Axure RP 6 Prototyping Essentials
¥90.46
Axure RP 6 Prototyping Essentials is a detailed, practical primer on the leading rapid prototyping tool. Short on jargon and high on concepts, real-life scenarios and step-by-step guidance through hands-on examples, this book will show you how to integrate Axure into your UX workflow. This book is written for UX practitioners, business analysts, product managers, and anyone else who is involved in UX projects. The book assumes that you have no or very little familiarity with Axure. It will help you if you are evaluating the tool for an upcoming project or are required to quickly get up to speed in a project you just joined. The book assumes some familiarity with the principles of the User Centred Design methodology.
Android NDK: Beginner's Guide - Second Edition
¥90.46
Are you an Android Java programmer who needs more performanceAre you a C/C++ developer who doesn’t want to bother with the complexity of Java and its out-of-control garbage collectorDo you want to create fast intensive multimedia applications or gamesIf you’ve answered yes to any of these questions then this book is for you. With some general knowledge of C/C++ development, you will be able to dive headfirst into native Android development.
Learning Behavior-driven Development with JavaScript
¥90.46
This book is ideal for any JavaScript developer who is interested in producing well-tested code. If you have no prior experience with testing, Node.js, or any other tool, do not worry, as they will be explained from scratch.
PowerCLI Cookbook
¥90.46
If you are a virtualization professional who wants to unleash the power of automation and combat the complexity of sprawling virtual environments, this book is ideal for you. This book will enhance your skills of administering VMware vSphere and vCloud Director with PowerCLI.
Learning Python Network Programming
¥90.46
If you're a Python developer or a system administrator with Python experience and you're looking to take your first steps in network programming, then this book is for you. Basic knowledge of Python is assumed.
Learning Docker
¥90.46
If you are an application developer who wants to learn Docker in order to utilize its features for application deployment, then this book is for you. No prior knowledge of Docker is required.
Mastering Flask
¥90.46
Gain expertise in Flask to create dynamic and powerful web applications About This Book Work with scalable Flask application structures to create complex web apps Discover the most powerful Flask extensions and learn how to create one Deploy your application to real-world platforms using this step-by-step guide Who This Book Is For If you are a Flask user who knows the basics of the library and how to create basic web pages with HTML and CSS, and you want to take your applications to the next level, this is the book for you. Harnessing the full power of Flask will allow you to create complex web applications with ease. What You Will Learn Set up a best practices Python environment Use SQLAlchemy to programmatically query a database Develop templates in Jinja Set up an MVC environment for Flask Discover NoSQL, when to use it, when not to, and how to use it Develop a custom Flask extension Use Celery to create asynchronous tasks In Detail Flask is a library that allows programmers to create web applications in Python. Flask is a micro-framework that boasts a low learning curve, a large community, and the power to create complex web apps. However, Flask is easy to learn but difficult to master. Starting from a simple Flask app, this book will walk through advanced topics while providing practical examples of the lessons learned. After building a simple Flask app, a proper app structure is demonstrated by transforming the app to use a Model-View-Controller (MVC) architecture. With a scalable structure in hand, the next chapters use Flask extensions to provide extra functionality to the app, including user login and registration, NoSQL querying, a REST API, an admin interface, and more. Next, you’ll discover how to use unit testing to take the guesswork away from making sure the code is performing as it should. The book closes with a discussion of the different platforms that are available to deploy a Flask app on, the pros and cons of each one, and how to deploy on each one. Style and approach With plenty of useful examples, this guide introduces new concepts and then shows you how those concepts can be used in a real-world environment. Most sections are based around a single example app that is developed throughout the book.
Linux Shell Scripting Essentials
¥90.46
Learn shell *ing to solve complex shell-related problems and to efficiently automate your day-to-day tasks About This Book Familiarize yourself with the terminal by learning about powerful shell features Automate tasks by writing shell *s for repetitive work Packed with easy-to-follow, hands-on examples to help you write any type of shell * with confidence Who This Book Is For This book is aimed at administrators and those who have a basic knowledge of shell *ing and who want to learn how to get the most out of writing shell *s. What You Will Learn Write effective shell *s easily Perform search operations and manipulate large text data with a single shell command Modularize reusable shell *s by creating shell libraries Redirect input, output, and errors of a command or * execution to other streams Debug code with different shell debugging techniques to make your *s bug-free Manage processes, along with the environment variables needed to execute them properly Execute and embed other languages in your *s Manage creation, deletion, and search operations in files In Detail Shell *ing is a quick method to prototype complex applications or problems. Shell *s are a collection of commands to automate tasks, usually those for which the user has a repeated need, when working on Linux-based systems. Using simple commands or a combination of them in a shell can solve complex problems easily. This book starts with the basics, including essential commands that can be executed on Linux systems to perform tasks within a few nanoseconds. You’ll learn to use outputs from commands and transform them to show the data you require. Discover how to write shell *s easily, execute * files, debug, and handle errors. Next, you’ll explore environment variables in shell programming and learn how to customize them and add a new environment. Finally, the book walks you through processes and how these interact with your shell *s, along with how to use *s to automate tasks and how to embed other languages and execute them. Style and approach This book is a pragmatic guide to writing efficient shell programs, complete with hands-on examples and tips.
Web Penetration Testing with Kali Linux - Second Edition
¥90.46
Build your defense against web attacks with Kali Linux 2.0 About This Book Gain a deep understanding of the flaws in web applications and exploit them in a practical manner Get hands-on web application hacking experience with a range of tools in Kali Linux 2.0 Develop the practical skills required to master multiple tools in the Kali Linux 2.0 toolkit Who This Book Is For If you are already working as a network penetration tester and want to expand your knowledge of web application hacking, then this book tailored for you. Those who are interested in learning more about the Kali Sana tools that are used to test web applications will find this book a thoroughly useful and interesting guide. What You Will Learn Set up your lab with Kali Linux 2.0 Identify the difference between hacking a web application and network hacking Understand the different techniques used to identify the flavor of web applications Expose vulnerabilities present in web servers and their applications using server-side attacks Use SQL and cross-site *ing (XSS) attacks Check for XSS flaws using the burp suite proxy Find out about the mitigation techniques used to negate the effects of the Injection and Blind SQL attacks In Detail Kali Linux 2.0 is the new generation of the industry-leading BackTrack Linux penetration testing and security auditing Linux distribution. It contains several hundred tools aimed at various information security tasks such as penetration testing, forensics, and reverse engineering. At the beginning of the book, you will be introduced to the concepts of hacking and penetration testing and will get to know about the tools used in Kali Linux 2.0 that relate to web application hacking. Then, you will gain a deep understanding of SQL and command injection flaws and ways to exploit the flaws. Moving on, you will get to know more about *ing and input validation flaws, AJAX, and the security issues related to AJAX. At the end of the book, you will use an automated technique called fuzzing to be able to identify flaws in a web application. Finally, you will understand the web application vulnerabilities and the ways in which they can be exploited using the tools in Kali Linux 2.0. Style and approach This step-by-step guide covers each topic with detailed practical examples. Every concept is explained with the help of illustrations using the tools available in Kali Linux 2.0.
Windows Malware Analysis Essentials
¥90.46
Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set About This Book Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware Understand how to decipher x86 assembly code from source code inside your favourite development environment A step-by-step based guide that reveals malware analysis from an industry insider and demystifies the process Who This Book Is For This book is best for someone who has prior experience with reverse engineering Windows executables and wants to specialize in malware analysis. The book presents the malware analysis thought process using a show-and-tell approach, and the examples included will give any analyst confidence in how to approach this task on their own the next time around. What You Will Learn Use the positional number system for clear conception of Boolean algebra, that applies to malware research purposes Get introduced to static and dynamic analysis methodologies and build your own malware lab Analyse destructive malware samples from the real world (ITW) from fingerprinting and static/dynamic analysis to the final debrief Understand different modes of linking and how to compile your own libraries from assembly code and integrate the codein your final program Get to know about the various emulators, debuggers and their features, and sandboxes and set them up effectively depending on the required scenario Deal with other malware vectors such as pdf and MS-Office based malware as well as *s and shellcode In Detail Windows OS is the most used operating system in the world and hence is targeted by malware writers. There are strong ramifications if things go awry. Things will go wrong if they can, and hence we see a salvo of attacks that have continued to disrupt the normal scheme of things in our day to day lives. This book will guide you on how to use essential tools such as debuggers, disassemblers, and sandboxes to dissect malware samples. It will expose your innards and then build a report of their indicators of compromise along with detection rule sets that will enable you to help contain the outbreak when faced with such a situation. We will start with the basics of computing fundamentals such as number systems and Boolean algebra. Further, you'll learn about x86 assembly programming and its integration with high level languages such as C++.You'll understand how to decipher disassembly code obtained from the compiled source code and map it back to its original design goals. By delving into end to end analysis with real-world malware samples to solidify your understanding, you'll sharpen your technique of handling destructive malware binaries and vector mechanisms. You will also be encouraged to consider analysis lab safety measures so that there is no infection in the process. Finally, we'll have a rounded tour of various emulations, sandboxing, and debugging options so that you know what is at your disposal when you need a specific kind of weapon in order to nullify the malware. Style and approach An easy to follow, hands-on guide with de*ions and screenshots that will help you execute effective malicious software investigations and conjure up solutions creatively and confidently.
Unity Character Animation with Mecanim
¥90.46
A detailed guide to the complex new animation tools in Unity, packed with clear instructions and illustrated with original content in the context of a next generation zombie apocalypse adventure game About This Book Create and export models and animation sequences to Unity from 3ds max and Maya Prepare character models and animation for games using Mecanim’s rigging tools Retarget, adjust, and mix and match motion capture and other animation data Write and edit *s compatible with Mecanim Animation Controllers Who This Book Is For If you are a Unity developer looking to get to grips with the character animation specific tools, a 3D software user who is new to Unity, or a beginner game developer who is interested in character animation and interaction, this book is ideal for you. Some experience with either the Unity interface or basic 3D coordinates is recommended, but not required. What You Will Learn Learn how to prepare a rigged character model to receive animation within Unity Acquire efficient techniques to refine and optimize motion capture data Retarget animation sequences between different character rigs Discover how to rig a humanoid character and export for use in Unity Script character interaction for a First Person character model Create dynamic animation sequences from scratch using keyframe techniques, in a variety of 3D software packages Learn Project Management in Unity Understand how to set up a complex facial rig for speech Set up Animation Controllers with masked states and blend trees to create seamless and additive animation transitions Construct a ragdoll game object and instantiate it in a game Devise Mecanim animation integration for the player and AI driven animation for enemy characters In Detail Game animation for independent developers has taken a giant leap forward with Unity's Mecanim toolset, which streamlines the import/export, retargeting, and many other aspects of the character animation workflow. Unity Character Animation with Mecanim is a great primer for getting to know the nuts and bolts of Mecanim and other character animation related tools in Unity. It offers you step-by-step instructions for preparing and exporting rigged models and animation sequences from commonly used 3D packages, such as Maya, 3ds Max and Blender. This book explores the new set of animation tools introduced with Mecanim in Unity. Approaching its subject matter through a typical genre–a zombie action game, character animation techniques are explored using real examples of player input and interaction, enemy behavior, and other aspects of game dynamics. As the book progresses, the reader will understand how these elements fit together in a small game development workflow. We will begin with a demonstration of the process of getting a rigged character into Unity and setting it up to use provided animation sequences. We will also consider a few industry standard 3D packages and how these can be used to rig a humanoid character for use in Unity. We will demonstrate the retargeting capabilities of Mecanim’s Humanoid Animation type by adjusting motion sequences to fit disparate character types in our game. After this, we will look at Ragdoll physics and the implementation of this commonly used technique in a Mecanim workflow. The book culminates with a thorough dissection of the enemy character AI * incorporating the Mecanim elements detailed in the previous chapters. Unity Character Animation with Mecanim will provide you with a detailed exploration of the interaction between game development and character animation, and will broaden your understanding of the rich animation toolset within Unity. Style and approach A comprehensive guide, featuring step- by- step practical tutorials using sample assets, showing you how to build fully controllable characters and non-player characters/enemies.
IBM Lotus Notes 8.5 User Guide
¥90.46
A compact Lotus Notes User Guide, this book covers best practices, hints, tips, and tricks of Lotus Notes 8.5. It draws on real-world examples and you will find this book to be an invaluable reference for Lotus Notes. There are significant changes from the earlier versions of Lotus Notes to the current version of 8.5 and this book covers the new features in detail so that you will be able to take advantage of them. However, this book also covers key features from earlier versions, which have stood the test of time. If you are a business user who wants to get the most out of Lotus Notes, then this book is for you. From beginners to seasoned professionals, this book aims to cover the features, best practices, tips, tricks, and tools that enable you to work smarter—almost effortlessly—in Lotus Notes 8.5.
Microsoft Visio 2010 Business Process Diagramming and Validation
¥90.46
A focused tutorial, this book provides a range of practical examples with downloadable code, showing you how to create business process diagramming templates with Visio and enabling you to effectively visualize business information. It draws on real business examples and needs, and covers all the new features of Visio 2010 Premium Edition. If you are a Microsoft Visio 2010 Premium Edition user or developer who wants to get to grips with both the basic features of Visio 2010 and the new Validation Rules in this edition, then this book is for you. A working knowledge of Microsoft Visio, and optionally .NET for the add-in code, is required, though previous knowledge of business process diagramming is not necessary. More experienced Visio users will gain valuable knowledge for building add-ins and creating and publishing rules. If you want to achieve results from Visio 2010 beyond the ordinary out-of-the-box features, then this book is ideal for you. Although this book covers the Premium Edition, much of the book is still useful if you are a Visio 2010 Standard Edition or Professional Edition user.
WCF 4.0 Multi-tier Services Development with LINQ to Entities
¥90.46
This book is a step-by-step tutorial to guide you through learning WCF and LINQ to Entities. You will be guided to create five WCF and LINQ solutions from scratch, of which three are multi-tiered real-world WCF service solutions, so you will not only be reading, but also be coding through the book, to gain practical experience of WCF and LINQ to Entities. Various test clients will be associated with each solution and these solutions can be built and run independently of other solutions. Clear step-by-step instructions and relevant screenshots will make sure you won't get lost in the new world of WCF and LINQ to Entities. Configuration files, host applications, test clients, and WCF services for each solution will also be available for download for you to examine, modify, and debug from the outside in. The book focuses on the essentials of using WCF and LINQ to Entities, rather than providing a reference to every single possibility. It leaves the reference material online where it belongs, and concentrates instead on practical examples, code, and advice. This book is for C# and C++ developers who are eager to get started with WCF and LINQ to Entities, and want a book that is practical and rich with examples from the very beginning. Developers and architects evaluating SOA implementation technologies for their company will find this book particularly useful because it gets you started with Microsoft's tools for SOA and shows you how to customize our examples for your prototypes. This book presumes basic knowledge of C# or C++. Previous experience with Visual Studio will be helpful but is not required, as detailed instructions are given throughout the book.
Moodle 1.9 Extension Development
¥90.46
The author’s experience as a Moodle developer enables him to combine a simple, de*ive how-to approach with enthusiastic insights into the rich potential of customizing Moodle according to your needs. The chapters gradually build up your skills and by the end of the book you will be confident enough to customize Moodle on your own. This book is written for technologists who are interested in expanding Moodle's functions through programming, either for their own organizations or to contribute to the open source project. You should be familiar with Moodle's basic technologies: PHP, MySQL ,and HTML/CSS.
Moodle as a Curriculum and Information Management System
¥90.46
This book is a beginner's guide in which the reader is led, step-by-step, to accomplish all the tasks right from installing Moodle to transforming into a CMS. Some more advanced steps and concepts are presented but always in a manner that allows beginners to follow along and learn through experience as they experiment on their own test site. By the time you finish the book, you will have your own fully-functional curriculum and information management system. If you are a teacher or head of department in an institution and are interested in how Moodle can be used to streamline curriculum delivery and information flow in your institution, this book is for you. This book is also useful for Moodle administrators. Prior experience with Moodle is not essential for this book.
Microsoft SQL Azure: Enterprise Application Development
¥90.46
Each chapter starts with a general overview reviewing the software architecture related information or the underpinning programming concepts followed by an example of working with specific examples. This is then followed by a de*ion of the specific software used in the chapter. The topics that require you to write code are fully explained using annotations and the code is presented in both VB and C# (in most cases). If you are a .Net developer, an architect, or a DBA who wants to develop enterprise applications and projects and extend your on-site skills with SQL Azure, then this book is for you. This book does not assume experience in Windows Azure or SQL Azure, nor is a high level of competency in SQL Server or the .NET Framework and associated technology required. However, a basic understanding of Visual Studio, C#, VB, SQL Servers, XML, web and WCF is required. If you decide to work with SQL Azure, then this book will provide you with the most up to date and practical information.
PostgreSQL 9.0 High Performance
¥90.46
Improving database performance requires an equal mix of understanding theoretical concepts and working through hands-on examples. You'll find both here. Many of the examples given will be immediately useful for monitoring and improving your PostgreSQL deployments, providing insight into hard-to-obtain information about your database. This book is aimed at intermediate to advanced database administrators using or planning to use PostgreSQL. Portions will also interest systems administrators looking to build or monitor a PostgreSQL installation, as well as developers interested in advanced database internals that impact application design.
Implementing SugarCRM 5.x
¥90.46
The book works from the SugarCRM basics right up to advanced features in a clear and friendly way. It follows a combination of theoretical discussions relating to varying business needs and the manner in which CRM technology can address them. By helping you clarify your business goals the book enables you to build a CRM system to support your business needs. If you are a small-medium business owner/manager with reasonable IT skills, a system implementer, or a system administrator who wants to implement SugarCRM for yourself either as a first CRM or as a replacement for existing solutions, this book is for you. Existing SugarCRM users who want to broaden their understanding of the topic will find this book valuable too. No programming knowledge is required to use this book to implement, customize, and use SugarCRM.
Windows Server 2012 Hyper-V Cookbook
¥90.46
"Windows Server 2012 Hyper-V Cookbook" is a practical cookbook packed with recipes showing and explaining all the features and components of Hyper-V. You’ll learn from best practices, tips and tricks and examples of how to automate daily and common tasks. If you are an administrator who wants to master Microsoft Server Virtualization with Windows Server 2012 Hyper-V, then this book is for you. You should be comfortable with virtualization concepts and practices, and knowledge of previous versions of Windows Server would be an advantage.
HTML5 Graphics & Data Visualization Cookbook
¥90.46
This cookbook is organized in a linear, progressive way allowing it to be read from start to finish, as well as to be used as a useful resource for specific tasks. The HTML5 examples and recipes will have you making dynamic, interactive, and animated charts and graphs in no time. You don't need to have a background in HTML5 or Canvas but you do need to have a basic understanding of how HTML works and know how to code in any language (preferably in JavaScript). In this book we will not explain how to learn to code but how to create projects and how to plan and execute them in the process.

购物车
个人中心

