万本电子书0元读

万本电子书0元读

Mastering Windows PowerShell Scripting
Mastering Windows PowerShell Scripting
Chris Dent
¥81.74
Grasp advanced PowerShell Core 6.0 functionalities to automate your environment Key Features * Keep up with changes introduced in PowerShell Core 6.0 * Easily maintain appropriate compatibility with older versions * Automate complex tasks, manipulate data, and secure your environment with PowerShell Core 6.0 Book Description PowerShell scripts offer a handy way to automate various chores, however working effectively with these scripts can be a difficult task. This comprehensive guide starts with the fundamentals before moving on to advanced-level topics to help you become a PowerShell Core 6.0 expert. The first module, PowerShell Core 6.0 Fundamentals, begins with the new features of PowerShell Core 6.0, installing it on Linux, and working with parameters, objects and .NET classes from within PowerShell Core 6.0. As you make your way through the chapters, you'll see how to efficiently manage large amounts of data and interact with other services using PowerShell Core 6.0. You'll be able to make the most of PowerShell Core 6.0's powerful automation feature, where you will have different methods available to parse data and manipulate regular expressions and Windows Management Instrumentation (WMI). After having explored automation, you will enter the extending PowerShell Core 6.0 module, covering asynchronous processing and desired state configuration. In the last module, you will learn to extend PowerShell Core 6.0 using advanced scripts and filters, and also debug issues along with working on error handling techniques. By the end of this book, you will be an expert in scripting with PowerShell Core 6.0. What you will learn * Optimize code through the use of functions, switches, and looping structures * Work with objects and operators to test and manipulate data * Parse and manipulate different data types * Create scripts and functions using PowerShell * Use jobs, events, and popular public modules which assist with implementing multithreading * Write .NET classes with ease within the PowerShell * Create and implement regular expressions in PowerShell scripts * Make use of advanced techniques to define and restrict the behavior of parameters Who this book is for If you are a system administrator who wants to become an expert in controlling and automating your Windows environment, then Mastering Windows PowerShell Scripting is for you. It is also ideal for those new to the PowerShell language.
Hands-On Unsupervised Learning with Python
Hands-On Unsupervised Learning with Python
Giuseppe Bonaccorso
¥81.74
Discover the skill-sets required to implement various approaches to Machine Learning with Python Key Features * Explore unsupervised learning with clustering, autoencoders, restricted Boltzmann machines, and more * Build your own neural network models using modern Python libraries * Practical examples show you how to implement different machine learning and deep learning techniques Book Description Unsupervised learning is about making use of raw, untagged data and applying learning algorithms to it to help a machine predict its outcome. With this book, you will explore the concept of unsupervised learning to cluster large sets of data and analyze them repeatedly until the desired outcome is found using Python. This book starts with the key differences between supervised, unsupervised, and semi-supervised learning. You will be introduced to the best-used libraries and frameworks from the Python ecosystem and address unsupervised learning in both the machine learning and deep learning domains. You will explore various algorithms, techniques that are used to implement unsupervised learning in real-world use cases. You will learn a variety of unsupervised learning approaches, including randomized optimization, clustering, feature selection and transformation, and information theory. You will get hands-on experience with how neural networks can be employed in unsupervised scenarios. You will also explore the steps involved in building and training a GAN in order to process images. By the end of this book, you will have learned the art of unsupervised learning for different real-world challenges. What you will learn * Use cluster algorithms to identify and optimize natural groups of data * Explore advanced non-linear and hierarchical clustering in action * Soft label assignments for fuzzy c-means and Gaussian mixture models * Detect anomalies through density estimation * Perform principal component analysis using neural network models * Create unsupervised models using GANs Who this book is for This book is intended for statisticians, data scientists, machine learning developers, and deep learning practitioners who want to build smart applications by implementing key building block unsupervised learning, and master all the new techniques and algorithms offered in machine learning and deep learning using real-world examples. Some prior knowledge of machine learning concepts and statistics is desirable.
Linux Administration Cookbook
Linux Administration Cookbook
Adam K. Dean
¥81.74
Over 100 recipes to get up and running with the modern Linux administration ecosystem Key Features *Understand and implement the core system administration tasks in Linux *Discover tools and techniques to troubleshoot your Linux system *Maintain a healthy system with good security and backup practices Book Description Linux is one of the most widely used operating systems among system administrators,and even modern application and server development is heavily reliant on the Linux platform. The Linux Administration Cookbook is your go-to guide to get started on your Linux journey. It will help you understand what that strange little server is doing in the corner of your office, what the mysterious virtual machine languishing in Azure is crunching through, what that circuit-board-like thing is doing under your office TV, and why the LEDs on it are blinking rapidly. This book will get you started with administering Linux, giving you the knowledge and tools you need to troubleshoot day-to-day problems, ranging from a Raspberry Pi to a server in Azure, while giving you a good understanding of the fundamentals of how GNU/Linux works. Through the course of the book, you’ll install and configure a system, while the author regales you with errors and anecdotes from his vast experience as a data center hardware engineer, systems administrator, and DevOps consultant. By the end of the book, you will have gained practical knowledge of Linux, which will serve as a bedrock for learning Linux administration and aid you in your Linux journey. What you will learn *Install and manage a Linux server, both locally and in the cloud *Understand how to perform administration across all Linux distros *Work through evolving concepts such as IaaS versus PaaS, containers, and automation *Explore security and configuration best practices *Troubleshoot your system if something goes wrong *Discover and mitigate hardware issues, such as faulty memory and failing drives Who this book is for If you are a system engineer or system administrator with basic experience of working with Linux, this book is for you.
Kali Linux - An Ethical Hacker's Cookbook
Kali Linux - An Ethical Hacker's Cookbook
Himanshu Sharma
¥81.74
Discover end-to-end penetration testing solutions to enhance your ethical hacking skills Key Features * Practical recipes to conduct effective penetration testing using the latest version of Kali Linux * Leverage tools like Metasploit, Wireshark, Nmap, and more to detect vulnerabilities with ease * Confidently perform networking and application attacks using task-oriented recipes Book Description Many organizations have been affected by recent cyber events. At the current rate of hacking, it has become more important than ever to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2018.4 / 2019), in addition to covering the core functionalities. The book will get you off to a strong start by introducing you to the installation and configuration of Kali Linux, which will help you to perform your tests. You will also learn how to plan attack strategies and perform web application exploitation using tools such as Burp and JexBoss. As you progress, you will get to grips with performing network exploitation using Metasploit, Sparta, and Wireshark. The book will also help you delve into the technique of carrying out wireless and password attacks using tools such as Patator, John the Ripper, and airoscript-ng. Later chapters will draw focus to the wide range of tools that help in forensics investigations and incident response mechanisms. As you wrap up the concluding chapters, you will learn to create an optimum quality pentest report. By the end of this book, you will be equipped with the knowledge you need to conduct advanced penetration testing, thanks to the book’s crisp and task-oriented recipes. What you will learn * Learn how to install, set up and customize Kali for pentesting on multiple platforms * Pentest routers and embedded devices * Get insights into fiddling around with software-defined radio * Pwn and escalate through a corporate network * Write good quality security reports * Explore digital forensics and memory analysis with Kali Linux Who this book is for If you are an IT security professional, pentester, or security analyst who wants to conduct advanced penetration testing techniques, then this book is for you. Basic knowledge of Kali Linux is assumed.
Hands-On Machine Learning for Cybersecurity
Hands-On Machine Learning for Cybersecurity
Soma Halder
¥81.74
Get into the world of smart data security using machine learning algorithms and Python libraries Key Features *Learn machine learning algorithms and cybersecurity fundamentals *Automate your daily workflow by applying use cases to many facets of security *Implement smart machine learning solutions to detect various cybersecurity problems Book Description Cyber threats today are one of the costliest losses that an organization can face. In this book, we use the most efficient tool to solve the big problems that exist in the cybersecurity domain. The book begins by giving you the basics of ML in cybersecurity using Python and its libraries. You will explore various ML domains (such as time series analysis and ensemble modeling) to get your foundations right. You will implement various examples such as building system to identify malicious URLs, and building a program to detect fraudulent emails and spam. Later, you will learn how to make effective use of K-means algorithm to develop a solution to detect and alert you to any malicious activity in the network. Also learn how to implement biometrics and fingerprint to validate whether the user is a legitimate user or not. Finally, you will see how we change the game with TensorFlow and learn how deep learning is effective for creating models and training systems What you will learn *Use machine learning algorithms with complex datasets to implement cybersecurity concepts *Implement machine learning algorithms such as clustering, k-means, and Naive Bayes to solve real-world problems *Learn to speed up a system using Python libraries with NumPy, Scikit-learn, and CUDA *Understand how to combat malware, detect spam, and fight financial fraud to mitigate cyber crimes *Use TensorFlow in the cybersecurity domain and implement real-world examples *Learn how machine learning and Python can be used in complex cyber issues Who this book is for This book is for the data scientists, machine learning developers, security researchers, and anyone keen to apply machine learning to up-skill computer security. Having some working knowledge of Python and being familiar with the basics of machine learning and cybersecurity fundamentals will help to get the most out of the book
Hands-On Cloud-Native Microservices with Jakarta EE
Hands-On Cloud-Native Microservices with Jakarta EE
Luigi Fugaro
¥81.74
Discover how cloud-native microservice architecture helps you to build dynamically scalable applications by using the most widely used and adopted runtime environments Key Features * Build robust cloud-native applications using a variety of tools * Understand how to configure both Amazon Web Services (AWS) and Docker clouds for high availability * Explore common design patterns used in building and deploying microservices architecture. Book Description Businesses today are evolving rapidly, and developers now face the challenge of building applications that are resilient, flexible, and native to the cloud. To achieve this, you'll need to be aware of the environment, tools, and resources that you're coding against. The book will begin by introducing you to cloud-native architecture and simplifying the major concepts. You'll learn to build microservices in Jakarta EE using MicroProfile with Thorntail and Narayana LRA. You'll then delve into cloud-native application x-rays, understanding the MicroProfile specification and the implementation/testing of microservices. As you progress further, you'll focus on continuous integration and continuous delivery, in addition to learning how to dockerize your services. You'll also cover concepts and techniques relating to security, monitoring, and troubleshooting problems that might occur with applications after you've written them. By the end of this book, you will be equipped with the skills you need to build highly resilient applications using cloud-native microservice architecture. What you will learn * Integrate reactive principles in MicroProfile microservices architecture * Explore the 12-factors-app paradigm and its implications * Get the best out of Java versions 8 and 9 to implement a microservice based on Thorntail * Understand what OpenShift is and why it is so important for an elastic architecture * Build a Linux container image using Docker and scale the application using Kubernetes * Implement various patterns such as, Circuit Breaker and bulkheads * Get to grips with the DevOps methodology using continuous integration (CI) and continuous deployment (CD) Who this book is for This book is for developers with basic knowledge of Java EE and HTTP-based application principles who want to learn how to build, test and scale Java EE microservices. No prior experience of writing microservices in Java EE is required.
Hands-On Cybersecurity for Finance
Hands-On Cybersecurity for Finance
Dr. Erdal Ozkaya
¥81.74
A comprehensive guide that will give you hands-on experience to study and overcome financial cyber threats Key Features * Protect your financial environment with cybersecurity practices and methodologies * Identify vulnerabilities such as data manipulation and fraudulent transactions * Provide end-to-end protection within organizations Book Description Organizations have always been a target of cybercrime. Hands-On Cybersecurity for Finance teaches you how to successfully defend your system against common cyber threats, making sure your financial services are a step ahead in terms of security. The book begins by providing an overall description of cybersecurity, guiding you through some of the most important services and technologies currently at risk from cyber threats. Once you have familiarized yourself with the topic, you will explore specific technologies and threats based on case studies and real-life scenarios. As you progress through the chapters, you will discover vulnerabilities and bugs (including the human risk factor), gaining an expert-level view of the most recent threats. You'll then explore information on how you can achieve data and infrastructure protection. In the concluding chapters, you will cover recent and significant updates to procedures and configurations, accompanied by important details related to cybersecurity research and development in IT-based financial services. By the end of the book, you will have gained a basic understanding of the future of information security and will be able to protect financial services and their related infrastructures. What you will learn * Understand the cyber threats faced by organizations * Discover how to identify attackers * Perform vulnerability assessment, software testing, and pentesting * Defend your financial cyberspace using mitigation techniques and remediation plans * Implement encryption and decryption * Understand how Artificial Intelligence (AI) affects cybersecurity Who this book is for Hands-On Cybersecurity for Finance is for you if you are a security architect, cyber risk manager, or pentester looking to secure your organization. Basic understanding of cybersecurity tools and practices will help you get the most out of this book.
Mastering Ceph
Mastering Ceph
Nick Fisk
¥81.74
Discover the unified, distributed storage system and improve the performance of applications Key Features * Explore the latest features of Ceph's Mimic release * Get to grips with advanced disaster and recovery practices for your storage * Harness the power of Reliable Autonomic Distributed Object Store (RADOS) to help you optimize storage systems Book Description Ceph is an open source distributed storage system that is scalable to Exabyte deployments. This second edition of Mastering Ceph takes you a step closer to becoming an expert on Ceph. You’ll get started by understanding the design goals and planning steps that should be undertaken to ensure successful deployments. In the next sections, you’ll be guided through setting up and deploying the Ceph cluster with the help of orchestration tools. This will allow you to witness Ceph’s scalability, erasure coding (data protective) mechanism, and automated data backup features on multiple servers. You’ll then discover more about the key areas of Ceph including BlueStore, erasure coding and cache tiering with the help of examples. Next, you’ll also learn some of the ways to export Ceph into non-native environments and understand some of the pitfalls that you may encounter. The book features a section on tuning that will take you through the process of optimizing both Ceph and its supporting infrastructure. You’ll also learn to develop applications, which use Librados and distributed computations with shared object classes. Toward the concluding chapters, you’ll learn to troubleshoot issues and handle various scenarios where Ceph is not likely to recover on its own. By the end of this book, you’ll be able to master storage management with Ceph and generate solutions for managing your infrastructure. What you will learn * Plan, design and deploy a Ceph cluster * Get well-versed with different features and storage methods * Carry out regular maintenance and daily operations with ease * Tune Ceph for improved ROI and performance * Recover Ceph from a range of issues * Upgrade clusters to BlueStore Who this book is for If you are a storage professional, system administrator, or cloud engineer looking for guidance on building powerful storage solutions for your cloud and on-premise infrastructure, this book is for you.
Learning Linux Shell Scripting
Learning Linux Shell Scripting
Ganesh Naik
¥81.74
Break through the practice of writing tedious code with shell scripts About This Book ? Learn to impeccably build shell scripts and develop advanced applications ? Create smart solutions by writing and debugging scripts ? A step-by-step tutorial to automate routine tasks by developing scripts Who This Book Is For Learning Linux Shell Scripting is ideal for those who are proficient at working with Linux and want to learn about shell scripting to improve their efficiency and practical skills. What You Will Learn ? Familiarize yourself with the various text filtering tools available in Linux ? Understand expressions and variables and how to use them practically ? Automate decision-making and save a lot of time and effort of revisiting code ? Get to grips with advanced functionality such as using traps, dialogs to develop screens & Database administration such as MySQL or Oracle ? Start up a system and customize a Linux system ? Taking backup of local or remote data or important files. ? Use existing other language scripts such as Python, Perl & Ruby in Shell Scripts In Detail Linux is the most powerful and universally adopted OS. Shell is a program that gives the user direct interaction with the operating system. Scripts are collections of commands that are stored in a file. The shell reads this file and acts on commands as if they were typed on the keyboard. Learning Linux Shell Scripting covers Bash, GNU Bourne Again Shell, preparing you to work in the exciting world of Linux shell scripting. CentOS is a popular rpm-based stable and secured Linux distribution. Therefore, we have used CentOS distribution instead of Ubuntu distribution. Linux Shell Scripting is independent of Linux distributions, but we have covered both types of distros. We start with an introduction to the Shell environment and basic commands used. Next, we explore process management in Linux OS, real-world essentials such as debugging and perform Shell arithmetic fluently. You'll then take a step ahead and learn new and advanced topics in Shell scripting, such as decision making, starting up a system, and customizing a Linux environment. You will also learn about grep, stream editor, and AWK, which are very powerful text filters and editors. Finally, you'll get to grips with taking backup, using other language scripts in Shell Scripts as well as automating database administration tasks for MySQL and Oracle. By the end of this book, you will be able to confidently use your own shell scripts in the real world. Style and approach This practical book will go from the very basics of shell scripting to complex, customized automation. The idea behind this book is to be as practical as possible and give you the look and feel of what real-world scripting is like.
Mastering Metasploit
Mastering Metasploit
Nipun Jaswal
¥81.74
Discover the next level of network defense with the Metasploit framework About This Book ? Gain the skills to carry out penetration testing in complex and highly-secured environments ? Become a master using the Metasploit framework, develop exploits, and generate modules for a variety of real-world scenarios ? Get this completely updated edition with new useful methods and techniques to make your network robust and resilient Who This Book Is For This book is a hands-on guide to penetration testing using Metasploit and covers its complete development. It shows a number of techniques and methodologies that will help you master the Metasploit framework and explore approaches to carrying out advanced penetration testing in highly secured environments. What You Will Learn ? Develop advanced and sophisticated auxiliary modules ? Port exploits from PERL, Python, and many more programming languages ? Test services such as databases, SCADA, and many more ? Attack the client side with highly advanced techniques ? Test mobile and tablet devices with Metasploit ? Bypass modern protections such as an AntiVirus and IDS with Metasploit ? Simulate attacks on web servers and systems with Armitage GUI ? Script attacks in Armitage using CORTANA scripting In Detail We start by reminding you about the basic functionalities of Metasploit and its use in the most traditional ways. You’ll get to know about the basics of programming Metasploit modules as a refresher and then dive into carrying out exploitation as well building and porting exploits of various kinds in Metasploit. In the next section, you’ll develop the ability to perform testing on various services such as databases, Cloud environment, IoT, mobile, tablets, and similar more services. After this training, we jump into real-world sophisticated scenarios where performing penetration tests are a challenge. With real-life case studies, we take you on a journey through client-side attacks using Metasploit and various scripts built on the Metasploit framework. By the end of the book, you will be trained specifically on time-saving techniques using Metasploit. Style and approach This is a step-by-step guide that provides great Metasploit framework methodologies. All the key concepts are explained details with the help of examples and demonstrations that will help you understand everything you need to know about Metasploit.
Django Design Patterns and Best Practices
Django Design Patterns and Best Practices
Arun Ravindran
¥81.74
Build maintainable websites with elegant Django design patterns and modern best practices About This Book ? Explore aspects of Django from Models and Views to testing and deployment ? Understand the nuances of web development such as browser attack and data design ? Walk through various asynchronous tools such as Celery and Channels Who This Book Is For This book is for you whether you’re new to Django or just want to learn its best practices. You do not have to be an expert in Django or Python. No prior knowledge of patterns is expected for reading this book but it would be helpful. What You Will Learn ? Make use of common design patterns to help you write better code ? Implement best practices and idioms in this rapidly evolving framework ? Deal with legacy code and debugging ? Use asynchronous tools such as Celery, Channels, and asyncio ? Use patterns while designing API interfaces with the Django REST Framework ? Reduce the maintenance burden with well-tested, cleaner code ? Host, deploy, and secure your Django projects In Detail Building secure and maintainable web applications requires comprehensive knowledge. The second edition of this book not only sheds light on Django, but also encapsulates years of experience in the form of design patterns and best practices. Rather than sticking to GoF design patterns, the book looks at higher-level patterns. Using the latest version of Django and Python, you’ll learn about Channels and asyncio while building a solid conceptual background. The book compares design choices to help you make everyday decisions faster in a rapidly changing environment. You’ll first learn about various architectural patterns, many of which are used to build Django. You’ll start with building a fun superhero project by gathering the requirements, creating mockups, and setting up the project. Through project-guided examples, you’ll explore the Model, View, templates, workflows, and code reusability techniques. In addition to this, you’ll learn practical Python coding techniques in Django that’ll enable you to tackle problems related to complex topics such as legacy coding, data modeling, and code reusability. You’ll discover API design principles and best practices, and understand the need for asynchronous workflows. During this journey, you’ll study popular Python code testing techniques in Django, various web security threats and their countermeasures, and the monitoring and performance of your application. Style and approach This comprehensive project-driven guide will enhance your skill set by taking you through the well-known design patterns and industry-standard best practices in Django web development.
Hands-On Functional Programming in Rust
Hands-On Functional Programming in Rust
Andrew Johnson
¥81.74
Explore the support Rust offers for creating functional applications in Rust. Learn about various design patterns, implementing concurrency, metaprogramming, and so on in the process About This Book ? Learn generics, organization, and design patterns in functional programming ? Modularize your applications and make them highly reusable and testable using functional design patterns ? Get familiar with complex concepts such as metaprogramming, concurrency, and immutability Who This Book Is For This book is for Rust developers who are comfortable with the language and now want to improve their coding abilities by learning advanced functional techniques to enhance their skillset and create robust and testable apps. What You Will Learn ? How Rust supports the use of basic functional programming principles ? Use functional programming to handle concurrency with elegance ? Read and interpret complex type signatures for types and functions ? Implement powerful abstractions using meta programming in Rust ? Create quality code formulaically using Rust's functional design patterns ? Master Rust's complex ownership mechanisms particularly for mutability In Detail Functional programming allows developers to divide programs into smaller, reusable components that ease the creation, testing, and maintenance of software as a whole. Combined with the power of Rust, you can develop robust and scalable applications that fulfill modern day software requirements. This book will help you discover all the Rust features that can be used to build software in a functional way. We begin with a brief comparison of the functional and object-oriented approach to different problems and patterns. We then quickly look at the patterns of control flow, data the abstractions of these unique to functional programming. The next part covers how to create functional apps in Rust; mutability and ownership, which are exclusive to Rust, are also discussed. Pure functions are examined next and you'll master closures, their various types, and currying. We also look at implementing concurrency through functional design principles and metaprogramming using macros. Finally, we look at best practices for debugging and optimization. By the end of the book, you will be familiar with the functional approach of programming and will be able to use these techniques on a daily basis. Style and approach Step-by-step guide covering advanced concepts and building functional applications in Rust
Full Stack Development with JHipster
Full Stack Development with JHipster
Deepu K Sasidharan,Sendil Kumar N
¥81.74
Discover the world of Full Stack Development with real-world examples. About This Book ? Leverage the full power of the JHipster platform to build complex web applications ? Create microservices from scratch and convert JHipster monolith apps into microservices ? Build and deploy applications locally, in Docker and on various cloud platforms. Who This Book Is For This book will appeal to developers who would like to build modern web applications quickly. A basic knowledge of the Spring ecosystem would be an added advantage. What You Will Learn ? Build business logic by creating and developing entity models us the JHipster Domain Language ? Customize web applications with Angular, Bootstrap and Spring ? Tests and Continuous Integration with Jenkins ? Utilize the JHipster microservice stack, which includes Netflix Eureka, Spring Cloud config, HashiCorp Consul, and so on. ? Understand advanced microservice concepts such as API rout, load balancing, rate limit, circuit break, centralized configuration server, JWT authentication, and more ? Run microservices locally using Docker and Kubernetes (in production) In Detail JHipster is a development platform to generate, develop, and deploy Spring Boot and Angular/React applications and Spring microservices. It provides you with a variety of tools that will help you quickly build modern web applications. This book will be your guide to building full stack applications with Spring and Angular using the JHipster tool set. You will begin by understanding what JHipster is and the various tools and technologies associated with it. You will learn the essentials of a full stack developer before getting hands-on and building a monolithic web application with JHipster. From here you will learn the JHipster Domain Language with entity modeling and entity creation using JDL and JDL studio. Moving on, you will be introduced to client side technologies such as Angular and Bootstrap and will delve into technologies such as Spring Security, Spring MVC, and Spring Data. You will learn to build and package apps for production with various deployment options such as Heroku and more. During the course of the book, you will be introduced to microservice server-side technologies and how to break your monolithic application with a database of your choice. Next, the book takes you through cloud deployment with microservices on Docker and Kubernetes. Going forward, you will learn to build your client side with React and master JHipster best practices. By the end of the book, you will be able to leverage the power of the best tools available to build modern web applications. Style and approach This comprehensive guide builds a complex production-ready Spring Boot + Angular web application using JHipster platform
Mapping with ArcGIS Pro
Mapping with ArcGIS Pro
Amy Rock,Ryan Malhoski
¥81.74
Implementing the ArcGIS Pro technique to design accurate, user friendly maps and making appropriate cartographic decisions About This Book ? Build visually stunning and useful maps; ? Understand the cartographic workflows and the decisions you must take before creating the map; ? Learn to create appropriate map elements and layout designs ? Use the ArcGIS Online's Smart Mapping technique to create clear webmaps Who This Book Is For If you are a GIS analyst or a Map designer who would like to create and design a map with ArcGIS Pro then this book is for you. A basic GIS knowledge is assumed. What You Will Learn ? Using ArcGIS Pro to create visually stunning maps and make confident cartographic decisions ? Leverage precise layout grids that will organize and guide the placement of map elements ? Make appropriate decisions about color and symbols ? Critically evaluate and choose the perfect projection for your data ? Create clear webmaps that focus the reader’s attention using ArcGIS Online’s Smart Mapping capabilities In Detail ArcGIS Pro is a geographic information system for working with maps and geographic information. This book will help you create visually stunning maps that increase the legibility of the stories being mapped and introduce visual and design concepts into a traditionally scientific, data-driven process. The book begins by outlining the steps of gathering data from authoritative sources and lays out the workflow of creating a great map. Once the plan is in place you will learn how to organize the Contents Pane in ArcGIS Pro and identify the steps involved in streamlining the production process. Then you will learn Cartographic Design techniques using ArcGIS Pro's feature set to organize the page structure and create a custom set of color swatches. You will be then exposed to the techniques required to ensure your data is clear and legible no matter the size or scale of your map. The later chapters will help you understand the various projection systems, trade-offs between them, and the proper applications of them to make sure your maps are accurate and visually appealing. Finally, you will be introduced to the ArcGIS Online ecosystem and how ArcGIS Pro can utilize it within the application. You will learn Smart Mapping, a new feature of ArcGIS Online that will help you to make maps that are visually stunning and useful. By the end of this book, you will feel more confident in making appropriate cartographic decisions. Style and approach The book takes a pragmatic approach, showing various methods to create visually stunning maps.
Vue.js 2 Design Patterns and Best Practices
Vue.js 2 Design Patterns and Best Practices
Paul Halliday
¥81.74
Become an expert Vue developer by understanding the design patterns and component architecture of Vue.js to write clean and maintainable code. About This Book ? Craft highly modular applications by exploring the design patterns and component architecture of Vue.js ? Enforce a Flux-like application architecture in your Vue.js applications with Vuex ? Easy-to-follow examples that can be used to create reusable code and extensible designs Who This Book Is For This book targets Vue Developers who care about framework design principles and utilize commonly found design patterns in developing web applications. What You Will Learn ? Understand the theory and patterns of Vue.js ? Build scalable and modular Vue.js applications ? Take advantage of Vuex for reactive state management. ? Create Single Page Applications with vue-router. ? Use Nuxt for FAST server side rendered Vue applications. ? Convert your application to a Progressive Web App (PWA) and add ServiceWorkers, offline support, and more ? Build your app with Vue.js by following up with best practices and explore the common anti-patterns to avoid In Detail The book starts by comparing Vue.js with other frameworks and setting up the development environment for your application, and gradually move on to writing and styling clean, maintainable, and reusable components that can be used across your application. Further on, you'll look at common UI patterns, Vue form submission, and various modifiers such as lazy binding, number typecasting, and string trimming to create better UIs. You will also explore best practices for integrating HTTP into Vue.js applications to create an application with dynamic data. Routing is a vitally important part of any SPA, so you will focus on the Vue router and explore routing a user between multiple pages. Next, you'll also explore state management with Vuex, write testable code for your application, and create performant, server-side rendered applications with Nuxt. Towards the end, we'll look at common antipatterns to avoid, to save you from a lot of trial and error and development headaches. By the end of this book, you'll be well on your way to becoming an expert Vue developer who can leverage design patterns to efficiently architect the design of your application and write clean and maintainable code. Style and approach This easy-to-follow practical guide will help you develop efficient Vue.js apps by following best practices and using common design patterns.
Getting Started with Unity 2018 - Third Edition
Getting Started with Unity 2018 - Third Edition
Dr. Edward Lavieri
¥81.74
Learn how to use Unity 2018 by creating your very own 3D game while developing your essential skills About This Book ? Learn to create immersive 3D games and Virtual Reality experiences with Unity 2018 ? Build custom scripts to make your game characters interactive ? Explore and implement AritificiaI Intelligence techniques to bring your game to life Who This Book Is For If you are an aspiring game developer interested in learning Unity 2018 and becoming familiar with its core features, then this book is for you. No prior knowledge of Unity is required. What You Will Learn ? Set up your Unity development environment and navigate its tools ? Import and use custom assets and asset packages to add characters to your game ? Build a 3D game world with a custom terrain, water, sky, mountains, and trees ? Animate game characters, using animation controllers, and scripting ? Apply audio and particle effects to the game ? Create intuitive game menus and interface elements ? Customize your game with sound effects, shadows, lighting effects, and rendering options ? Debug code and provide smooth error handling In Detail The Unity game engine has revolutionized the gaming industry with its complete set of intuitive tools and rapid workflows, which can be used to create interactive 3D content. With Unity, you can scaffold your way from the basics and make make stunning interactive games. This book will guide you through the entire process of creating a 3D game, from downloading the Unity game engine to publishing your game. It not only gives you a strong foundation, but puts you on the path to game development. Beginning with an overview of the Unity engine and its interface, you will walk through the process of creating a game environment and learn how to use built-in assets, as well as assets created with third-party 3D modeling tools such as Blender. Moving on, you will create custom scripts to control non-player character behaviors and gameplay. You will master exciting concepts such as Heads-Up-Displays, mini-maps, game navigation, sound effects, and lighting effects. Next, you’ll learn how to create your first VR experience, right from setting up the project to image effects. You'll be familiarized with all the tools that Unity has to offer to create your own immersive VR experiences. Each section is a stepping stone toward the completion of the final game. By the end of the book, you'll have learned advanced topics such as cross-platform considerations which enable your games to run on multiple platforms. Style and approach A step-by-step guide giving you the perfect start to developing 3D games with Unity 2018
Mastering Internet of Things
Mastering Internet of Things
Peter Waher
¥81.74
Augment your IoT skills with the help of engaging and enlightening tutorials designed for Raspberry Pi 3 About This Book ? Design and implement state-of-the-art solutions for the Internet of Things ? Build complex projects using motions detectors, controllers, sensors, and Raspberry Pi 3 ? A hands-on guide that provides interoperable solutions for sensors, actuators, and controllers Who This Book Is For If you're a developer or electronic engineer and are curious about the Internet of Things, this is the book for you. With only a rudimentary understanding of electronics and Raspberry Pi 3, and some programming experience using managed code, such as C# or Java, you will be taught to develop state-of-the-art solutions for the Internet of Things. What You Will Learn ? Create your own project, run and debug it ? Master different communication patterns using the MQTT, HTTP, CoAP, LWM2M and XMPP protocols ? Build trust-based as hoc networks for open, secure and interoperable communication ? Explore the IoT Service Platform ? Manage the entire product life cycle of devices ? Understand and set up the security and privacy features required for your system ? Master interoperability, and how it is solved in the realms of HTTP,CoAP, LWM2M and XMPP In Detail The Internet of Things (IoT) is the fastest growing technology market. Industries are embracing IoT technologies to improve operational expenses, product life, and people's well-being. Mastering Internet of Things starts by presenting IoT fundamentals and the smart city. You will learn the important technologies and protocols that are used for the Internet of Things, their features, corresponding security implications, and practical examples on how to use them. This book focuses on creating applications and services for the Internet of Things. Further, you will learn to create applications and services for the Internet of Things. You will be discover various interesting projects and understand how to publish sensor data, control devices, and react to asynchronous events using the XMPP protocol. The book also introduces chat, to interact with your devices. You will learn how to automate your tasks by using Internet of Things Service Platforms as the base for an application. You will understand the subject of privacy, requirements they should be familiar with, and how to avoid violating any of the important new regulations being introduced. At the end of the book, you will have mastered creating open, interoperable and secure networks of things, protecting the privacy and integrity of your users and their information. Style and approach This mastering-level guide will immerse you in the advanced functionalities of IoT, along with extending them, and finishes up with security and privacy techniques.
Rust High Performance
Rust High Performance
Iban Eguia Moraza
¥81.74
Find bottlenecks, identify the proper algorithm to use, optimize performance, and create really efficient Rust applications About This Book ? Understand common performance pitfalls and improve the performance of your applications. ? Get to grips with parallel programming and multithreading with Rust. ? Learn metaprogramming in Rust. Who This Book Is For This book is for Rust developers keen to improve the speed of their code or simply to take their skills to the next level. What You Will Learn ? Master tips and tricks to make your code faster. ? Learn how to identify bottlenecks in your Rust applications ? Discover how to profile your Rust software. ? Understand the type system to create compile-time optimizations. ? Master the borrow checker . ? Learn metaprogramming in Rust to avoid boilerplate code. ? Discover multithreading and work stealing in Rust. ? Understand asynchronous programming in Rust. In Detail At times, it is difficult to get the best performance out of Rust. This book teaches you to optimize the speed of your Rust code to the level of languages such as C/C++. You'll understand and fix common pitfalls, learn how to improve your productivity by using metaprogramming, and speed up your code by concurrently executing parts of it safely and easily. You will master the features of the language which will make you stand out and use them to really improve the efficiency of your algorithms The book begins with a gentle introduction to help you identify bottlenecks when programming in Rust. We highlight common performance pitfalls, along with strategies to detect and resolve these issues early. We move on to mastering Rust's type system, which will enable us to create impressive optimizations in both performance and safety at compile time. You will then learn how to effectively manage memory in Rust, mastering the borrow checker. We move on to measuring performance and you will see how this affects the way you write code. Moving ahead, you will perform metaprogramming in Rust to boost the performance of your code and your productivity. You will finally learn parallel programming in Rust, which enables efficient and faster execution by using multithreading and asynchronous programming. Style and approach You'll embark on a learning journey that will teach about you deep-core concepts in the Rust language. Learning those concepts—such as understanding the borrow checker—will make you competent to write more efficient Rust code. To learn those core concepts, you'll perform practical work and see for yourself how specific patterns improve the performance of your code.
Cloud Security Automation
Cloud Security Automation
Prashant Priyam
¥81.74
Secure public and private cloud workloads with this comprehensive learning guide. About This Book ? Take your cloud security functions to the next level by automation ? Learn to automate your security functions on AWS and OpenStack ? Practical approach towards securing your workloads efficiently Who This Book Is For This book is targeted at DevOps Engineers, Security professionals, or any stakeholders responsible for securing cloud workloads. Prior experience with AWS or OpenStack will be an advantage. What You Will Learn ? Define security for public and private cloud services ? Address the security concerns of your cloud ? Understand Identity and Access Management ? Get acquainted with cloud storage and network security ? Improve and optimize public and private cloud security ? Automate cloud security ? Understand the security compliance requirements of your cloud In Detail Security issues are still a major concern for all IT organizations. For many enterprises, the move to cloud computing has raised concerns for security, but when applications are architected with focus on security, cloud platforms can be made just as secure as on-premises platforms. Cloud instances can be kept secure by employing security automation that helps make your data meet your organization's security policy. This book starts with the basics of why cloud security is important and how automation can be the most effective way of controlling cloud security. You will then delve deeper into the AWS cloud environment and its security services by dealing with security functions such as Identity and Access Management and will also learn how these services can be automated. Moving forward, you will come across aspects such as cloud storage and data security, automating cloud deployments, and so on. Then, you'll work with OpenStack security modules and learn how private cloud security functions can be automated for better time- and cost-effectiveness. Toward the end of the book, you will gain an understanding of the security compliance requirements for your Cloud. By the end of this book, you will have hands-on experience of automating your cloud security and governance. Style and approach This book follows a step-by-step, practical approach to help automate and secure your cloud account structure in an Amazon Web Services (AWS) and OpenStack environment.
Practical Cyber Intelligence
Practical Cyber Intelligence
Wilson Bautista Jr.
¥81.74
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation. About This Book ? Intelligence processes and procedures for response mechanisms ? Master F3EAD to drive processes based on intelligence ? Threat modeling and intelligent frameworks ? Case studies and how to go about building intelligent teams Who This Book Is For This book targets incident managers, malware analysts, reverse engineers, digital forensics specialists, and intelligence analysts; experience in, or knowledge of, security operations, incident responses or investigations is desirable so you can make the most of the subjects presented. What You Will Learn ? Learn about the Observe-Orient-Decide-Act (OODA) loop and it's applicability to security ? Understand tactical view of Active defense concepts and their application in today's threat landscape ? Get acquainted with an operational view of the F3EAD process to drive decision making within an organization ? Create a Framework and Capability Maturity Model that integrates inputs and outputs from key functions in an information security organization ? Understand the idea of communicating with the Potential for Exploitability based on cyber intelligence In Detail Cyber intelligence is the missing link between your cyber defense operation teams, threat intelligence, and IT operations to provide your organization with a full spectrum of defensive capabilities. This book kicks off with the need for cyber intelligence and why it is required in terms of a defensive framework. Moving forward, the book provides a practical explanation of the F3EAD protocol with the help of examples. Furthermore, we learn how to go about threat models and intelligence products/frameworks and apply them to real-life scenarios. Based on the discussion with the prospective author I would also love to explore the induction of a tool to enhance the marketing feature and functionality of the book. By the end of this book, you will be able to boot up an intelligence program in your organization based on the operation and tactical/strategic spheres of Cyber defense intelligence. Style and approach A step-by-step practical guide that will help you master defensive frameworks to secure your system, and the F3EAD protocol to help you boot up an intelligence program in your organization.
Mobile DevOps
Mobile DevOps
Rohin Tak,Jhalak Modi
¥81.74
This step-by-step guide will teach you to continuously improve your mobile application development process About This Book ? Efficiently deliver continuous integration and deployment within all the stages of your application's lifecycle ? Learn to implement mobile DevOps with Xamarin and Visual Studio ? Deliver high quality and performing mobile applications Who This Book Is For If you are a programmer and developer who wants to increase the efficiency and scalability of your mobile application with the implementation of DevOps, then this book is for you. You need basic experience of the application process development. What You Will Learn ? Become fluent with the basic components of Mobile Devops ? Find out how to use code repositories and install Git on an EC2 server and manage users and groups ? Set up an Android device for development and install Visual Studio and Xamarin on Windows ? Create an Android project and UI for applications ? Add permissions to Android Manifest ? Write tests with Xamarin. UI and test using test cloud to check it on multiple devices ? Monitor and optimize the application using the Android monitoring tool ? Debug the mobile application and improve its efficiency In Detail Today's world is all about perfection, and there are hundreds of applications that are released each day out of which only a few succeed. Making sure that the app looks, performs, and behaves as expected is one of the biggest challenge developers face today. The main goal of this book is to teach developers to implement DevOps to build, test, and deliver. This book will teach you to implement Mobile DevOps at every stage of your application's lifecycle with Visual Studio and Xamarin Mobile Lifecycle solutions. Later, it will also show you how to leverage Mobile Center's continuous integration and automated testing to develop a high-quality applications. Next, you’ll see how to mobilize your on-premises data to the cloud and increase your productivity with code reuse. Finally, you’ll discover how to find and fix bugs beforehand, improving the efficiency of your application while it is being developed. By the end of this book, you will be well-versed with Mobile DevOps techniques, delivering high quality and high performance mobile apps. Style and approach This clear, concise, and straightforward book will make you aware of mobile applications by showing you Devops fundamentals such as building, testing, and delivery. This book has been created to help you put new ideas into practice, and demonstrate precisely what's possible with mobile Devops.