PostgreSQL 9.0 High Performance
¥90.46
Improving database performance requires an equal mix of understanding theoretical concepts and working through hands-on examples. You'll find both here. Many of the examples given will be immediately useful for monitoring and improving your PostgreSQL deployments, providing insight into hard-to-obtain information about your database. This book is aimed at intermediate to advanced database administrators using or planning to use PostgreSQL. Portions will also interest systems administrators looking to build or monitor a PostgreSQL installation, as well as developers interested in advanced database internals that impact application design.
Windows Malware Analysis Essentials
¥90.46
Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set About This Book Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware Understand how to decipher x86 assembly code from source code inside your favourite development environment A step-by-step based guide that reveals malware analysis from an industry insider and demystifies the process Who This Book Is For This book is best for someone who has prior experience with reverse engineering Windows executables and wants to specialize in malware analysis. The book presents the malware analysis thought process using a show-and-tell approach, and the examples included will give any analyst confidence in how to approach this task on their own the next time around. What You Will Learn Use the positional number system for clear conception of Boolean algebra, that applies to malware research purposes Get introduced to static and dynamic analysis methodologies and build your own malware lab Analyse destructive malware samples from the real world (ITW) from fingerprinting and static/dynamic analysis to the final debrief Understand different modes of linking and how to compile your own libraries from assembly code and integrate the codein your final program Get to know about the various emulators, debuggers and their features, and sandboxes and set them up effectively depending on the required scenario Deal with other malware vectors such as pdf and MS-Office based malware as well as *s and shellcode In Detail Windows OS is the most used operating system in the world and hence is targeted by malware writers. There are strong ramifications if things go awry. Things will go wrong if they can, and hence we see a salvo of attacks that have continued to disrupt the normal scheme of things in our day to day lives. This book will guide you on how to use essential tools such as debuggers, disassemblers, and sandboxes to dissect malware samples. It will expose your innards and then build a report of their indicators of compromise along with detection rule sets that will enable you to help contain the outbreak when faced with such a situation. We will start with the basics of computing fundamentals such as number systems and Boolean algebra. Further, you'll learn about x86 assembly programming and its integration with high level languages such as C++.You'll understand how to decipher disassembly code obtained from the compiled source code and map it back to its original design goals. By delving into end to end analysis with real-world malware samples to solidify your understanding, you'll sharpen your technique of handling destructive malware binaries and vector mechanisms. You will also be encouraged to consider analysis lab safety measures so that there is no infection in the process. Finally, we'll have a rounded tour of various emulations, sandboxing, and debugging options so that you know what is at your disposal when you need a specific kind of weapon in order to nullify the malware. Style and approach An easy to follow, hands-on guide with de*ions and screenshots that will help you execute effective malicious software investigations and conjure up solutions creatively and confidently.
Oracle APEX Best Practices
¥90.46
In clearly written chapters you will be guided through different aspects of Oracle Application Express. Varying from setting up your environment to maximizing SQL and PL/SQL. Examples are given based on a simple but appealing case. This book is filled with best practices on how to make the most of Oracle APEX. Developers beginning with application development as well as those who are experienced will benefit from this book. You will need to have basic knowledge of SQL and PL/SQL to follow the examples in this book.
Sonar Code Quality Testing Essentials
¥90.46
This is a step-by-step tutorial enriched with practical examples and the necessary screenshots for easy and quick learning. This book is for you if you are a Java developer or a Team Manager familiar with Java and want to ensure the quality of your code using Sonar. You should have a background with Java and unit testing in general.
IBM Cognos Business Intelligence 10.1 Dashboarding cookbook
¥90.46
This book is written in the style of a cookbook, with emphasis on practical, step-by-step recipes augmented with real screenshots and little to no theory. This approach will help you follow each step, each link, and see the bigger picture,If you are a user with basic knowledge of Cognos BI (any version) and want to learn the advanced and latest dashboarding capabilities shipped with IBM Cognos BI, this book is for you.
HTML5 Graphics & Data Visualization Cookbook
¥90.46
This cookbook is organized in a linear, progressive way allowing it to be read from start to finish, as well as to be used as a useful resource for specific tasks. The HTML5 examples and recipes will have you making dynamic, interactive, and animated charts and graphs in no time. You don't need to have a background in HTML5 or Canvas but you do need to have a basic understanding of how HTML works and know how to code in any language (preferably in JavaScript). In this book we will not explain how to learn to code but how to create projects and how to plan and execute them in the process.
Marmalade SDK Mobile Game Development Essentials
¥90.46
A practical tutorial that's easy to follow with lots of tips, examples and diagrams, including a full game project that grows with each chapter,This book targets Professional and Indie game developers who want to develop games quickly and easily to run across a huge range of smartphones and tablets. You are expected to have some experience writing games using C++ on other platforms. Its aim is to show how to take your existing skills and apply them to writing games for mobile devices (including iOS and Android) by explaining the use of the Marmalade SDK,Familiarity with games and 3D graphics programming would be helpful. No knowledge of specific mobile SDKs such as iOS or Android is required.
XNA 4 3D Game Development by Example: Beginner's Guide
¥90.46
This book is a step-by-step tutorial that includes complete source code for all of the games covered. It adopts an engaging style to teach all the game development concepts. Each block of code is explained, and game development concepts are diagrammed and covered in detail. Each game begins with a concept de*ion and concludes with suggestions for expanding on the finished game. This book is intended for readers who want to create 3D games using the XNA Framework. Basic knowledge of the C# programming language and 2D XNA concepts are helpful, but not required.
HBase Administration Cookbook
¥90.46
As part of Packt’s cookbook series, each recipe offers a practical, step-by-step solution to common problems found in HBase administration. This book is for HBase administrators, developers, and will even help Hadoop administrators. You are not required to have HBase experience, but are expected to have a basic understanding of Hadoop and MapReduce.
MVVM Survival Guide for Enterprise Architectures in Silverlight and WPF
¥90.46
This book combines practical, real-world examples with all the background material and theory you need The concepts are explained with a practical LOB enterprise application that is gradually built through the course of this book. MVVM offers lots of design choices and the author shows examples of each of these approaches, by changing the code to achieve the same results. This book will be a valuable resource for Silverlight and WPF developers who want to fully maximize the tools with recommended best practices for enterprise development. This is an advanced book and you will need to be familiar with C#, the .Net framework, and Silverlight or WPF.
Blackboard Essentials for Teachers
¥90.46
This book develops a sample site with lots of step-by-step instructions and screenshots to get you up and running in no time at all. If you are a teacher or course builder, you need only basic computer skills to get the most from this book. You don’t need any background in online teaching or building Web pages.
Microsoft XNA 4.0 Game Development Cookbook
¥90.46
“Microsoft XNA 4.0 Game Development Cookbook” is a fast-paced cookbook for taking your knowledge of the framework further with advanced game development tasks. Packed with step-by-step instructions and screenshots, the book will solve an experienced developer’s everyday coding problems. If you are an XNA developer who has already successfully mastered simple 2D and 3D XNA tasks, dive into “Microsoft XNA 4.0 Game Development Cookbook” for something more challenging. You should be comfortable with the basics of the XNA framework, and have experience with C#.
Linux Shell Scripting Essentials
¥90.46
Learn shell *ing to solve complex shell-related problems and to efficiently automate your day-to-day tasks About This Book Familiarize yourself with the terminal by learning about powerful shell features Automate tasks by writing shell *s for repetitive work Packed with easy-to-follow, hands-on examples to help you write any type of shell * with confidence Who This Book Is For This book is aimed at administrators and those who have a basic knowledge of shell *ing and who want to learn how to get the most out of writing shell *s. What You Will Learn Write effective shell *s easily Perform search operations and manipulate large text data with a single shell command Modularize reusable shell *s by creating shell libraries Redirect input, output, and errors of a command or * execution to other streams Debug code with different shell debugging techniques to make your *s bug-free Manage processes, along with the environment variables needed to execute them properly Execute and embed other languages in your *s Manage creation, deletion, and search operations in files In Detail Shell *ing is a quick method to prototype complex applications or problems. Shell *s are a collection of commands to automate tasks, usually those for which the user has a repeated need, when working on Linux-based systems. Using simple commands or a combination of them in a shell can solve complex problems easily. This book starts with the basics, including essential commands that can be executed on Linux systems to perform tasks within a few nanoseconds. You’ll learn to use outputs from commands and transform them to show the data you require. Discover how to write shell *s easily, execute * files, debug, and handle errors. Next, you’ll explore environment variables in shell programming and learn how to customize them and add a new environment. Finally, the book walks you through processes and how these interact with your shell *s, along with how to use *s to automate tasks and how to embed other languages and execute them. Style and approach This book is a pragmatic guide to writing efficient shell programs, complete with hands-on examples and tips.
Web Penetration Testing with Kali Linux - Second Edition
¥90.46
Build your defense against web attacks with Kali Linux 2.0 About This Book Gain a deep understanding of the flaws in web applications and exploit them in a practical manner Get hands-on web application hacking experience with a range of tools in Kali Linux 2.0 Develop the practical skills required to master multiple tools in the Kali Linux 2.0 toolkit Who This Book Is For If you are already working as a network penetration tester and want to expand your knowledge of web application hacking, then this book tailored for you. Those who are interested in learning more about the Kali Sana tools that are used to test web applications will find this book a thoroughly useful and interesting guide. What You Will Learn Set up your lab with Kali Linux 2.0 Identify the difference between hacking a web application and network hacking Understand the different techniques used to identify the flavor of web applications Expose vulnerabilities present in web servers and their applications using server-side attacks Use SQL and cross-site *ing (XSS) attacks Check for XSS flaws using the burp suite proxy Find out about the mitigation techniques used to negate the effects of the Injection and Blind SQL attacks In Detail Kali Linux 2.0 is the new generation of the industry-leading BackTrack Linux penetration testing and security auditing Linux distribution. It contains several hundred tools aimed at various information security tasks such as penetration testing, forensics, and reverse engineering. At the beginning of the book, you will be introduced to the concepts of hacking and penetration testing and will get to know about the tools used in Kali Linux 2.0 that relate to web application hacking. Then, you will gain a deep understanding of SQL and command injection flaws and ways to exploit the flaws. Moving on, you will get to know more about *ing and input validation flaws, AJAX, and the security issues related to AJAX. At the end of the book, you will use an automated technique called fuzzing to be able to identify flaws in a web application. Finally, you will understand the web application vulnerabilities and the ways in which they can be exploited using the tools in Kali Linux 2.0. Style and approach This step-by-step guide covers each topic with detailed practical examples. Every concept is explained with the help of illustrations using the tools available in Kali Linux 2.0.
Odoo 11 Development Cookbook - Second Edition
¥90.46
Create fast and efficient server-side applications using the latest features of Odoo v11 About This Book ? Get the most up-to-date guide on Odoo 11 to create custom and reusable modules ? Interconnect your application with other systems by implementing web APIs ? Understand the mechanisms powering the Odoo framework to build robust enterprises Who This Book Is For If you're a Python developer and want to develop highly efficient business applications with the latest Odoo framework (or if you just want a hands on problem solution book for all your Odoo Development related issues), this book is for you! Some experience with the JavaScript programming language and web development is required to get the most out of this book. What You Will Learn ? Install and manage Odoo environments and instances ? Use models to define your application's data structures ? Add business logic to your applications ? Add automated tests and learn how to debug Odoo apps ? Learn about the access security model and internationalization features ? Customize websites built with Odoo, by writing your own templates and providing new snippets for use in the website builder ? Extend the web client with new widgets and make RPC calls to the server In Detail Odoo is a full-featured open source ERP with a focus on extensibility. The flexibility and sustainability of open source are also a key selling point of Odoo. It is built on a powerful framework for rapid application development, both for back-end applications and front-end websites. Version 11 offers better usability and speed: a new design (as compared to the current Odoo Enterprise version) and a mobile interface. The book starts by covering Odoo installation and administration and Odoo Server deployment. It then delves into the implementation of Odoo modules, the different inheritance models available in Odoo. You will then learn how to define access rules for your data; how to make your application available in different languages; how to expose your data models to end users on the back end and on the front end; and how to create beautiful PDF versions of your data. By the end of the book, you will have a thorough knowledge of Odoo and will be able to build effective applications by applying Odoo development best practices Style and Approach This recipe-based practical guide presents each topic with step-by-step instructions on how you can create fast and efficient server-side applications using the latest features of Odoo v11
MySQL 8 Cookbook
¥90.46
Design and administer enterprise-grade MySQL 8 solutions About This Book ? Store, retrieve, and manipulate your data using the latest MySQL 8 features ? Practical recipes on effective administration in MySQL, with a focus on security, performance tuning, troubleshooting, and more ? Contains tips, tricks, and best practices for designing, developing, and administering your MySQL 8 database solution without any hassle Who This Book Is For If you are a MySQL developer or administrator looking for quick, handy solutions to solve the most common and not-so-common problems in MySQL, this book is for you. MySQL DBAs looking to get up-to-speed with the latest MySQL 8 development and administration features will also find this book very useful. Prior knowledge of Linux and RDBMS is desirable. What You Will Learn ? Install and configure your MySQL 8 instance without any hassle ? Get to grips with new features of MySQL 8 like CTE, Window functions and many more ? Perform backup tasks, recover data and set up various replication topologies for your database ? Maximize performance by using new features of MySQL 8 like descending indexes, controlling query optimizer and resource groups ? Learn how to use general table space to suit the SaaS or multi-tenant applications ? Analyze slow queries using performance schema, sys schema and third party tools ? Manage and monitor your MySQL instance and implement efficient performance-tuning tasks In Detail MySQL is one of the most popular and widely used relational databases in the World today. The recently released MySQL 8 version promises to be better and more efficient than ever before. This book contains everything you need to know to be the go-to person in your organization when it comes to MySQL. Starting with a quick installation and configuration of your MySQL instance, the book quickly jumps into the querying aspects of MySQL. It shows you the newest improvements in MySQL 8 and gives you hands-on experience in managing high-transaction and real-time datasets. If you've already worked with MySQL before and are looking to migrate your application to MySQL 8, this book will also show you how to do that. The book also contains recipes on efficient MySQL administration, with tips on effective user management, data recovery, security, database monitoring, performance tuning, troubleshooting, and more. With quick solutions to common and not-so-common problems you might encounter while working with MySQL 8, the book contains practical tips and tricks to give you the edge over others in designing, developing, and administering your database effectively. Style and approach This book takes a recipe-based approach to tackling the pain points of SQL developers. It is a comprehensive book full of solutions to common problems faced by SQL administrators and developers alike.
Java EE 8 High Performance
¥90.46
Get more control of your applications performances in development and production and know how to meet your Service Level Agreement on critical microservices. About This Book ? Learn how to write a JavaEE application with performance constraints (Service Level Agreement—SLA) leveraging the platform ? Learn how to identify bottlenecks and hotspots in your application to fix them ? Ensure that you are able to continuously control your performance in production and during development Who This Book Is For If you're a Java developer looking to improve the performance of your code or simply wanting to take your skills up to the next level, then this book is perfect for you. What You Will Learn ? Identify performance bottlenecks in an application ? Locate application hotspots using performance tools ? Understand the work done under the hood by EE containers and its impact on performance ? Identify common patterns to integrate with Java EE applications ? Implement transparent caching on your applications ? Extract more information from your applications using Java EE without modifying existing code ? Ensure constant performance and eliminate regression In Detail The ease with which we write applications has been increasing, but with this comes the need to address their performance. A balancing act between easily implementing complex applications and keeping their performance optimal is a present-day need. In this book, we explore how to achieve this crucial balance while developing and deploying applications with Java EE 8. The book starts by analyzing various Java EE specifications to identify those potentially affecting performance adversely. Then, we move on to monitoring techniques that enable us to identify performance bottlenecks and optimize performance metrics. Next, we look at techniques that help us achieve high performance: memory optimization, concurrency, multi-threading, scaling, and caching. We also look at fault tolerance solutions and the importance of logging. Lastly, you will learn to benchmark your application and also implement solutions for continuous performance evaluation. By the end of the book, you will have gained insights into various techniques and solutions that will help create high-performance applications in the Java EE 8 environment. Style and approach This book will cover vital concepts implemented through a sample application built throughout the book. This will enable you to apply these concepts to suit your software requirements.
Computer Vision with OpenCV 3 and Qt5
¥90.46
Blend the power of Qt with OpenCV to build cross-platform computer vision applications About This Book ? Start creating robust applications with the power of OpenCV and Qt combined ? Learn from scratch how to develop cross-platform computer vision applications ? Accentuate your OpenCV applications by developing them with Qt Who This Book Is For This book is for readers interested in building computer vision applications. Intermediate knowledge of C++ programming is expected. Even though no knowledge of Qt5 and OpenCV 3 is assumed, if you’re familiar with these frameworks, you’ll benefit. What You Will Learn ? Get an introduction to Qt IDE and SDK ? Be introduced to OpenCV and see how to communicate between OpenCV and Qt ? Understand how to create UI using Qt Widgets ? Know to develop cross-platform applications using OpenCV 3 and Qt 5 ? Explore the multithreaded application development features of Qt5 ? Improve OpenCV 3 application development using Qt5 ? Build, test, and deploy Qt and OpenCV apps, either dynamically or statically ? See Computer Vision technologies such as filtering and transformation of images, detecting and matching objects, template matching, object tracking, video and motion analysis, and much more ? Be introduced to QML and Qt Quick for iOS and Android application development In Detail Developers have been using OpenCV library to develop computer vision applications for a long time. However, they now need a more effective tool to get the job done and in a much better and modern way. Qt is one of the major frameworks available for this task at the moment. This book will teach you to develop applications with the combination of OpenCV 3 and Qt5. This book will teach you to create cross-platform computer vision applications. We’ll begin by introducing Qt, its IDE, and its SDK. Next you’ll learn how to use the OpenCV API to integrate both tools, and see how to configure Qt to use OpenCV. You’ll go on to build a full-fledged computer vision application throughout the book. Later, you’ll create a stunning UI application using the Qt widgets technology, where you’ll display the images after they are processed in an efficient way. At the end of the book, you’ll learn how to convert OpenCV Mat to Qt QImage. You’ll also see how to efficiently process images to filter them, transform them, detect or track objects as well as analyze video. You’ll become better at developing OpenCV applications. Style and approach This book will help you understand and create cross-platform and multithreaded computer vision applications with the help of OpenCV 3 and Qt5, using a plugin-based and modular application development approach.
Practical Test-Driven Development using C# 7
¥90.46
Develop applications for the real world with a thorough software testing approach About This Book ? Develop a thorough understanding of TDD and how it can help you develop simpler applications with no defects using C# and JavaScript ? Adapt to the mindset of writing tests before code by incorporating business goals, code manageability, and other factors ? Make all your software units and modules pass tests by analyzing failed tests and refactoring code as and when required Who This Book Is For This book is for software developers with a basic knowledge of Test Driven Development (TDD) who want a thorough understanding of how TDD can benefit them and the applications they produce. The examples in this book are in C#, and you will need a basic understanding of C# to work through these examples. What You Will Learn ? The core concepts of TDD ? Testing in action with a real-world case study in C# and JavaScript using React ? Writing proper Unit Tests and testable code for your application ? Using different types of test double such as stubs, spies, and mocks ? Growing an application guided by tests ? Exploring new developments on a green-field application ? Mitigating the problems associated with writing tests for legacy applications ? Modifying a legacy application to make it testable In Detail Test-Driven Development (TDD) is a methodology that helps you to write as little as code as possible to satisfy software requirements, and ensures that what you've written does what it's supposed to do. If you're looking for a practical resource on Test-Driven Development this is the book for you. You've found a practical end-to-end guide that will help you implement Test-Driven Techniques for your software development projects. You will learn from industry standard patterns and practices, and shift from a conventional approach to a modern and efficient software testing approach in C# and JavaScript. This book starts with the basics of TDD and the components of a simple unit test. Then we look at setting up the testing framework so that you can easily run your tests in your development environment. You will then see the importance of defining and testing boundaries, abstracting away third-party code (including the .NET Framework), and working with different types of test double such as spies, mocks, and fakes. Moving on, you will learn how to think like a TDD developer when it comes to application development. Next, you'll focus on writing tests for new/changing requirements and covering newly discovered bugs, along with how to test JavaScript applications and perform integration testing. You’ll also learn how to identify code that is inherently un-testable, and identify some of the major problems with legacy applications that weren’t written with testability in mind. By the end of the book, you’ll have all the TDD skills you'll need and you’ll be able to re-enter the world as a TDD expert! Style and approach A practical step-by-step approach with real-world case studies.
Functional Kotlin
¥90.46
Learn how to apply Functional Programming with Kotlin to real-life projects with popular libraries like Arrow. About This Book ? Focus on the functional aspects of Kotlin and identify the advantages that functional programming brings to the table and the associated coding benefits, ? Implement common functional programming design patterns and techniques. ? Learn to combine OOP and Reactive Programming with Functional Programming and how RxKotlin and funkTionale can help you implementing Functional Programming in Kotlin Who This Book Is For Kotlin developers who have no functional programming experience, will benefit from this book. What You Will Learn ? Learn the Concepts of Functional Programming with Kotlin ? Discover the Coroutines in Kotlin ? Uncover Using funkTionale plugin ? Learn Monads, Functiors and Applicatives ? Combine Functional Programming with OOP and Reactive Programming ? Uncover Using Monads with funkTionale ? Discover Stream Processing In Detail Functional programming makes your application faster, improves performance, and increases your productivity. Kotlin supports many of the popular and advanced functional features of functional languages. This book will cover the A-Z of functional programming in Kotlin. This book bridges the language gap for Kotlin developers by showing you how to create and consume functional constructs in Kotlin. We also bridge the domain gap by showing how functional constructs can be applied in business scenarios. We’ll take you through lambdas, pattern matching, immutability, and help you develop a deep understanding of the concepts and practices of functional programming. If you want learn to address problems using Recursion, Koltin has support for it as well. You’ll also learn how to use the funKtionale library to perform currying and lazy programming and more. Finally, you’ll learn functional design patterns and techniques that will make you a better programmer.By the end of the book, you will be more confident in your functional programming skills and will be able to apply them while programming in Kotlin. Style and approach Loaded with numerous code examples and real life projects, this book helps you dive deep into Functional Programming with Kotlin as well as applying it with help of Functional Programming Plugins like funkTionale and RxKotlin.
Web Penetration Testing with Kali Linux - Third Edition
¥90.46
Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holes About This Book ? Know how to set up your lab with Kali Linux ? Discover the core concepts of web penetration testing ? Get the tools and techniques you need with Kali Linux Who This Book Is For Since this book sets out to cover a large number of tools and security fields, it can work as an introduction to practical security skills for beginners in security. In addition, web programmers and also system administrators would benefit from this rigorous introduction to web penetration testing. Basic system administration skills are necessary, and the ability to read code is a must. What You Will Learn ? Learn how to set up your lab with Kali Linux ? Understand the core concepts of web penetration testing ? Get to know the tools and techniques you need to use with Kali Linux ? Identify the difference between hacking a web application and network hacking ? Expose vulnerabilities present in web servers and their applications using server-side attacks ? Understand the different techniques used to identify the flavor of web applications ? See standard attacks such as exploiting cross-site request forgery and cross-site *ing flaws ? Get an overview of the art of client-side attacks ? Explore automated attacks such as fuzzing web applications In Detail Web Penetration Testing with Kali Linux - Third Edition shows you how to set up a lab, helps you understand the nature and mechanics of attacking websites, and explains classical attacks in great depth. This edition is heavily updated for the latest Kali Linux changes and the most recent attacks. Kali Linux shines when it comes to client-side attacks and fuzzing in particular. From the start of the book, you'll be given a thorough grounding in the concepts of hacking and penetration testing, and you'll see the tools used in Kali Linux that relate to web application hacking. You'll gain a deep understanding of classicalSQL, command-injection flaws, and the many ways to exploit these flaws. Web penetration testing also needs a general overview of client-side attacks, which is rounded out by a long discussion of *ing and input validation flaws. There is also an important chapter on cryptographic implementation flaws, where we discuss the most recent problems with cryptographic layers in the networking stack. The importance of these attacks cannot be overstated, and defending against them is relevant to most internet users and, of course, penetration testers. At the end of the book, you'll use an automated technique called fuzzing to identify flaws in a web application. Finally, you'll gain an understanding of web application vulnerabilities and the ways they can be exploited using the tools in Kali Linux. Style and approach This step-by-step guide covers each topic with detailed practical examples. Every concept is explained with the help of illustrations using the tools available in Kali Linux.

购物车
个人中心

