Mastering Metasploit
¥90.46
A comprehensive and detailed, step by step tutorial guide that takes you through important aspects of the Metasploit framework. If you are a penetration tester, security engineer, or someone who is looking to extend their penetration testing skills with Metasploit, then this book is ideal for you. The readers ofthis book must have a basic knowledge of using Metasploit. They are also expected to have knowledge of exploitation and an indepth understanding of object-oriented programming languages.
iOS Development with Xamarin Cookbook
¥90.46
The book is written in a recipe format with practical examples, allowing you to go directly to your topic of interest or follow topics throughout a chapter to gain an indepth knowledge. There are also plenty of hints and best practices along the way. If you are a C#/.NET developer with no previous experience in iOS development or an ObjectiveC developer who wants to create complete iOS applications and deploy them to the App Store, then this book is ideal for you. No experience with Xamarin is needed.
SignalR Real-time Application Cookbook
¥90.46
This book contains illustrated code examples to help you create realtime, asynchronous, and bidirectional clientserver applications. Each recipe will concentrate on one specific aspect of application development with SignalR showing you how that aspect can be used proficiently. Different levels of developers will find this book useful. Beginners will be able to learn all the fundamental concepts of SignalR, quickly becoming productive in a difficult arena. Experienced programmers will find in this book a handy and useful collection of readymade solutions to common use cases, which they will be able to enhance as needed. Developers can also use the book as a quick reference to the most important SignalR features. No previous practical experience either with SignalR or with realtime communication in general is required.
Visual SourceSafe 2005 Software Configuration Management in Practice
¥90.46
After introducing the fundamental principles of SCM and the benefits of using SCM to manage the software development lifecycle this book uses a real-world case-study project to build a Service-Oriented Application named Orbital Hotel. You will learn the team cooperation features in Visual SourceSafe with the help of John and Mary, two fictional team members assigned to implement various project components. You can visit Orbital Hotel online and you can download its source code. The appendices deal with SourceSafe administration tasks: database creation and management, how to secure the database and how to assign users and user rights, how to manage projects and project settings, and how to customize SourceSafe to best suit your development style. This book is for .NET developers, testers and configuration managers who: Use Visual Studio .NET 2005 for building software Want to use software configuration to manage their products in day-to-day activities Want to improve their efficiency by learning to use the best practices with SourceSafe Want to install, manage, and configure Visual SourceSafe 2005 for optimal operation. The book does not assume previous knowledge of Software Configuration Management or Visual SourceSafe. It takes the reader from the ground up and is a great resource for people starting to learn about this subject. Readers with previous SourceSafe experience will benefit by discovering the improved and new features in Visual SourceSafe 2005.
Mastering Adobe Premiere Pro CS6
¥90.46
Designed to be practical and engaging, Mastering Adobe Premiere Pro CS6 is a project-based book to help you truly augment your skills and become a film editing hotshot.If you're just starting out or even migrating from existing video editing software, then this book is for you. With rapid progression through practical examples constructed to be both engaging and useful, Mastering Adobe Premiere Pro CS6 is ideal for learning the sometimes complex workflows of this powerful application.
Mastering OpenLDAP: Configuring, Securing and Integrating Directory Services
¥90.46
This book has been written from the application developer's perspective, tackling the topics that will be most important to helping the application developer understand OpenLDAP, and get it set up as securely and quickly as possible. It shows how OpenLDAP interoperates with other UNIX/Linux services (DNS, NIS, Samba, etc.). The target audience will require basic Linux system administration knowledge, but no prior knowledge of LDAP or OpenLDAP is assumed. If you are web savvy and are interested in using OpenLDAP for web applications and services like client interaction then this is the book for you.
PHP Oracle Web Development
¥90.46
Through numerous examples, this book shows you how to build simple and efficient PHP applications on top of Oracle, efficiently distributing data processing between the Web/PHP server and Oracle Database server. Although this book covers only the most popular and up-to-date topic areas on the use of PHP in conjunction with Oracle, the author does not make any assumption about the skill level of the reader. Packed with information in an easy-to-read format, the book is ideal for any PHP developer who deals with Oracle.
PrimeFaces Beginner's Guide
¥90.46
A guide for beginner’s with step-by-step instructions and an easy-to-follow approach.PrimeFaces Beginners Guide is a simple and effective guide for beginners, wanting to learn and implement PrimeFaces in their JSF-based applications. Some basic JSF and jQuery skills are required before you start working through the book.
Mastering Hadoop
¥90.46
Do you want to broaden your Hadoop skill set and take your knowledge to the next levelDo you wish to enhance your knowledge of Hadoop to solve challenging data processing problemsAre your Hadoop jobs, Pig *s, or Hive queries not working as fast as you intendAre you looking to understand the benefits of upgrading HadoopIf the answer is yes to any of these, this book is for you. It assumes novice-level familiarity with Hadoop.
Java EE 7 Development with WildFly
¥90.46
If you are a Java developer who wants to learn about Java EE, this is the book for you. It's also ideal for developers who already have experience with the Java EE platform but would like to learn more about the new Java EE 7 features by analyzing fully functional sample applications using the new application server WildFly.
Implementing VMware Horizon View 5.2
¥90.46
A step-by-step tutorial covering all components of the View Horizon suite in detail, to ensure that you can utilize all features of the platform, and discover all of the possible ways that it can be used within your own environment.If you are a newcomer in system administration, and you wish to implement a small to midsized Horizon View environment, then this book is for you. It will also benefit individuals who wish to administrate and manage Horizon View more efficiently or are studying for the VCP5-DT.
Unity Character Animation with Mecanim
¥90.46
A detailed guide to the complex new animation tools in Unity, packed with clear instructions and illustrated with original content in the context of a next generation zombie apocalypse adventure game About This Book Create and export models and animation sequences to Unity from 3ds max and Maya Prepare character models and animation for games using Mecanim’s rigging tools Retarget, adjust, and mix and match motion capture and other animation data Write and edit *s compatible with Mecanim Animation Controllers Who This Book Is For If you are a Unity developer looking to get to grips with the character animation specific tools, a 3D software user who is new to Unity, or a beginner game developer who is interested in character animation and interaction, this book is ideal for you. Some experience with either the Unity interface or basic 3D coordinates is recommended, but not required. What You Will Learn Learn how to prepare a rigged character model to receive animation within Unity Acquire efficient techniques to refine and optimize motion capture data Retarget animation sequences between different character rigs Discover how to rig a humanoid character and export for use in Unity Script character interaction for a First Person character model Create dynamic animation sequences from scratch using keyframe techniques, in a variety of 3D software packages Learn Project Management in Unity Understand how to set up a complex facial rig for speech Set up Animation Controllers with masked states and blend trees to create seamless and additive animation transitions Construct a ragdoll game object and instantiate it in a game Devise Mecanim animation integration for the player and AI driven animation for enemy characters In Detail Game animation for independent developers has taken a giant leap forward with Unity's Mecanim toolset, which streamlines the import/export, retargeting, and many other aspects of the character animation workflow. Unity Character Animation with Mecanim is a great primer for getting to know the nuts and bolts of Mecanim and other character animation related tools in Unity. It offers you step-by-step instructions for preparing and exporting rigged models and animation sequences from commonly used 3D packages, such as Maya, 3ds Max and Blender. This book explores the new set of animation tools introduced with Mecanim in Unity. Approaching its subject matter through a typical genre–a zombie action game, character animation techniques are explored using real examples of player input and interaction, enemy behavior, and other aspects of game dynamics. As the book progresses, the reader will understand how these elements fit together in a small game development workflow. We will begin with a demonstration of the process of getting a rigged character into Unity and setting it up to use provided animation sequences. We will also consider a few industry standard 3D packages and how these can be used to rig a humanoid character for use in Unity. We will demonstrate the retargeting capabilities of Mecanim’s Humanoid Animation type by adjusting motion sequences to fit disparate character types in our game. After this, we will look at Ragdoll physics and the implementation of this commonly used technique in a Mecanim workflow. The book culminates with a thorough dissection of the enemy character AI * incorporating the Mecanim elements detailed in the previous chapters. Unity Character Animation with Mecanim will provide you with a detailed exploration of the interaction between game development and character animation, and will broaden your understanding of the rich animation toolset within Unity. Style and approach A comprehensive guide, featuring step- by- step practical tutorials using sample assets, showing you how to build fully controllable characters and non-player characters/enemies.
Windows Malware Analysis Essentials
¥90.46
Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set About This Book Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware Understand how to decipher x86 assembly code from source code inside your favourite development environment A step-by-step based guide that reveals malware analysis from an industry insider and demystifies the process Who This Book Is For This book is best for someone who has prior experience with reverse engineering Windows executables and wants to specialize in malware analysis. The book presents the malware analysis thought process using a show-and-tell approach, and the examples included will give any analyst confidence in how to approach this task on their own the next time around. What You Will Learn Use the positional number system for clear conception of Boolean algebra, that applies to malware research purposes Get introduced to static and dynamic analysis methodologies and build your own malware lab Analyse destructive malware samples from the real world (ITW) from fingerprinting and static/dynamic analysis to the final debrief Understand different modes of linking and how to compile your own libraries from assembly code and integrate the codein your final program Get to know about the various emulators, debuggers and their features, and sandboxes and set them up effectively depending on the required scenario Deal with other malware vectors such as pdf and MS-Office based malware as well as *s and shellcode In Detail Windows OS is the most used operating system in the world and hence is targeted by malware writers. There are strong ramifications if things go awry. Things will go wrong if they can, and hence we see a salvo of attacks that have continued to disrupt the normal scheme of things in our day to day lives. This book will guide you on how to use essential tools such as debuggers, disassemblers, and sandboxes to dissect malware samples. It will expose your innards and then build a report of their indicators of compromise along with detection rule sets that will enable you to help contain the outbreak when faced with such a situation. We will start with the basics of computing fundamentals such as number systems and Boolean algebra. Further, you'll learn about x86 assembly programming and its integration with high level languages such as C++.You'll understand how to decipher disassembly code obtained from the compiled source code and map it back to its original design goals. By delving into end to end analysis with real-world malware samples to solidify your understanding, you'll sharpen your technique of handling destructive malware binaries and vector mechanisms. You will also be encouraged to consider analysis lab safety measures so that there is no infection in the process. Finally, we'll have a rounded tour of various emulations, sandboxing, and debugging options so that you know what is at your disposal when you need a specific kind of weapon in order to nullify the malware. Style and approach An easy to follow, hands-on guide with de*ions and screenshots that will help you execute effective malicious software investigations and conjure up solutions creatively and confidently.
Mastering Flask
¥90.46
Gain expertise in Flask to create dynamic and powerful web applications About This Book Work with scalable Flask application structures to create complex web apps Discover the most powerful Flask extensions and learn how to create one Deploy your application to real-world platforms using this step-by-step guide Who This Book Is For If you are a Flask user who knows the basics of the library and how to create basic web pages with HTML and CSS, and you want to take your applications to the next level, this is the book for you. Harnessing the full power of Flask will allow you to create complex web applications with ease. What You Will Learn Set up a best practices Python environment Use SQLAlchemy to programmatically query a database Develop templates in Jinja Set up an MVC environment for Flask Discover NoSQL, when to use it, when not to, and how to use it Develop a custom Flask extension Use Celery to create asynchronous tasks In Detail Flask is a library that allows programmers to create web applications in Python. Flask is a micro-framework that boasts a low learning curve, a large community, and the power to create complex web apps. However, Flask is easy to learn but difficult to master. Starting from a simple Flask app, this book will walk through advanced topics while providing practical examples of the lessons learned. After building a simple Flask app, a proper app structure is demonstrated by transforming the app to use a Model-View-Controller (MVC) architecture. With a scalable structure in hand, the next chapters use Flask extensions to provide extra functionality to the app, including user login and registration, NoSQL querying, a REST API, an admin interface, and more. Next, you’ll discover how to use unit testing to take the guesswork away from making sure the code is performing as it should. The book closes with a discussion of the different platforms that are available to deploy a Flask app on, the pros and cons of each one, and how to deploy on each one. Style and approach With plenty of useful examples, this guide introduces new concepts and then shows you how those concepts can be used in a real-world environment. Most sections are based around a single example app that is developed throughout the book.
Mastering Citrix? XenDesktop?
¥90.46
This book is intended for IT administrators who want to use Citrixas a desktop virtualization solution or for IT architects who want to learn how to design and implement highly available and scalable XenDesktopenvironments. It is assumed that you have intermediate-level knowledge of virtualization concepts, Windows desktop operating systems, and Windows Server technologies. Citrix?, Citrix Systems?, XenApp?, XenDesktop?, and CloudPortalare trademarks of CitrixSystems?, Inc. and/or one or more of its subsidiaries, and may be registered in the United States Patent and Trademark Office and in other countries.
Linux Shell Scripting Essentials
¥90.46
Learn shell *ing to solve complex shell-related problems and to efficiently automate your day-to-day tasks About This Book Familiarize yourself with the terminal by learning about powerful shell features Automate tasks by writing shell *s for repetitive work Packed with easy-to-follow, hands-on examples to help you write any type of shell * with confidence Who This Book Is For This book is aimed at administrators and those who have a basic knowledge of shell *ing and who want to learn how to get the most out of writing shell *s. What You Will Learn Write effective shell *s easily Perform search operations and manipulate large text data with a single shell command Modularize reusable shell *s by creating shell libraries Redirect input, output, and errors of a command or * execution to other streams Debug code with different shell debugging techniques to make your *s bug-free Manage processes, along with the environment variables needed to execute them properly Execute and embed other languages in your *s Manage creation, deletion, and search operations in files In Detail Shell *ing is a quick method to prototype complex applications or problems. Shell *s are a collection of commands to automate tasks, usually those for which the user has a repeated need, when working on Linux-based systems. Using simple commands or a combination of them in a shell can solve complex problems easily. This book starts with the basics, including essential commands that can be executed on Linux systems to perform tasks within a few nanoseconds. You’ll learn to use outputs from commands and transform them to show the data you require. Discover how to write shell *s easily, execute * files, debug, and handle errors. Next, you’ll explore environment variables in shell programming and learn how to customize them and add a new environment. Finally, the book walks you through processes and how these interact with your shell *s, along with how to use *s to automate tasks and how to embed other languages and execute them. Style and approach This book is a pragmatic guide to writing efficient shell programs, complete with hands-on examples and tips.
Web Penetration Testing with Kali Linux - Second Edition
¥90.46
Build your defense against web attacks with Kali Linux 2.0 About This Book Gain a deep understanding of the flaws in web applications and exploit them in a practical manner Get hands-on web application hacking experience with a range of tools in Kali Linux 2.0 Develop the practical skills required to master multiple tools in the Kali Linux 2.0 toolkit Who This Book Is For If you are already working as a network penetration tester and want to expand your knowledge of web application hacking, then this book tailored for you. Those who are interested in learning more about the Kali Sana tools that are used to test web applications will find this book a thoroughly useful and interesting guide. What You Will Learn Set up your lab with Kali Linux 2.0 Identify the difference between hacking a web application and network hacking Understand the different techniques used to identify the flavor of web applications Expose vulnerabilities present in web servers and their applications using server-side attacks Use SQL and cross-site *ing (XSS) attacks Check for XSS flaws using the burp suite proxy Find out about the mitigation techniques used to negate the effects of the Injection and Blind SQL attacks In Detail Kali Linux 2.0 is the new generation of the industry-leading BackTrack Linux penetration testing and security auditing Linux distribution. It contains several hundred tools aimed at various information security tasks such as penetration testing, forensics, and reverse engineering. At the beginning of the book, you will be introduced to the concepts of hacking and penetration testing and will get to know about the tools used in Kali Linux 2.0 that relate to web application hacking. Then, you will gain a deep understanding of SQL and command injection flaws and ways to exploit the flaws. Moving on, you will get to know more about *ing and input validation flaws, AJAX, and the security issues related to AJAX. At the end of the book, you will use an automated technique called fuzzing to be able to identify flaws in a web application. Finally, you will understand the web application vulnerabilities and the ways in which they can be exploited using the tools in Kali Linux 2.0. Style and approach This step-by-step guide covers each topic with detailed practical examples. Every concept is explained with the help of illustrations using the tools available in Kali Linux 2.0.
jBPM6 Developer Guide
¥90.46
If you are a Java developer or architect who needs to have a better understanding of how Business Process Management frameworks behave in real-life implementations, this book is for you. This book assumes that you know the Java language well and are familiar with some widely used frameworks such as Hibernate. You should also know the basics of relational databases and Maven-based applications.
Optimizing Citrix? XenDesktop? for High Performance
¥90.46
Successfully deploy XenDesktop sites for a high performance Virtual Desktop Infrastructure (VDI) About This Book Size the VDI environment so the administrator has breathing room to design and build their XenDesktop systems efficiently Use desktop virtualization tools to provide users fast, convenient access to their Windows Desktops Understand the key pinch points in the resource layers such as; the Client layer, Network Layer, Access Layer, Control Layer, Services Layer and Resources Layer Who This Book Is For Citrix XenDesktop High Performance is written for administrators who would like to deploy Citrix XenDesktop in their enterprises with the aim of providing high efficiency. Basic familiarity with Citrix XenDesktop is assumed. What You Will Learn Understand key concepts, terminology, and system requirements Discover how components work in regards to virtualization and performance Identify architectural resource layers and components Explore the hypervisor virtualization software that runs on top of the hardware and learn how to tune it for maximum performance Analyze client hardware and software, including thin clients and mobile devices In Detail Citrix XenDesktop is a suite of desktop virtualization tools designed to provide users with fast and convenient access to their Windows desktops and applications through any device. Virtual desktops mean that rather than setting up hundreds or thousands of individual computers in an enterprise, companies can instead opt to create servers with large amounts of memory, disk, and processing resources, and use virtualization to offer these resources to end users. The result of this is that users are provided with an experience that appears to be identical to having an individual desktop PC. Each user has some disk space, processor time, and memory allocated to them, as though it is present on their own physical machine, when in reality, the resources are physically present on a centralized server. This book starts by answering the basic questions you need to ask when considering XenDesktop, followed by methods of how you can properly size your server infrastructure for XenDesktop. You’ll discover how to optimize the virtual machines used in XenDesktop, how to optimize your network for XenDesktop, and how to optimize the hypervisor and the cloud. You’ll also learn how to monitor XenDesktop to maximize performance. By the end of the book, you will be able to plan, design, build, and deploy high performance XenDesktop Virtualization systems in enterprises. You will also know how to monitor and maintain your systems to ensure smooth operation. Style and approach This book is an all-inclusive guide that uncovers hidden and previously unpublished performance improvement areas for any XenDesktop site.
Scala Functional Programming Patterns
¥90.46
Grok and perform effective functional programming in Scala About This Book Understand functional programming patterns by comparing them with the traditional object-oriented design patterns Write robust, safer, and better code using the declarative programming paradigm An illustrative guide for programmers to create functional programming patterns with Scala Who This Book Is For If you have done Java programming before and have a basic knowledge of Scala and its syntax, then this book is an ideal choice to help you to understand the context, the traditional design pattern applicable, and the Scala way. Having previous knowledge of design patterns will help, though it is not strictly necessary. What You Will Learn Get to know about functional programming and the value Scala's FP idioms bring to the table Solve day-to-day programming problems using functional programming idioms Cut down the boiler-plate and express patterns simply and elegantly using Scala's concise syntax Tame system complexity by reducing the moving parts Write easier to reason about concurrent code using the actor paradigm and the Akka library Apply recursive thinking and understand how to create solutions without mutation Reuse existing code to compose new behavior Combine the object-oriented and functional programming approaches for effective programming using Scala In Detail Scala is used to construct elegant class hierarchies for maximum code reuse and extensibility and to implement their behavior using higher-order functions. Its functional programming (FP) features are a boon to help you design “easy to reason about” systems to control the growing software complexities. Knowing how and where to apply the many Scala techniques is challenging. Looking at Scala best practices in the context of what you already know helps you grasp these concepts quickly, and helps you see where and why to use them. This book begins with the rationale behind patterns to help you understand where and why each pattern is applied. You will discover what tail recursion brings to your table and will get an understanding of how to create solutions without mutations. We then explain the concept of memorization and infinite sequences for on-demand computation. Further, the book takes you through Scala’s stackable traits and dependency injection, a popular technique to produce loosely-coupled software systems. You will also explore how to currying favors to your code and how to simplify it by de-construction via pattern matching. We also show you how to do pipeline transformations using higher order functions such as the pipes and filters pattern. Then we guide you through the increasing importance of concurrent programming and the pitfalls of traditional code concurrency. Lastly, the book takes a paradigm shift to show you the different techniques that functional programming brings to your plate. This book is an invaluable source to help you understand and perform functional programming and solve common programming problems using Scala’s programming patterns. Style and approach This is a hands-on guide to Scala's game-changing features for programming. It is filled with many code examples and figures that illustrate various Scala idioms and best practices.
Mastering RStudio – Develop, Communicate, and Collaborate with R
¥90.46
Harness the power of RStudio to create web applications, R packages, markdown reports and pretty data visualizationsAbout This BookDiscover the multi-functional use of RStudio to support your daily work with R codeLearn to create stunning, meaningful, and interactive graphs and learn to embed them into easy communicable reports using multiple R packagesDevelop your own R packages and Shiny web apps to share your knowledge and collaborate with others.Who This Book Is ForThis book is aimed at R developers and analysts who wish to do R statistical development while taking advantage of RStudio’s functionality to ease their development efforts. R programming experience is assumed as well as being comfortable with R’s basic structures and a number of functions.What You Will LearnDiscover the RStudio IDE and details about the user interfaceCommunicate your insights with R Markdown in static and interactive waysLearn how to use different graphic systems to visualize your dataBuild interactive web applications with the Shiny framework to present and share your resultsUnderstand the process of package development and assemble your own R packagesEasily collaborate with other people on your projects by using Git and GitHubManage the R environment for your organization with RStudio and Shiny serverApply your obtained knowledge about RStudio and R development to create a real-world dashboard solutionIn DetailRStudio helps you to manage small to large projects by giving you a multi-functional integrated development environment, combined with the power and flexibility of the R programming language, which is becoming the bridge language of data science for developers and analyst worldwide. Mastering the use of RStudio will help you to solve real-world data problems.This book begins by guiding you through the installation of RStudio and explaining the user interface step by step. From there, the next logical step is to use this knowledge to improve your data analysis workflow. We will do this by building up our toolbox to create interactive reports and graphs or even web applications with Shiny. To collaborate with others, we will explore how to use Git and GitHub with RStudio and how to build your own packages to ensure top quality results. Finally, we put it all together in an interactive dashboard written with R.Style and approachAn easy-to-follow guide full of hands-on examples to master RStudio.Beginning from explaining the basics, each topic is explained with a lot of details for every feature.

购物车
个人中心

