万本电子书0元读

万本电子书0元读

Mastering Machine Learning with R - Second Edition
Mastering Machine Learning with R - Second Edition
Cory Lesmeister
¥90.46
This book will teach you advanced techniques in machine learning with the latest code in R 3.3.2. You will delve into statistical learning theory and supervised learning; design efficient algorithms; learn about creating Recommendation Engines; use multi-class classification and deep learning; and more. You will explore, in depth, topics such as data mining, classification, clustering, regression, predictive modeling, anomaly detection, boosted trees with XGBOOST, and more. More than just knowing the outcome, you'll understand how these concepts work and what they do. With a slow learning curve on topics such as neural networks, you will explore deep learning, and more. By the end of this book, you will be able to perform machine learning with R in the cloud using AWS in various scenarios with different datasets. What you will learn ?Gain deep insights into the application of machine learning tools in the industry ?Manipulate data in R efficiently to prepare it for analysis ?Master the skill of recognizing techniques for effective visualization of data ?Understand why and how to create test and training data sets for analysis ?Master fundamental learning methods such as linear and logistic regression ?Comprehend advanced learning methods such as support vector
Effective Amazon Machine Learning
Effective Amazon Machine Learning
Alexis Perrier
¥90.46
Predictive analytics is a complex domain requiring coding skills, an understanding of the mathematical concepts underpinning machine learning algorithms, and the ability to create compelling data visualizations. Following AWS simplifying Machine learning, this book will help you bring predictive analytics projects to fruition in three easy steps: data preparation, model tuning, and model selection. This book will introduce you to the Amazon Machine Learning platform and will implement core data science concepts such as classification, regression, regularization, overfitting, model selection, and evaluation. Furthermore, you will learn to leverage the Amazon Web Service (AWS) ecosystem for extended access to data sources, implement realtime predictions, and run Amazon Machine Learning projects via the command line and the Python SDK. Towards the end of the book, you will also learn how to apply these services to other problems, such as text mining, and to more complex datasets. What you will learn ?Learn how to use the Amazon Machine Learning service from scratch for predictive analytics ?Gain hands-on experience of key Data Science concepts ?Solve classic regression and classification problems ?Run projects programmatically via the command line and the Python SDK
Enterprise Application Architecture with .NET Core
Enterprise Application Architecture with .NET Core
Ganesan Senthilvel
¥90.46
If you want to design and develop enterprise applications using .NET Core as the development framework and learn about industry-wide best practices and guidelines, then this book is for you. The book starts with a brief introduction to enterprise architecture, which will help you to understand what enterprise architecture is and what the key components are. It will then teach you about the types of patterns and the principles of software development, and explain the various aspects of distributed computing to keep your applications effective and scalable. These chapters act as a catalyst to start the practical implementation, and design and develop applications using different architectural approaches, such as layered architecture, service oriented architecture, microservices and cloud-specific solutions. Gradually, you will learn about the different approaches and models of the Security framework and explore various authentication models and authorization techniques, such as social media-based authentication and safe storage using app secrets. By the end of the book, you will get to know the concepts and usage of the emerging fields, such as DevOps, BigData, architectural practices, and Artificial Intelligence.
Software Architecture with Python
Software Architecture with Python
Anand Balachandran Pillai
¥90.46
"Key Features ?Identify design issues and make the necessary adjustments to achieve improved performance ?Understand practical architectural quality attributes from the perspective of a practicing engineer and architect using Python ?Gain knowledge of architectural principles and how they can be used to provide accountability and rationale for architectural decisions Book De*ion This book starts off by explaining how Python fits into an application architecture. As you move along, you will understand the architecturally significant demands and how to determine them. Later, you'll get a complete understanding of the different architectural quality requirements that help an architect to build a product that satisfies business needs, such as maintainability/reusability, testability, scalability, performance, usability, and security. You will use various techniques such as incorporating DevOps, Continuous Integration, and more to make your application robust. You will understand when and when not to use object orientation in your applications. You will be able to think of the future and design applications that can scale proportionally to the growing business. The focus is on building the business logic based on the business process documentation and which frameworks are to be used when. We also cover some important patterns that are to be taken into account while solving design problems as well as those in relatively new domains such as the Cloud. This book will help you understand the ins and outs of Python so that you can make those critical design decisions that not just live up to but also surpass the expectations of your clients. What you will learn ?Build programs with the right architectural attributes ?Use Enterprise Architectural Patterns to solve scalable problems on the Web ?Understand design patterns from a Python perspective ?Optimize the performance testing tools in Python ?Deploy code in remote environments or on the Cloud using Python ?Secure architecture applications in Python About the Author Anand Balachandran Pillai is an Engineering and Technology professional with over 18 years of experience in the software industry in Product Engineering, Software Design & Architecture and Research. He has a Bachelor's degree in Mechanical Engineering from the Indian Institute of Technology, Madras. He has worked at companies such as Yahoo!, McAfee, and Infosys in the roles of Lead Engineer and Architect in product development teams, to build new products. His interests lie in Software Performance Engineering, High Scalability Architectures, Security and Open source communities. He often works with startups in lead technical or consulting role. He is the founder of the Bangalore Python Users Group and a Fellow of the Python Software Foundation (PSF). Anand is currently working as Senior Architect of Yegii Inc. "
Cracking the IT Architect Interview
Cracking the IT Architect Interview
Sameer Paradkar
¥90.46
The ultimate guide to successful interviews for Enterprise, Business, Domain, Solution, and Technical Architect roles as well as IT Advisory Consultant and Software Designer roles About This Book Learn about Enterprise Architects IT strategy and NFR – this book provides you with methodologies, best practices, and frameworks to ace your interview A holistic view of key architectural skills and competencies with 500+ questions that cover 12 domains 100+ diagrams depicting scenarios, models, and methodologies designed to help you prepare for your interview Who This Book Is For This book is for aspiring enterprise, business, domain, solution, and technical architects. It is also ideal for IT advisory consultants and IT designers who wish to interview for such a role. Interviewers will be able leverage this book to make sure they hire candidates with the right competencies to meet the role requirements. What You Will Learn Learn about IT strategies, NFR, methodologies, best practices, and frameworks to ace your interview Get a holistic view of key concepts, design principles, and patterns related to evangelizing web and Java enterprise applications Discover interview preparation guidelines through case studies Use this as a reference guide for adopting best practices, standards, and design guidelines Get a better understanding with 60+ diagrams depicting various scenarios, models, and methodologies Benefit from coverage of all architecture domains including EA (Business, Data, Infrastructure, and Application), SA, integration, NFRs, security, and SOA, with extended coverage from IT strategies to the NFR domain In Detail An architect attends multiple interviews for jobs or projects during the course of his or her career. This book is an interview resource created for designers, consultants, technical, solution, domain, enterprise, and chief architects to help them perform well in interview discussions and launch a successful career. The book begins by providing de*ions of architecture skills and competencies that cover the 12 key domains, including 350+ questions relating to these domains. The goal of this book is to cover all the core architectural domains. From an architect’s perspective, it is impossible to revise or learn about all these key areas without a good reference guide – this book is the solution. It shares experiences, learning, insights, and proven methodologies that will benefit practitioners, SMEs, and aspirants in the long run. This book will help you tackle the NFR domain, which is a key aspect pertaining to architecting applications. It typically takes years to understand the core concepts, fundamentals, patterns, and principles related to architecture and designs. This book is a goldmine for the typical questions asked during an interview and will help prepare you for success! Style and approach This book will help you prepare for interviews for architectural profiles by providing likely questions, explanations, and expected answers. It is an insight-rich guide that will help you develop strategic, tactical, and operational thinking for your interview.
Kali Linux 2: Windows Penetration Testing
Kali Linux 2: Windows Penetration Testing
Wolf Halton,Bo Weaver
¥90.46
Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers About This Book Conduct network testing, surveillance, pen testing and forensics on MS Windows using Kali Linux Footprint, monitor, and audit your network and investigate any ongoing infestations Customize Kali Linux with this professional guide so it becomes your pen testing toolkit Who This Book Is For If you are a working ethical hacker who is looking to expand the offensive skillset with a thorough understanding of Kali Linux, then this is the book for you. Prior knowledge about Linux operating systems and the BASH terminal emulator along with Windows desktop and command line would be highly beneficial. What You Will Learn Set up Kali Linux for pen testing Map and enumerate your Windows network Exploit several common Windows network vulnerabilities Attack and defeat password schemes on Windows Debug and reverse-engineer Windows programs Recover lost files, investigate successful hacks and discover hidden data in innocent-looking files Catch and hold admin rights on the network, and maintain backdoors on the network after your initial testing is done In Detail Microsoft Windows is one of the two most common OS and managing its security has spawned the discipline of IT security. Kali Linux is the premier platform for testing and maintaining Windows security. Kali is built on the Debian distribution of Linux and shares the legendary stability of that OS. This lets you focus on using the network penetration, password cracking, forensics tools and not the OS. This book has the most advanced tools and techniques to reproduce the methods used by sophisticated hackers to make you an expert in Kali Linux penetration testing. First, you are introduced to Kali's top ten tools and other useful reporting tools. Then, you will find your way around your target network and determine known vulnerabilities to be able to exploit a system remotely. Next, you will prove that the vulnerabilities you have found are real and exploitable. You will learn to use tools in seven categories of exploitation tools. Further, you perform web access exploits using tools like websploit and more. Security is only as strong as the weakest link in the chain. Passwords are often that weak link. Thus, you learn about password attacks that can be used in concert with other approaches to break into and own a network. Moreover, you come to terms with network sniffing, which helps you understand which users are using services you can exploit, and IP spoofing, which can be used to poison a system's DNS cache. Once you gain access to a machine or network, maintaining access is important. Thus, you not only learn penetrating in the machine you also learn Windows privilege’s escalations. With easy to follow step-by-step instructions and support images, you will be able to quickly pen test your system and network. Style and approach This book is a hands-on guide for Kali Linux pen testing. This book will provide all the practical knowledge needed to test your network's security using a proven hacker's methodology. The book uses easy-to-understand yet professional language for explaining concepts.
Practical Windows Forensics
Practical Windows Forensics
Ayman Shaaban,Konstantin Sapronov
¥90.46
Leverage the power of digital forensics for Windows systems About This Book Build your own lab environment to analyze forensic data and practice techniques. This book offers meticulous coverage with an example-driven approach and helps you build the key skills of performing forensics on Windows-based systems using digital artifacts. It uses specific open source and Linux-based tools so you can become proficient at analyzing forensic data and upgrade your existing knowledge. Who This Book Is For This book targets forensic analysts and professionals who would like to develop skills in digital forensic analysis for the Windows platform. You will acquire proficiency, knowledge, and core skills to undertake forensic analysis of digital data. Prior experience of information security and forensic analysis would be helpful. You will gain knowledge and an understanding of performing forensic analysis with tools especially built for the Windows platform. What You Will Learn Perform live analysis on victim or suspect Windows systems locally or remotely Understand the different natures and acquisition techniques of volatile and non-volatile data. Create a timeline of all the system actions to restore the history of an incident. Recover and analyze data from FAT and NTFS file systems. Make use of various tools to perform registry analysis. Track a system user's browser and e-mail activities to prove or refute some hypotheses. Get to know how to dump and analyze computer memory. In Detail Over the last few years, the wave of the cybercrime has risen rapidly. We have witnessed many major attacks on the governmental, military, financial, and media sectors. Tracking all these attacks and crimes requires a deep understanding of operating system operations, how to extract evident data from digital evidence, and the best usage of the digital forensic tools and techniques. Regardless of your level of experience in the field of information security in general, this book will fully introduce you to digital forensics. It will provide you with the knowledge needed to assemble different types of evidence effectively, and walk you through the various stages of the analysis process. We start by discussing the principles of the digital forensics process and move on to show you the approaches that are used to conduct analysis. We will then study various tools to perform live analysis, and go through different techniques to analyze volatile and non-volatile data. Style and approach This is a step-by-step guide that delivers knowledge about different Windows artifacts. Each topic is explained sequentially, including artifact analysis using different tools and techniques. These techniques make use of the evidence extracted from infected machines, and are accompanied by real-life examples.
3D Game Design with Unreal Engine 4 and Blender
3D Game Design with Unreal Engine 4 and Blender
Justin Plowman
¥90.46
Combine the powerful UE4 with Blender to create visually appealing and comprehensive game environments About This Book The only resource that shows how you can incorporate Blender into your Unreal Engine 4 Game environment Create amazing 3D game environments by leveraging the power of Blender and Unreal Engine 4 Practical step-by-step approach with plenty of illustrative examples to get you started immediately Who This Book Is For This book would be ideal for 3D artists and game designers who want to create amazing 3D game environments and leverage the power of Blender with Unreal Engine 4. 3D design basics would be necessary to get the most out of this book. Some previous experience with Blender would be helpful but not essential What You Will Learn Create a fully functioning game level of your own design using Blender and Unreal Engine 4 Customize your level with detailed 3D assets created with Blender Import assets into Unreal Engine 4 to create an amazing finished product Build a detailed dynamic environment with goals and an ending Explore Blender’s incredible animation tools to animate elements of your game Create great environments using sound effects, particle effects, and class blueprints In Detail Unreal Engine 4 now has support for Blender, which was not available in earlier versions. This has opened up new possibilities and that is where this book comes in. This is the first book in the market combining these two powerful game and graphic engines. Readers will build an amazing high-level game environment with UE4 and will show them how to use the power of Blender 3D to create stunning animations and 3D effects for their game. This book will start with creating levels, 3D assets for the game, game progression, light and environment control, animation, and so on. Then it will teach readers to add amazing visual effects to their game by applying rendering, lighting, rigging, and compositing techniques in Blender. Finally, readers will learn how to smoothly transfer blender files to UE4 and animate the game assets. Each chapter will add complexities to the game environment. Style and approach This will have a clear, step-by-step approach to creating game assets in Blender and then importing them to UE4 to create stunning game environments. All asset creation techniques are explained in detail along with tips on how to use them to create your own game environments. The book offers end-to-end coverage of how to design a game level from scratch.
Mastering Unreal Engine 4.X
Mastering Unreal Engine 4.X
Muhammad A.Moniem
¥90.46
Take your game development skills to the next level with one of the best engines on the market About This Book Build an entire AAA game level throughout the book Take your C++ *ing skills to the next level and use them extensively to build the game An advanced practical guide with a tutorial style approach that will help you make the best of Unreal engine 4 Who This Book Is For This book is for game developers who have a basic knowledge of Unreal Engine and C++ *ing knowledge. If you want to take the leap from a casual game developer to a full-fledged professional game developer with Unreal Engine 4, this is the book for you. What You Will Learn Script your player controls in C++ Build a superb and engaging level with advanced design techniques Program AI with C++ Use Cascade to add life to your games Use custom shaders and advanced shading techniques to make things pretty Implement an awesome UI in the game Control gameplay using data tables In Detail Unreal Engine 4 has garnered a lot of attention in the gaming world because of its new and improved graphics and rendering engine, the physics simulator, particle generator, and more. This book is the ideal guide to help you leverage all these features to create state-of-the-art games that capture the eye of your audience. Inside we’ll explain advanced shaders and effects techniques and how you can implement them in your games. You’ll create custom lighting effects, use the physics simulator to add that extra edge to your games, and create customized game environments that look visually stunning using the rendering technique. You’ll find out how to use the new rendering engine efficiently, add amazing post-processing effects, and use data tables to create data-driven gameplay that is engaging and exciting. By the end of this book, you will be able to create professional games with stunning graphics using Unreal Engine 4! Style and approach An advanced guide that will take you to the next level of developing games with Unreal engine with illustrative examples that will make you confident of creating customized professional level games on your won.
Mastering ArcGIS Enterprise Administration
Mastering ArcGIS Enterprise Administration
Chad Cooper
¥90.46
Learn how to confidently install, configure, secure, and fully utilize your ArcGIS Enterprise system. About This Book ? Install and configure the components of ArcGIS Enterprise to meet your organization's requirements ? Administer all aspects of ArcGIS Enterprise through user interfaces and APIs ? Optimize and Secure ArcGIS Enterprise to make it run efficiently and effectively Who This Book Is For This book will be geared toward senior GIS analysts, GIS managers, GIS administrators, DBAs, GIS architects, and GIS engineers that need to install, configure, and administer ArcGIS Enterprise 10.5.1. What You Will Learn ? Effectively install and configure ArcGIS Enterprise, including the Enterprise geodatabase, ArcGIS Server, and Portal for ArcGIS ? Incorporate different methodologies to manage and publish services ? Utilize the security methods available in ArcGIS Enterprise ? Use Python and Python libraries from Esri to automate administrative tasks ? Identify the common pitfalls and errors to get your system back up and running quickly from an outage In Detail ArcGIS Enterprise, the next evolution of the ArcGIS Server product line, is a full-featured mapping and analytics platform. It includes a powerful GIS web services server and a dedicated Web GIS infrastructure for organizing and sharing your work. You will learn how to first install ArcGIS Enterprise to then plan, design, and finally publish and consume GIS services. You will install and configure an Enterprise geodatabase and learn how to administer ArcGIS Server, Portal, and Data Store through user interfaces, the REST API, and Python *s. This book starts off by explaining how ArcGIS Enterprise 10.5.1 is different from earlier versions of ArcGIS Server and covers the installation of all the components required for ArcGIS Enterprise. We then move on to geodatabase administration and content publication, where you will learn how to use ArcGIS Server Manager to view the server logs, stop and start services, publish services, define users and roles for security, and perform other administrative tasks. You will also learn how to apply security mechanisms on ArcGIS Enterprise and safely expose services to the public in a secure manner. Finally, you’ll use the RESTful administrator API to automate server management tasks using the Python *ing language. You’ll learn all the best practices and troubleshooting methods to streamline the management of all the interconnected parts of ArcGIS Enterprise. Style and approach The book takes a pragmatic approach, starting with installation & configuration of ArcGIS Enterprise to finally building a robust GIS web infrastructure for your organization.
Linux Shell Scripting Cookbook - Third Edition
Linux Shell Scripting Cookbook - Third Edition
Clif Flynt,Sarath Lakshman,Shantanu Tushar
¥90.46
Do amazing things with the shell About This Book ? Become an expert in creating powerful shell *s and explore the full possibilities of the shell ? Automate any administrative task you could imagine, with shell *s ? Packed with easy-to-follow recipes on new features on Linux, particularly, Debian-based, to help you accomplish even the most complex tasks with ease Who This Book Is For If you are a beginner or an intermediate Linux user who wants to master the skill of quickly writing *s and automate tasks without reading the entire man pages, then this book is for you. You can start writing *s and one-liners by simply looking at the relevant recipe and its de*ions without any working knowledge of shell *ing or Linux. Intermediate / advanced users, system administrators / developers, and programmers can use this book as a reference when they face problems while coding. What You Will Learn ? Interact with websites via *s ? Write shell *s to mine and process data from the Web ? Automate system backups and other repetitive tasks with crontab ? Create, compress, and encrypt archives of your critical data. ? Configure and monitor Ethernet and wireless networks ? Monitor and log network and system activity ? Tune your system for optimal performance ? Improve your system's security ? Identify resource hogs and network bottlenecks ? Extract audio from video files ? Create web photo albums ? Use git or fossil to manage revision control and interact with FOSS projects ? Create and maintain Linux containers and Virtual Machines ? Run a private Cloud server In Detail The shell is the most powerful tool your computer provides. Despite having it at their fingertips, many users are unaware of how much the shell can accomplish. Using the shell, you can generate databases and web pages from sets of files, automate monotonous admin tasks such as system backups, monitor your system's health and activity, identify network bottlenecks and system resource hogs, and more. This book will show you how to do all this and much more. This book, now in its third edition, describes the exciting new features in the newest Linux distributions to help you accomplish more than you imagine. It shows how to use simple commands to automate complex tasks, automate web interactions, download videos, set up containers and cloud servers, and even get free SSL certificates. Starting with the basics of the shell, you will learn simple commands and how to apply them to real-world issues. From there, you'll learn text processing, web interactions, network and system monitoring, and system tuning. Software engineers will learn how to examine system applications, how to use modern software management tools such as git and fossil for their own work, and how to submit patches to open-source projects. Finally, you'll learn how to set up Linux Containers and Virtual machines and even run your own Cloud server with a free SSL Certificate from letsencrypt.org. Style and approach This book will take you through useful real-world recipes designed to make your daily life easier when working with the shell.
DevOps with Kubernetes
DevOps with Kubernetes
Hideto Saito;Hui-Chuan Chloe Lee;Cheng-Yang Wu
¥90.46
Learn to implement DevOps using Docker & Kubernetes. About This Book ? Learning DevOps, container, and Kubernetes within one book. ? Leverage Kubernetes as a platform to deploy, scale, and run containers efficiently. ? A practical guide towards container management and orchestration Who This Book Is For This book is targeted for anyone, who wants to learn containerization and clustering in a practical way using Kubernetes. No prerequisite skills required, however, essential DevOps skill and public/private Cloud knowledge will accelerate the reading speed. If you’re advanced readers, you can also get a deeper understanding of all the tools and technique described in the book. What You Will Learn ? Learn fundamental and advanced DevOps skills and tools ? Get a comprehensive understanding for container ? Learn how to move your application to container world ? Learn how to manipulate your application by Kubernetes ? Learn how to work with Kubernetes in popular public cloud ? Improve time to market with Kubernetes and Continuous Delivery ? Learn how to monitor, log, and troubleshoot your application with Kubernetes In Detail Containerization is said to be the best way to implement DevOps. Google developed Kubernetes, which orchestrates containers efficiently and is considered the frontrunner in container orchestration. Kubernetes is an orchestrator that creates and manages your containers on clusters of servers. This book will guide you from simply deploying a container to administrate a Kubernetes cluster, and then you will learn how to do monitoring, logging, and continuous deployment in DevOps. The initial stages of the book will introduce the fundamental DevOps and the concept of containers. It will move on to how to containerize applications and deploy them into. The book will then introduce networks in Kubernetes. We then move on to advanced DevOps skills such as monitoring, logging, and continuous deployment in Kubernetes. It will proceed to introduce permission control for Kubernetes resources via attribute-based access control and role-based access control. The final stage of the book will cover deploying and managing your container clusters on the popular public cloud Amazon Web Services and Google Cloud Platform. At the end of the book, other orchestration frameworks, such as Docker Swarm mode, Amazon ECS, and Apache Mesos will be discussed. Style and approach Readers will be taken through fundamental DevOps skills and Kubernetes concept and administration with detailed examples. It introduces comprehensive DevOps topics, including microservices, automation tools, containers, monitoring, logging, continuous delivery, and popular public cloud environments. At each step readers will learn how to leverage Kubernetes in their everyday lives and transform their original delivery pipeline for fast and efficient delivery.
Mastering Kali Linux for Advanced Penetration Testing - Second Edition
Mastering Kali Linux for Advanced Penetration Testing - Second Edition
Vijay Kumar Velu
¥90.46
A practical guide to testing your network’s security with Kali Linux, the preferred choice of penetration testers and hackers. About This Book ? Employ advanced pentesting techniques with Kali Linux to build highly-secured systems ? Get to grips with various stealth techniques to remain undetected and defeat the latest defenses and follow proven approaches ? Select and configure the most effective tools from Kali Linux to test network security and prepare your business against malicious threats and save costs Who This Book Is For Penetration Testers, IT professional or a security consultant who wants to maximize the success of your network testing using some of the advanced features of Kali Linux, then this book is for you.Some prior exposure to basics of penetration testing/ethical hacking would be helpful in making the most out of this title. What You Will Learn ? Select and configure the most effective tools from Kali Linux to test network security ? Employ stealth to avoid detection in the network being tested ? Recognize when stealth attacks are being used against your network ? Exploit networks and data systems using wired and wireless networks as well as web services ? Identify and download valuable data from target systems ? Maintain access to compromised systems ? Use social engineering to compromise the weakest part of the network—the end users In Detail This book will take you, as a tester or security practitioner through the journey of reconnaissance, vulnerability assessment, exploitation, and post-exploitation activities used by penetration testers and hackers. We will start off by using a laboratory environment to validate tools and techniques, and using an application that supports a collaborative approach to penetration testing. Further we will get acquainted with passive reconnaissance with open source intelligence and active reconnaissance of the external and internal networks. We will also focus on how to select, use, customize, and interpret the results from a variety of different vulnerability scanners. Specific routes to the target will also be examined, including bypassing physical security and exfiltration of data using different techniques. You will also get to grips with concepts such as social engineering, attacking wireless networks, exploitation of web applications and remote access connections. Later you will learn the practical aspects of attacking user client systems by backdooring executable files. You will focus on the most vulnerable part of the network—directly and bypassing the controls, attacking the end user and maintaining persistence access through social media. You will also explore approaches to carrying out advanced penetration testing in tightly secured environments, and the book's hands-on approach will help you understand everything you need to know during a Red teaming exercise or penetration testing Style and approach An advanced level tutorial that follows a practical approach and proven methods to maintain top notch security of your networks.
osCommerce Webmaster’s Guide to Selling Online
osCommerce Webmaster’s Guide to Selling Online
Vadym Gurevych
¥90.46
Packed with expert advice and practical examples of effective store design and report creation to help you make better decisions, formulate more effective strategies, and measure your success. This book is for anyone administering an osCommerce site, including webmasters, content managers, store owners, and marketing managers, who do not need to understand PHP or MySQL to benefit from this book. The tips and techniques described in this book can be applied to any small, medium sized e-commerce site. This is not an implementation guide; developers implementing osCommerce-based e-commerce sites would benefit from reading Deep Inside osCommerce: The Cookbook.
ODP.NET Developer’s Guide
ODP.NET Developer’s Guide
Jagadish Chatarji Pulakhandam
¥90.46
This book uses many hands-on examples to show you how to use ODP.NET and Oracle Developer Tools from within Visual Studio 2005 to access Oracle Database 10g. The book is written for professional .NET developers who need to work with and take full advantage of Oracle Database 10g using Visual Studio 2005. Developers are expected to be familiar with Visual Basic.NET 2005 and have minimum knowledge of Oracle SQL and PL/SQL.
Mastering Zabbix - Second Edition
Mastering Zabbix - Second Edition
Andrea Dalle Vacche
¥90.46
Learn how to monitor your large IT environments using Zabbix with this one-stop, comprehensive guide to the Zabbix world About This Book Create a tailor-made monitoring solution based on your specific needs Learn advanced techniques of Zabbix to monitor networks, performances, and other critical features in large environments Integrate, customize, and extend your monitoring solutions with external components and software Who This Book Is For This book is intended for system administrators and IT architects who need to better integrate their Zabbix installation with their surrounding environment. A basic, working knowledge of Zabbix and Linux is assumed so that the book can focus on how to use every component to its full advantage. It will also be helpful to be familiar with programming concepts and languages but if not, all the content in the book is thorough and well documented. What You Will Learn Efficiently collect data from a large variety of monitoring objects Organize your data in graphs, charts, maps, and slide shows Build intelligent triggers and alarms to monitor your network proactively Write your own custom probes and monitoring *s to extend Zabbix Configure Zabbix and its database to be high available and fault-tolerant Automate repetitive procedures using Zabbix's API Integrate Zabbix with external systems Understand the protocol and how to interact with it by writing your own custom agent In Detail Nowadays monitoring systems play a crucial role in any IT environment. They are extensively used to not only measure your system’s performance, but also to forecast capacity issues. This is where Zabbix, one of the most popular monitoring solutions for networks and applications, comes into the picture. With an efficient monitoring system in place you’ll be able to foresee when your infrastructure runs under capacity and react accordingly. Due to the critical role a monitoring system plays, it is fundamental to implement it in the best way from its initial setup. This avoids misleading, confusing, or, even worse, false alarms which can disrupt an efficient and healthy IT department. This new edition will provide you with all the knowledge you need to make strategic and practical decisions about the Zabbix monitoring system. The setup you’ll do with this book will fit your environment and monitoring needs like a glove. You will be guided through the initial steps of choosing the correct size and configuration for your system, to what to monitor and how to implement your own custom monitoring component. Exporting and integrating your data with other systems is also covered. By the end of this book, you will have a tailor-made and well configured monitoring system and will understand with absolute clarity how crucial it is to your IT environment. Style and approach This book is an easy to follow, step-by-step guide to monitoring network and performance in large environments with Zabbix. It is designed for real-world Zabbix administrators, and is comprised of a perfect mix of theoretical explanations and practical applications, making it your perfect companion.
Learning Android Google Maps
Learning Android Google Maps
Raj Amal W.
¥90.46
Integrate Google Maps with your Android application to offer feature-rich and interactive maps About This Book Set up the development environment and obtain the Google API key to create your first map application Create a cutting edge Google maps application by implementing all the concepts learned A step-by-step tutorial guide that is full of pragmatic examples Who This Book Is For If you are an Android developer and want to integrate maps into your application, then this book is definitely for you. This book is intended for novice Android application developers who would like to get up and running with map rich applications using Google Maps. Some basic development experience would be helpful but it's not a mandate. What You Will Learn Get to know about the basic development environment setup needed to create a successful map application Generate an SHA1 fingerprint, obtain an API key, and create a basic map application Detect different types of maps and implement them in your application Add information to your map such as markers, overlays, information windows, and shapes Explore the interaction with maps and work with gestures Change the different camera views in your map application Work with real-time GPS location data and implementing it in your application Apply Street View and integrate the StreetViewPanoroma fragment to your application Employ the native Google maps application to solve some of the tasks using intents Create a cutting edge Google maps application by implementing all the concepts learned In Detail This book helps you to overcome the most common problems faced by users and helps you create a successful map application without any hassle. The book starts with a brief de*ion of how to set up an environment and obtain an API key to create your map application. This book will teach you about adding markers, overlays, and information windows to the map in detail. You will then dive deep into customizing various types of maps and working with location data and Google Street view. By the end of this book, you will be able to create succinct map applications in Android using Google maps efficiently. Style and approach The book is tailored for the reader with a fundamental approach to Android Google Maps providing a step-by-step introduction to Android Google Maps. It focuses on simple, easy-to-understand examples that are pragmatic and serve as useful basis for real-world applications. Different topics are approached in a bottom-up fashion, gradually going from the simplest foundations to the most advanced features.
Magento 2 Development Cookbook
Magento 2 Development Cookbook
Bart Delvaux
¥90.46
Over 60 recipes that will tailor and customize your experience with Magento 2 About This Book Solve common problems encountered while extending your Magento 2 store to fit your business needs Delve into the exciting and enhanced features of Magento 2 such as customizing security permissions, intelligent filtered search options, easy third-party integration, among others Learn to build and maintain a Magento 2 shop via a visual-based page editor and customize the look and feel using Magento 2’s offerings on the go Who This Book Is For This book is for every developer who has knowledge of PHP and wants to extend or customize the functionality of their Magento 2 system. If you have prior experience of the Magento platform, you will find this book useful in exploring the advanced features. What You Will Learn Install a Magento 2 shop with sample data Upgrade the data in a Magento 1 shop to a Magento 2 shop Manage the look and feel of the shop with custom themes Extend the shop with custom functionality such as forms, grids, and more Accelerate your store with some performance tool Build and structure your own shipping module Test your shop with automated tests and manage your product display In Detail With the challenges of growing an online business, Magento 2 is an open source e-commerce platform with innumerable functionalities that gives you the freedom to make on-the-fly decisions. It allows you to customize multiple levels of security permissions and enhance the look and feel of your website, and thus gives you a personalized experience in promoting your business. Style and approach This book is packed with a wide range of techniques to modify and extend the functionality of your online store. It contains easy-to-understand recipes starting with the basics and moving on to cover advanced topics. Many recipes work with code examples that can be downloaded from the book’s website.
Red Hat Enterprise Linux Server Cookbook
Red Hat Enterprise Linux Server Cookbook
William Leemans
¥90.46
Over 60 recipes to help you build, configure, and orchestrate RHEL 7 Server to make your everyday administration experience seamless About This Book Create fully unattended installations and deploy configurations without breaking a sweat Discover and kick-start the newest RHEL 7 configuration and management tools through an easy-to-follow, practical approach for a lazy system management Be guided by an experienced RHEL expert who is a certified Linux engineer with a passion for open source and open standards Who This Book Is For Red Hat Enterprise Linux Server Cookbook is for RHEL 7 system administrators and DevOps in need of a practical reference guide to troubleshoot common issues and quickly perform tasks. What You Will Learn Set up and configure RHEL 7 Server Use NetworkManager to configure all aspects of your network Manage virtual environments using libvirt Set up software repositories Secure and monitor your RHEL environment Configure SELinux, and create and apply its policies Create kickstart *s to automatically deploy RHEL 7 systems Use Orchestration and configuration management tools to manage your environment In Detail Dominating the server market, the Red Hat Enterprise Linux operating system gives you the support you need to modernize your infrastructure and boost your organization’s efficiency. Combining both stability and flexibility, RHEL helps you meet the challenges of today and adapt to the demands of tomorrow. This practical Cookbook guide will help you get to grips with RHEL 7 Server and automating its installation. Designed to provide targeted assistance through hands-on recipe guidance, it will introduce you to everything you need to know about KVM guests and deploying multiple standardized RHEL systems effortlessly. Get practical reference advice that will make complex networks setups look like child’s play, and dive into in-depth coverage of configuring a RHEL system. Also including full recipe coverage of how to set up, configuring, and troubleshoot SELinux, you’ll also discover how secure your operating system, as well as how to monitor it. Style and approach This practical guide is packed full of hands-on recipes that provide quick solutions to the problems faced when building your RHEL 7 system from scratch using orchestration tools. Each topic is explained sequentially in the process of setting up a system and binding everything together.
Banana Pro Blueprints
Banana Pro Blueprints
Ruediger Follmann
¥90.46
Leverage the capability of Banana Pi with exciting real-world projects About This Book Delve into the expanse of Banana Pi’s self-managing functionalities and develop real-world projects Gain hands-on experience of developing various wireless, multimedia, robotic, and sensor-based applications with Banana Pi Develop your applications using Banana Pi through a project-based approach Who This Book Is For This book is designed for those who are interested in exploring the capabilities of Banana Pro. Basic know-how of Linux and embedded systems would be an added advantage. What You Will Learn Remotely connect to Banana Pro and program the embedded board Use Banana Pro as a hotspot or provide an AirPlay server for wireless audio transmission Find out about the different programming languages that can be used with Banana Pro Build and program your own multimedia centre in order to watch television and movies Connect peripherals such as a camera, LCD, or hard disk to Banana Pro Manage and regulate your Linux system with Banana Pro Stream music wirelessly from your mobile phone to Banana Pro In Detail This book follows a tactical plan that will guide you through the implementation of Banana Pro and its configurations. You will then learn the various programming languages used with Banana Pi with the help of examples. In no time at all, you’ll be working on a wireless project that implements AirPlay servers, hotspots, and so on. Following this, you’ll develop a retro-style arcade kiosk game. Then we’ll move on to explore the multimedia features of Banana Pro by designing and building an enclosure for it. After this, you’ll learn to build a remote-controlled smart car and we’ll examine how to control a robotic arm. The book will conclude with the creation of a home sensor system that has the ability to expand or shrink to suit any home. Style and approach This book follows a project-based approach that covers the most important features of Banana Pro. Every chapter dives into the practical side of the implementation.
Practical Data Analysis - Second Edition
Practical Data Analysis - Second Edition
Hector Cuesta,Dr. Sampath Kumar
¥90.46
A practical guide to obtaining, transforming, exploring, and analyzing data using Python, MongoDB, and Apache Spark About This Book Learn to use various data analysis tools and algorithms to classify, cluster, visualize, simulate, and forecast your data Apply Machine Learning algorithms to different kinds of data such as social networks, time series, and images A hands-on guide to understanding the nature of data and how to turn it into insight Who This Book Is For This book is for developers who want to implement data analysis and data-driven algorithms in a practical way. It is also suitable for those without a background in data analysis or data processing. Basic knowledge of Python programming, statistics, and linear algebra is assumed. What You Will Learn Acquire, format, and visualize your data Build an image-similarity search engine Generate meaningful visualizations anyone can understand Get started with analyzing social network graphs Find out how to implement sentiment text analysis Install data analysis tools such as Pandas, MongoDB, and Apache Spark Get to grips with Apache Spark Implement machine learning algorithms such as classification or forecasting In Detail Beyond buzzwords like Big Data or Data Science, there are a great opportunities to innovate in many businesses using data analysis to get data-driven products. Data analysis involves asking many questions about data in order to discover insights and generate value for a product or a service. This book explains the basic data algorithms without the theoretical jargon, and you’ll get hands-on turning data into insights using machine learning techniques. We will perform data-driven innovation processing for several types of data such as text, Images, social network graphs, documents, and time series, showing you how to implement large data processing with MongoDB and Apache Spark. Style and approach This is a hands-on guide to data analysis and data processing. The concrete examples are explained with simple code and accessible data.