's Guide
XNA 4 3D Game Development by Example: Beginner's Guide
Kurt Jaegers
¥90.46
This book is a step-by-step tutorial that includes complete source code for all of the games covered. It adopts an engaging style to teach all the game development concepts. Each block of code is explained, and game development concepts are diagrammed and covered in detail. Each game begins with a concept de*ion and concludes with suggestions for expanding on the finished game. This book is intended for readers who want to create 3D games using the XNA Framework. Basic knowledge of the C# programming language and 2D XNA concepts are helpful, but not required.
ASP.NET 3.5 Social Networking
ASP.NET 3.5 Social Networking
Andrew Siemer
¥90.46
Each chapter starts by showing the user experience we are going to create in the chapter. It then has a section discussing the major design decisions we face in building these features, and finally presents the 'solution' including the overall architecture and highlighting the most important code elements. The book presents a lot of real-world code, with comprehensive explanation and discussion. The full social network application is available for download from the Packt website, for you to examine, study, and modify. This book is written for ASP.NET and C# developers who want to build an enterprise-grade Social Network, either for their own business purposes or as a contract job for another company. The book assumes you have prior experience of developing web applications using ASP.NET 3.5, C# 3.0, SQL Server 2005/2008, and Visual Studio .NET 2008; it focuses on topics that will be of interest to existing developers not on providing step-by-step examples for each detail.
Python Parallel Programming Cookbook
Python Parallel Programming Cookbook
Giancarlo Zaccone
¥90.46
This book is intended for software developers who want to use parallel programming techniques to write powerful and efficient code. After reading this book, you will be able to master the basics and the advanced features of parallel computing. The Python programming language is easy to use and allows nonexperts to deal with and easily understand the topics exposed in this book.
Amazon S3 Cookbook
Amazon S3 Cookbook
Naoya Hashimoto
¥90.46
This book is for cloud developers who have experience of using Amazon S3 and are also familiar with Amazon S3.
Joomla! 2.5 Beginner’s Guide
Joomla! 2.5 Beginner’s Guide
Eric Tiggeler
¥90.46
Written with a fast-paced but friendly and engaging approach, this Packt Beginner's guide is designed to be placed alongside the computer as your guide and mentor. Step-by-step tutorials are bolstered by explanations of the reasoning behind what you are doing. You will quickly pick up the necessary skills, tips, and tricks for building a successful Joomla! website. This book is written for beginners to website design. By the end of the book you will have built a complete custom content managed website, and be ready to build any kind of website.
Mastering Citrix? XenDesktop?
Mastering Citrix? XenDesktop?
Govardhan Gunnala
¥90.46
This book is intended for IT administrators who want to use Citrixas a desktop virtualization solution or for IT architects who want to learn how to design and implement highly available and scalable XenDesktopenvironments. It is assumed that you have intermediate-level knowledge of virtualization concepts, Windows desktop operating systems, and Windows Server technologies. Citrix?, Citrix Systems?, XenApp?, XenDesktop?, and CloudPortalare trademarks of CitrixSystems?, Inc. and/or one or more of its subsidiaries, and may be registered in the United States Patent and Trademark Office and in other countries.
Lua Game Development Cookbook
Lua Game Development Cookbook
Mário Ka?uba
¥90.46
This book is for all programmers and game enthusiasts who want to stop dreaming about creating a game, and actually create one from scratch. The reader should know the basics of programming and using the Lua language. Knowledge of the C/C++ programming language is not necessary, but it's strongly recommended in order to write custom Lua modules extending game engine capabilities or to rewrite parts of the Lua code into a more efficient form. Algebra and matrix operations are required in order to understand advanced topics in Chapter 4, Graphics – Legacy Method with OpenGL 1.x-2.1 and Chapter 5, Graphics – Modern Method with OpenGL 3.0+. Sample demonstrations are coupled with binary libraries for Windows and Linux operating systems for convenience.
Python 3 Object-oriented Programming - Second Edition
Python 3 Object-oriented Programming - Second Edition
Dusty Phillips
¥90.46
If you're new to object-oriented programming techniques, or if you have basic Python skills and wish to learn in depth when to correctly apply object-oriented programming in Python to design software, this is the book for you.
Mastering SaltStack
Mastering SaltStack
Joseph Hall
¥90.46
This book is ideal for professionals who have been managing groups of servers, and want to learn how to expand their toolset. This book will also explain some of the more advanced features of Salt, and explore how to use them to bring additional power to the fundamentals that the professionals have already been using.
Clojure Data Structures and Algorithms Cookbook
Clojure Data Structures and Algorithms Cookbook
Rafik Naccache
¥90.46
This book is for intermediate Clojure developers who can read and write in this language quite comfortably. Besides, it is assumed that you have some knowledge of how to set up Clojure projects, include dependencies, how to run REPLs, and so on through Leiningen and Figwheel. No prior awareness of any of the algorithms covered in this book is needed, and, when appropriate, pointers are given to the explanation material about any theory related to them.
Windows Malware Analysis Essentials
Windows Malware Analysis Essentials
Victor Marak
¥90.46
Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set About This Book Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware Understand how to decipher x86 assembly code from source code inside your favourite development environment A step-by-step based guide that reveals malware analysis from an industry insider and demystifies the process Who This Book Is For This book is best for someone who has prior experience with reverse engineering Windows executables and wants to specialize in malware analysis. The book presents the malware analysis thought process using a show-and-tell approach, and the examples included will give any analyst confidence in how to approach this task on their own the next time around. What You Will Learn Use the positional number system for clear conception of Boolean algebra, that applies to malware research purposes Get introduced to static and dynamic analysis methodologies and build your own malware lab Analyse destructive malware samples from the real world (ITW) from fingerprinting and static/dynamic analysis to the final debrief Understand different modes of linking and how to compile your own libraries from assembly code and integrate the codein your final program Get to know about the various emulators, debuggers and their features, and sandboxes and set them up effectively depending on the required scenario Deal with other malware vectors such as pdf and MS-Office based malware as well as *s and shellcode In Detail Windows OS is the most used operating system in the world and hence is targeted by malware writers. There are strong ramifications if things go awry. Things will go wrong if they can, and hence we see a salvo of attacks that have continued to disrupt the normal scheme of things in our day to day lives. This book will guide you on how to use essential tools such as debuggers, disassemblers, and sandboxes to dissect malware samples. It will expose your innards and then build a report of their indicators of compromise along with detection rule sets that will enable you to help contain the outbreak when faced with such a situation. We will start with the basics of computing fundamentals such as number systems and Boolean algebra. Further, you'll learn about x86 assembly programming and its integration with high level languages such as C++.You'll understand how to decipher disassembly code obtained from the compiled source code and map it back to its original design goals. By delving into end to end analysis with real-world malware samples to solidify your understanding, you'll sharpen your technique of handling destructive malware binaries and vector mechanisms. You will also be encouraged to consider analysis lab safety measures so that there is no infection in the process. Finally, we'll have a rounded tour of various emulations, sandboxing, and debugging options so that you know what is at your disposal when you need a specific kind of weapon in order to nullify the malware. Style and approach An easy to follow, hands-on guide with de*ions and screenshots that will help you execute effective malicious software investigations and conjure up solutions creatively and confidently.
Unity Character Animation with Mecanim
Unity Character Animation with Mecanim
Jamie Dean
¥90.46
A detailed guide to the complex new animation tools in Unity, packed with clear instructions and illustrated with original content in the context of a next generation zombie apocalypse adventure game About This Book Create and export models and animation sequences to Unity from 3ds max and Maya Prepare character models and animation for games using Mecanim’s rigging tools Retarget, adjust, and mix and match motion capture and other animation data Write and edit *s compatible with Mecanim Animation Controllers Who This Book Is For If you are a Unity developer looking to get to grips with the character animation specific tools, a 3D software user who is new to Unity, or a beginner game developer who is interested in character animation and interaction, this book is ideal for you. Some experience with either the Unity interface or basic 3D coordinates is recommended, but not required. What You Will Learn Learn how to prepare a rigged character model to receive animation within Unity Acquire efficient techniques to refine and optimize motion capture data Retarget animation sequences between different character rigs Discover how to rig a humanoid character and export for use in Unity Script character interaction for a First Person character model Create dynamic animation sequences from scratch using keyframe techniques, in a variety of 3D software packages Learn Project Management in Unity Understand how to set up a complex facial rig for speech Set up Animation Controllers with masked states and blend trees to create seamless and additive animation transitions Construct a ragdoll game object and instantiate it in a game Devise Mecanim animation integration for the player and AI driven animation for enemy characters In Detail Game animation for independent developers has taken a giant leap forward with Unity's Mecanim toolset, which streamlines the import/export, retargeting, and many other aspects of the character animation workflow. Unity Character Animation with Mecanim is a great primer for getting to know the nuts and bolts of Mecanim and other character animation related tools in Unity. It offers you step-by-step instructions for preparing and exporting rigged models and animation sequences from commonly used 3D packages, such as Maya, 3ds Max and Blender. This book explores the new set of animation tools introduced with Mecanim in Unity. Approaching its subject matter through a typical genre–a zombie action game, character animation techniques are explored using real examples of player input and interaction, enemy behavior, and other aspects of game dynamics. As the book progresses, the reader will understand how these elements fit together in a small game development workflow. We will begin with a demonstration of the process of getting a rigged character into Unity and setting it up to use provided animation sequences. We will also consider a few industry standard 3D packages and how these can be used to rig a humanoid character for use in Unity. We will demonstrate the retargeting capabilities of Mecanim’s Humanoid Animation type by adjusting motion sequences to fit disparate character types in our game. After this, we will look at Ragdoll physics and the implementation of this commonly used technique in a Mecanim workflow. The book culminates with a thorough dissection of the enemy character AI * incorporating the Mecanim elements detailed in the previous chapters. Unity Character Animation with Mecanim will provide you with a detailed exploration of the interaction between game development and character animation, and will broaden your understanding of the rich animation toolset within Unity. Style and approach A comprehensive guide, featuring step- by- step practical tutorials using sample assets, showing you how to build fully controllable characters and non-player characters/enemies.
Mastering Flask
Mastering Flask
Jack Stouffer
¥90.46
Gain expertise in Flask to create dynamic and powerful web applications About This Book Work with scalable Flask application structures to create complex web apps Discover the most powerful Flask extensions and learn how to create one Deploy your application to real-world platforms using this step-by-step guide Who This Book Is For If you are a Flask user who knows the basics of the library and how to create basic web pages with HTML and CSS, and you want to take your applications to the next level, this is the book for you. Harnessing the full power of Flask will allow you to create complex web applications with ease. What You Will Learn Set up a best practices Python environment Use SQLAlchemy to programmatically query a database Develop templates in Jinja Set up an MVC environment for Flask Discover NoSQL, when to use it, when not to, and how to use it Develop a custom Flask extension Use Celery to create asynchronous tasks In Detail Flask is a library that allows programmers to create web applications in Python. Flask is a micro-framework that boasts a low learning curve, a large community, and the power to create complex web apps. However, Flask is easy to learn but difficult to master. Starting from a simple Flask app, this book will walk through advanced topics while providing practical examples of the lessons learned. After building a simple Flask app, a proper app structure is demonstrated by transforming the app to use a Model-View-Controller (MVC) architecture. With a scalable structure in hand, the next chapters use Flask extensions to provide extra functionality to the app, including user login and registration, NoSQL querying, a REST API, an admin interface, and more. Next, you’ll discover how to use unit testing to take the guesswork away from making sure the code is performing as it should. The book closes with a discussion of the different platforms that are available to deploy a Flask app on, the pros and cons of each one, and how to deploy on each one. Style and approach With plenty of useful examples, this guide introduces new concepts and then shows you how those concepts can be used in a real-world environment. Most sections are based around a single example app that is developed throughout the book.
Linux Shell Scripting Essentials
Linux Shell Scripting Essentials
Sinny Kumari
¥90.46
Learn shell *ing to solve complex shell-related problems and to efficiently automate your day-to-day tasks About This Book Familiarize yourself with the terminal by learning about powerful shell features Automate tasks by writing shell *s for repetitive work Packed with easy-to-follow, hands-on examples to help you write any type of shell * with confidence Who This Book Is For This book is aimed at administrators and those who have a basic knowledge of shell *ing and who want to learn how to get the most out of writing shell *s. What You Will Learn Write effective shell *s easily Perform search operations and manipulate large text data with a single shell command Modularize reusable shell *s by creating shell libraries Redirect input, output, and errors of a command or * execution to other streams Debug code with different shell debugging techniques to make your *s bug-free Manage processes, along with the environment variables needed to execute them properly Execute and embed other languages in your *s Manage creation, deletion, and search operations in files In Detail Shell *ing is a quick method to prototype complex applications or problems. Shell *s are a collection of commands to automate tasks, usually those for which the user has a repeated need, when working on Linux-based systems. Using simple commands or a combination of them in a shell can solve complex problems easily. This book starts with the basics, including essential commands that can be executed on Linux systems to perform tasks within a few nanoseconds. You’ll learn to use outputs from commands and transform them to show the data you require. Discover how to write shell *s easily, execute * files, debug, and handle errors. Next, you’ll explore environment variables in shell programming and learn how to customize them and add a new environment. Finally, the book walks you through processes and how these interact with your shell *s, along with how to use *s to automate tasks and how to embed other languages and execute them. Style and approach This book is a pragmatic guide to writing efficient shell programs, complete with hands-on examples and tips.
Web Penetration Testing with Kali Linux - Second Edition
Web Penetration Testing with Kali Linux - Second Edition
Juned Ahmed Ansari
¥90.46
Build your defense against web attacks with Kali Linux 2.0 About This Book Gain a deep understanding of the flaws in web applications and exploit them in a practical manner Get hands-on web application hacking experience with a range of tools in Kali Linux 2.0 Develop the practical skills required to master multiple tools in the Kali Linux 2.0 toolkit Who This Book Is For If you are already working as a network penetration tester and want to expand your knowledge of web application hacking, then this book tailored for you. Those who are interested in learning more about the Kali Sana tools that are used to test web applications will find this book a thoroughly useful and interesting guide. What You Will Learn Set up your lab with Kali Linux 2.0 Identify the difference between hacking a web application and network hacking Understand the different techniques used to identify the flavor of web applications Expose vulnerabilities present in web servers and their applications using server-side attacks Use SQL and cross-site *ing (XSS) attacks Check for XSS flaws using the burp suite proxy Find out about the mitigation techniques used to negate the effects of the Injection and Blind SQL attacks In Detail Kali Linux 2.0 is the new generation of the industry-leading BackTrack Linux penetration testing and security auditing Linux distribution. It contains several hundred tools aimed at various information security tasks such as penetration testing, forensics, and reverse engineering. At the beginning of the book, you will be introduced to the concepts of hacking and penetration testing and will get to know about the tools used in Kali Linux 2.0 that relate to web application hacking. Then, you will gain a deep understanding of SQL and command injection flaws and ways to exploit the flaws. Moving on, you will get to know more about *ing and input validation flaws, AJAX, and the security issues related to AJAX. At the end of the book, you will use an automated technique called fuzzing to be able to identify flaws in a web application. Finally, you will understand the web application vulnerabilities and the ways in which they can be exploited using the tools in Kali Linux 2.0. Style and approach This step-by-step guide covers each topic with detailed practical examples. Every concept is explained with the help of illustrations using the tools available in Kali Linux 2.0.
Moodle 2.0 for Business
Moodle 2.0 for Business
Gavin Henrick
¥90.46
Part of Packt's Beginner's Guide series, each chapter looks at a different aspect of using Moodle in a business environment, and steadily guides the reader through setting Moodle up in their own business with the help of practical examples, accompanied by lots of screenshots. Each chapter also includes case studies from well-known companies that have already implemented Moodle. If you are responsible for training, recruitment, or maintaining any guidelines within your company, then this book is for you. No previous experience with Moodle is necessary as the examples are easy to follow