万本电子书0元读

万本电子书0元读

Generative Adversarial Networks Cookbook
Generative Adversarial Networks Cookbook
Josh Kalin
¥81.74
Simplify next-generation deep learning by implementing powerful generative models using Python, TensorFlow and Keras Key Features *Understand the common architecture of different types of GANs *Train, optimize, and deploy GAN applications using TensorFlow and Keras *Build generative models with real-world data sets, including 2D and 3D data Book Description Developing Generative Adversarial Networks (GANs) is a complex task, and it is often hard to find code that is easy to understand. This book leads you through eight different examples of modern GAN implementations, including CycleGAN, simGAN, DCGAN, and 2D image to 3D model generation. Each chapter contains useful recipes to build on a common architecture in Python, TensorFlow and Keras to explore increasingly difficult GAN architectures in an easy-to-read format. The book starts by covering the different types of GAN architecture to help you understand how the model works. This book also contains intuitive recipes to help you work with use cases involving DCGAN, Pix2Pix, and so on. To understand these complex applications, you will take different real-world data sets and put them to use. By the end of this book, you will be equipped to deal with the challenges and issues that you may face while working with GAN models, thanks to easy-to-follow code solutions that you can implement right away. What you will learn *Structure a GAN architecture in pseudocode *Understand the common architecture for each of the GAN models you will build *Implement different GAN architectures in TensorFlow and Keras *Use different datasets to enable neural network functionality in GAN models *Combine different GAN models and learn how to fine-tune them *Produce a model that can take 2D images and produce 3D models *Develop a GAN to do style transfer with Pix2Pix Who this book is for This book is for data scientists, machine learning developers, and deep learning practitioners looking for a quick reference to tackle challenges and tasks in the GAN domain. Familiarity with machine learning concepts and working knowledge of Python programming language will help you get the most out of the book.
Mastering Ceph
Mastering Ceph
Nick Fisk
¥81.74
Discover the unified, distributed storage system and improve the performance of applications Key Features * Explore the latest features of Ceph's Mimic release * Get to grips with advanced disaster and recovery practices for your storage * Harness the power of Reliable Autonomic Distributed Object Store (RADOS) to help you optimize storage systems Book Description Ceph is an open source distributed storage system that is scalable to Exabyte deployments. This second edition of Mastering Ceph takes you a step closer to becoming an expert on Ceph. You’ll get started by understanding the design goals and planning steps that should be undertaken to ensure successful deployments. In the next sections, you’ll be guided through setting up and deploying the Ceph cluster with the help of orchestration tools. This will allow you to witness Ceph’s scalability, erasure coding (data protective) mechanism, and automated data backup features on multiple servers. You’ll then discover more about the key areas of Ceph including BlueStore, erasure coding and cache tiering with the help of examples. Next, you’ll also learn some of the ways to export Ceph into non-native environments and understand some of the pitfalls that you may encounter. The book features a section on tuning that will take you through the process of optimizing both Ceph and its supporting infrastructure. You’ll also learn to develop applications, which use Librados and distributed computations with shared object classes. Toward the concluding chapters, you’ll learn to troubleshoot issues and handle various scenarios where Ceph is not likely to recover on its own. By the end of this book, you’ll be able to master storage management with Ceph and generate solutions for managing your infrastructure. What you will learn * Plan, design and deploy a Ceph cluster * Get well-versed with different features and storage methods * Carry out regular maintenance and daily operations with ease * Tune Ceph for improved ROI and performance * Recover Ceph from a range of issues * Upgrade clusters to BlueStore Who this book is for If you are a storage professional, system administrator, or cloud engineer looking for guidance on building powerful storage solutions for your cloud and on-premise infrastructure, this book is for you.
Hands-On Cloud-Native Microservices with Jakarta EE
Hands-On Cloud-Native Microservices with Jakarta EE
Luigi Fugaro
¥81.74
Discover how cloud-native microservice architecture helps you to build dynamically scalable applications by using the most widely used and adopted runtime environments Key Features * Build robust cloud-native applications using a variety of tools * Understand how to configure both Amazon Web Services (AWS) and Docker clouds for high availability * Explore common design patterns used in building and deploying microservices architecture. Book Description Businesses today are evolving rapidly, and developers now face the challenge of building applications that are resilient, flexible, and native to the cloud. To achieve this, you'll need to be aware of the environment, tools, and resources that you're coding against. The book will begin by introducing you to cloud-native architecture and simplifying the major concepts. You'll learn to build microservices in Jakarta EE using MicroProfile with Thorntail and Narayana LRA. You'll then delve into cloud-native application x-rays, understanding the MicroProfile specification and the implementation/testing of microservices. As you progress further, you'll focus on continuous integration and continuous delivery, in addition to learning how to dockerize your services. You'll also cover concepts and techniques relating to security, monitoring, and troubleshooting problems that might occur with applications after you've written them. By the end of this book, you will be equipped with the skills you need to build highly resilient applications using cloud-native microservice architecture. What you will learn * Integrate reactive principles in MicroProfile microservices architecture * Explore the 12-factors-app paradigm and its implications * Get the best out of Java versions 8 and 9 to implement a microservice based on Thorntail * Understand what OpenShift is and why it is so important for an elastic architecture * Build a Linux container image using Docker and scale the application using Kubernetes * Implement various patterns such as, Circuit Breaker and bulkheads * Get to grips with the DevOps methodology using continuous integration (CI) and continuous deployment (CD) Who this book is for This book is for developers with basic knowledge of Java EE and HTTP-based application principles who want to learn how to build, test and scale Java EE microservices. No prior experience of writing microservices in Java EE is required.
Hands-On Cybersecurity for Finance
Hands-On Cybersecurity for Finance
Dr. Erdal Ozkaya
¥81.74
A comprehensive guide that will give you hands-on experience to study and overcome financial cyber threats Key Features * Protect your financial environment with cybersecurity practices and methodologies * Identify vulnerabilities such as data manipulation and fraudulent transactions * Provide end-to-end protection within organizations Book Description Organizations have always been a target of cybercrime. Hands-On Cybersecurity for Finance teaches you how to successfully defend your system against common cyber threats, making sure your financial services are a step ahead in terms of security. The book begins by providing an overall description of cybersecurity, guiding you through some of the most important services and technologies currently at risk from cyber threats. Once you have familiarized yourself with the topic, you will explore specific technologies and threats based on case studies and real-life scenarios. As you progress through the chapters, you will discover vulnerabilities and bugs (including the human risk factor), gaining an expert-level view of the most recent threats. You'll then explore information on how you can achieve data and infrastructure protection. In the concluding chapters, you will cover recent and significant updates to procedures and configurations, accompanied by important details related to cybersecurity research and development in IT-based financial services. By the end of the book, you will have gained a basic understanding of the future of information security and will be able to protect financial services and their related infrastructures. What you will learn * Understand the cyber threats faced by organizations * Discover how to identify attackers * Perform vulnerability assessment, software testing, and pentesting * Defend your financial cyberspace using mitigation techniques and remediation plans * Implement encryption and decryption * Understand how Artificial Intelligence (AI) affects cybersecurity Who this book is for Hands-On Cybersecurity for Finance is for you if you are a security architect, cyber risk manager, or pentester looking to secure your organization. Basic understanding of cybersecurity tools and practices will help you get the most out of this book.
Learn Microsoft Azure
Learn Microsoft Azure
Mohamed Wali
¥81.74
Explore various Azure services to build solutions that leverage effective design patterns Key Features *Create, deploy, and host cloud applications on Azure *Understand various Azure services that help you host serverless applications *Explore practical examples to help you secure and troubleshoot your cloud environment Book Description Azure is one of the leading public cloud service providers. Thanks to a number of Azure service updates, it continues to make advances in the realm of cloud computing. Learn Microsoft Azure starts with the fundamentals of cloud computing. You will learn to configure and set up the Azure infrastructure. As you make your way through the book, you'll explore Azure services, along with working on virtual memory systems (VMS) and deployment models. You will understand various services in the Azure ecosystem, such as Azure IoT and Azure Analytics, among others. An easy-to-follow introduction to various cloud design patterns will also add to your efficiency in designing cloud solutions. In the concluding chapters, you'll secure your virtual networks using Network security groups and configure Azure Active Directory (Azure AD) to set a custom domain name and company profile. By the end of this book, you will have learned to secure and troubleshoot your Azure cloud environment and be fully aware of best practices for Azure cloud administration. What you will learn *Understand the cloud services offered by Azure *Design storage and networks in Azure for your Azure VM *Work with web apps and Azure SQL databases *Build your identity management solutions on Azure using Azure AD *Monitor, protect, and automate your Azure services using Operation Management Suite (OMS) *Implement OMS for Azure services Who this book is for Learn Microsoft Azure is for administrators, cloud engineers, and developers who want to get started with using Azure as their cloud platform and build cloud-based applications for their enterprises.
Kali Linux - An Ethical Hacker's Cookbook
Kali Linux - An Ethical Hacker's Cookbook
Himanshu Sharma
¥81.74
Discover end-to-end penetration testing solutions to enhance your ethical hacking skills Key Features * Practical recipes to conduct effective penetration testing using the latest version of Kali Linux * Leverage tools like Metasploit, Wireshark, Nmap, and more to detect vulnerabilities with ease * Confidently perform networking and application attacks using task-oriented recipes Book Description Many organizations have been affected by recent cyber events. At the current rate of hacking, it has become more important than ever to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2018.4 / 2019), in addition to covering the core functionalities. The book will get you off to a strong start by introducing you to the installation and configuration of Kali Linux, which will help you to perform your tests. You will also learn how to plan attack strategies and perform web application exploitation using tools such as Burp and JexBoss. As you progress, you will get to grips with performing network exploitation using Metasploit, Sparta, and Wireshark. The book will also help you delve into the technique of carrying out wireless and password attacks using tools such as Patator, John the Ripper, and airoscript-ng. Later chapters will draw focus to the wide range of tools that help in forensics investigations and incident response mechanisms. As you wrap up the concluding chapters, you will learn to create an optimum quality pentest report. By the end of this book, you will be equipped with the knowledge you need to conduct advanced penetration testing, thanks to the book’s crisp and task-oriented recipes. What you will learn * Learn how to install, set up and customize Kali for pentesting on multiple platforms * Pentest routers and embedded devices * Get insights into fiddling around with software-defined radio * Pwn and escalate through a corporate network * Write good quality security reports * Explore digital forensics and memory analysis with Kali Linux Who this book is for If you are an IT security professional, pentester, or security analyst who wants to conduct advanced penetration testing techniques, then this book is for you. Basic knowledge of Kali Linux is assumed.
Hands-On Machine Learning for Cybersecurity
Hands-On Machine Learning for Cybersecurity
Soma Halder
¥81.74
Get into the world of smart data security using machine learning algorithms and Python libraries Key Features *Learn machine learning algorithms and cybersecurity fundamentals *Automate your daily workflow by applying use cases to many facets of security *Implement smart machine learning solutions to detect various cybersecurity problems Book Description Cyber threats today are one of the costliest losses that an organization can face. In this book, we use the most efficient tool to solve the big problems that exist in the cybersecurity domain. The book begins by giving you the basics of ML in cybersecurity using Python and its libraries. You will explore various ML domains (such as time series analysis and ensemble modeling) to get your foundations right. You will implement various examples such as building system to identify malicious URLs, and building a program to detect fraudulent emails and spam. Later, you will learn how to make effective use of K-means algorithm to develop a solution to detect and alert you to any malicious activity in the network. Also learn how to implement biometrics and fingerprint to validate whether the user is a legitimate user or not. Finally, you will see how we change the game with TensorFlow and learn how deep learning is effective for creating models and training systems What you will learn *Use machine learning algorithms with complex datasets to implement cybersecurity concepts *Implement machine learning algorithms such as clustering, k-means, and Naive Bayes to solve real-world problems *Learn to speed up a system using Python libraries with NumPy, Scikit-learn, and CUDA *Understand how to combat malware, detect spam, and fight financial fraud to mitigate cyber crimes *Use TensorFlow in the cybersecurity domain and implement real-world examples *Learn how machine learning and Python can be used in complex cyber issues Who this book is for This book is for the data scientists, machine learning developers, security researchers, and anyone keen to apply machine learning to up-skill computer security. Having some working knowledge of Python and being familiar with the basics of machine learning and cybersecurity fundamentals will help to get the most out of the book
Linux Administration Cookbook
Linux Administration Cookbook
Adam K. Dean
¥81.74
Over 100 recipes to get up and running with the modern Linux administration ecosystem Key Features *Understand and implement the core system administration tasks in Linux *Discover tools and techniques to troubleshoot your Linux system *Maintain a healthy system with good security and backup practices Book Description Linux is one of the most widely used operating systems among system administrators,and even modern application and server development is heavily reliant on the Linux platform. The Linux Administration Cookbook is your go-to guide to get started on your Linux journey. It will help you understand what that strange little server is doing in the corner of your office, what the mysterious virtual machine languishing in Azure is crunching through, what that circuit-board-like thing is doing under your office TV, and why the LEDs on it are blinking rapidly. This book will get you started with administering Linux, giving you the knowledge and tools you need to troubleshoot day-to-day problems, ranging from a Raspberry Pi to a server in Azure, while giving you a good understanding of the fundamentals of how GNU/Linux works. Through the course of the book, you’ll install and configure a system, while the author regales you with errors and anecdotes from his vast experience as a data center hardware engineer, systems administrator, and DevOps consultant. By the end of the book, you will have gained practical knowledge of Linux, which will serve as a bedrock for learning Linux administration and aid you in your Linux journey. What you will learn *Install and manage a Linux server, both locally and in the cloud *Understand how to perform administration across all Linux distros *Work through evolving concepts such as IaaS versus PaaS, containers, and automation *Explore security and configuration best practices *Troubleshoot your system if something goes wrong *Discover and mitigate hardware issues, such as faulty memory and failing drives Who this book is for If you are a system engineer or system administrator with basic experience of working with Linux, this book is for you.
C++ Data Structures and Algorithms
C++ Data Structures and Algorithms
Wisnu Anggoro
¥81.74
Learn how to build efficient, secure and robust code in C++ by using data structures and algorithms - the building blocks of C++ About This Book ? Use data structures such as arrays, stacks, trees, lists, and graphs with real-world examples ? Learn the functional and reactive implementations of the traditional data structures ? Explore illustrations to present data structures and algorithms, as well as their analysis, in a clear, visual manner Who This Book Is For This book is for developers who would like to learn the Data Structures and Algorithms in C++. Basic C++ programming knowledge is expected. What You Will Learn ? Know how to use arrays and lists to get better results in complex scenarios ? Build enhanced applications by using hashtables, dictionaries, and sets ? Implement searching algorithms such as linear search, binary search, jump search, exponential search, and more ? Have a positive impact on the efficiency of applications with tree traversal ? Explore the design used in sorting algorithms like Heap sort, Quick sort, Merge sort and Radix sort ? Implement various common algorithms in string data types ? Find out how to design an algorithm for a specific task using the common algorithm paradigms In Detail C++ is a general-purpose programming language which has evolved over the years and is used to develop software for many different sectors. This book will be your companion as it takes you through implementing classic data structures and algorithms to help you get up and running as a confident C++ programmer. We begin with an introduction to C++ data structures and algorithms while also covering essential language constructs. Next, we will see how to store data using linked lists, arrays, stacks, and queues. Then, we will learn how to implement different sorting algorithms, such as quick sort and heap sort. Along with these, we will dive into searching algorithms such as linear search, binary search and more. Our next mission will be to attain high performance by implementing algorithms to string datatypes and implementing hash structures in algorithm design. We'll also analyze Brute Force algorithms, Greedy algorithms, and more. By the end of the book, you'll know how to build components that are easy to understand, debug, and use in different applications. Style and approach Readers will be taken through an indispensable list of data structures and algorithms so they can confidently begin coding in C++.
React 16 Tooling
React 16 Tooling
Adam Boduch
¥81.74
React 16 Tooling covers the most important tools, utilities, and libraries that every React developer needs to know - in detail. About This Book ? Each chapter presents meta-development solutions to help React developers ? The tools used are presented in a practical, solution-oriented approach with no fluff ? The chapters are arranged in a logical order that mirrors a typical React development workflow, but you are free to tweak the approaches discussed to fit your own unique style Who This Book Is For This book is for React developers of any skill level who want to make their lives easier. It helps to have some familiarity with React, but if you are an experienced web developer looking at React, then this book will show you how to build a resilient toolset around you before you begin. What You Will Learn ? Bootstrap a React application using create-react-app ? Isolate React component development using Storybook ? Write effective unit tests for your React components using Jest ? Ensure that your component code is to standard using ESLint ? Use browser extensions and built-in component instrumentation to debug React applications ? Enable type safety in React components with Flowtype ? Deploy React applications inside a Docker container as part of a larger application stack In Detail React 16 Tooling covers the most important tools, utilities, and libraries that every React developer needs to know - in detail. As React has grown, the amazing toolset around it has also grown, adding features and enhancing the development workflow. Each of these essential tools is presented in a practical manner and in a logical order mirroring the development workflow. These tools will make your development life simpler and happier, enabling you to create better and more performant apps. Adam starts with a hand-picked selection of the best tools for the React 16 ecosystem. For starters, there's the create-react-app utility that's officially supported by the React team. Not only does this tool bootstrap your React project for you, it also provides a consistent and stable framework to build upon. The premise is that when you don't have to think about meta development work, more focus goes into the product itself. Other React tools follow this same approach to automating and improving your development life. Jest makes unit testing quicker. Flow makes catching errors easier. Docker containers make deployment in a stack simpler. Storybook makes developing components straightforward. ESLint makes writing standardized code faster. The React DevTools plugin makes debugging a cinch. React 16 Tooling clears away the barriers so you can focus on developing the good parts. In this book, we'll look at each of these powerful tools in detail, showing you how to build the perfect React ecosystem to develop your apps within. Style and approach This book covers React tools that help developers with the most relevant challenges they face today. Each chapter begins by defining the challenge faced by developers and why the tool is required, then shows how to fix the problem using React tooling.
Ionic Cookbook
Ionic Cookbook
Indermohan Singh,Hoc Phan
¥81.74
Solve all your Ionic-related issues through dedicated recipes that will help you get the best out of Ionic. Working with Ionic components to find out the best way to share data between them effectively. About This Book ? Leverage Ionic 3.9 and its exciting new features to create cutting-edge, real-time apps ? Work through simple recipes to address your problems directly and solve them effectively ? Get examples at each step to guide you on your learning curve with Angular Who This Book Is For This book targets JavaScript developers. No previous knowledge of Ionic is necessary, but prior knowledge of web development techniques would be useful. What You Will Learn ? Help readers to jump-start Ionic apps ? Explore essential features of Ionic with examples ? Learn how to use native device functionalities ? Make the best use of the REST API to handle back-end services ? Work with Cordova to support native functionalities on both iOS and Android. ? Master advanced topics in app development such as deep linking and lazy loading In Detail Ionic is the preferred choice for JavaScript developers to develop real-time hybrid applications. This book will get you started with Ionic 3.9 and help you create Angular 5 components that interact with templates. You will work with Ionic components and find out how to share data efficiently between them. You'll discover how to make the best use of the REST API to handle back-end services and then move on to animating your application to make it look pretty. You then learn to add in a local push notification in order to test the app. Then you'll work with Cordova to support native functionalities on both iOS and Android. From there, you'll get to grips with using the default themes for each platform and customizing your own. We then take you through the advanced Ionic features like lazy loading, deep linking, localizing ionic apps etc. Finally, you'll see how best to deploy your app to different platforms. This book will solve all your Ionic-related issues through dedicated recipes that will help you get the best out of Ionic. Style and approach The book's recipe-based approach will help you get the best out of Ionic 3.9
Kubernetes for Developers
Kubernetes for Developers
Joseph Heck
¥81.74
A developer's field-guide to designing scalable services using Kubernetes About This Book ? Develop and run your software using containers within a Kubernetes environment ? Get hands-on experience of using Kubernetes with DevOps concepts such as continuous integration, benchmark testing, monitoring, and so on ? Pragmatic example-based approach showing how to use Kubernetes in the development process Who This Book Is For If you are a full-stack or back-end software developers interested, curious, or being asked to test as well as run the code you're creating, you can leverage Kubernetes to make that process simpler and consistent regardless of where you deploy. If you're looking for developer focused examples in NodeJS and Python for how to build, test, deploy, and run your code with Kubernetes, this is perfect for you. What You Will Learn ? Build your software into containers ? Deploy and debug software running in containers within Kubernetes ? Declare and add configuration through Kubernetes ? Define how your application fits together, using internal and external services ? Add feedback to your code to help Kubernetes manage your services ? Monitor and measure your services through integration testing and in production deployments In Detail Kubernetes is documented and typically approached from the perspective of someone running software that has already been built. Kubernetes may also be used to enhance the development process, enabling more consistent testing and analysis of code to help developers verify not only its correctness, but also its efficiency. This book introduces key Kubernetes concepts, coupled with examples of how to deploy and use them with a bit of Node.js and Python example code, so that you can quickly replicate and use that knowledge. You will begin by setting up Kubernetes to help you develop and package your code. We walk you through the setup and installation process before working with Kubernetes in the development environment. We then delve into concepts such as automating your build process, autonomic computing, debugging, and integration testing. This book covers all the concepts required for a developer to work with Kubernetes. By the end of this book, you will be in a position to use Kubernetes in development ecosystems. Style and approach This book will cover examples using NodeJS and Python that walk you through building containers, defining your deployments, deploying, debugging, testing, and generally interacting with your code running on Kubernetes. The examples are focused on common development needs, and include pragmatic advice and the explanations behind that advice.
Django Design Patterns and Best Practices
Django Design Patterns and Best Practices
Arun Ravindran
¥81.74
Build maintainable websites with elegant Django design patterns and modern best practices About This Book ? Explore aspects of Django from Models and Views to testing and deployment ? Understand the nuances of web development such as browser attack and data design ? Walk through various asynchronous tools such as Celery and Channels Who This Book Is For This book is for you whether you’re new to Django or just want to learn its best practices. You do not have to be an expert in Django or Python. No prior knowledge of patterns is expected for reading this book but it would be helpful. What You Will Learn ? Make use of common design patterns to help you write better code ? Implement best practices and idioms in this rapidly evolving framework ? Deal with legacy code and debugging ? Use asynchronous tools such as Celery, Channels, and asyncio ? Use patterns while designing API interfaces with the Django REST Framework ? Reduce the maintenance burden with well-tested, cleaner code ? Host, deploy, and secure your Django projects In Detail Building secure and maintainable web applications requires comprehensive knowledge. The second edition of this book not only sheds light on Django, but also encapsulates years of experience in the form of design patterns and best practices. Rather than sticking to GoF design patterns, the book looks at higher-level patterns. Using the latest version of Django and Python, you’ll learn about Channels and asyncio while building a solid conceptual background. The book compares design choices to help you make everyday decisions faster in a rapidly changing environment. You’ll first learn about various architectural patterns, many of which are used to build Django. You’ll start with building a fun superhero project by gathering the requirements, creating mockups, and setting up the project. Through project-guided examples, you’ll explore the Model, View, templates, workflows, and code reusability techniques. In addition to this, you’ll learn practical Python coding techniques in Django that’ll enable you to tackle problems related to complex topics such as legacy coding, data modeling, and code reusability. You’ll discover API design principles and best practices, and understand the need for asynchronous workflows. During this journey, you’ll study popular Python code testing techniques in Django, various web security threats and their countermeasures, and the monitoring and performance of your application. Style and approach This comprehensive project-driven guide will enhance your skill set by taking you through the well-known design patterns and industry-standard best practices in Django web development.
Hands-On Functional Programming in Rust
Hands-On Functional Programming in Rust
Andrew Johnson
¥81.74
Explore the support Rust offers for creating functional applications in Rust. Learn about various design patterns, implementing concurrency, metaprogramming, and so on in the process About This Book ? Learn generics, organization, and design patterns in functional programming ? Modularize your applications and make them highly reusable and testable using functional design patterns ? Get familiar with complex concepts such as metaprogramming, concurrency, and immutability Who This Book Is For This book is for Rust developers who are comfortable with the language and now want to improve their coding abilities by learning advanced functional techniques to enhance their skillset and create robust and testable apps. What You Will Learn ? How Rust supports the use of basic functional programming principles ? Use functional programming to handle concurrency with elegance ? Read and interpret complex type signatures for types and functions ? Implement powerful abstractions using meta programming in Rust ? Create quality code formulaically using Rust's functional design patterns ? Master Rust's complex ownership mechanisms particularly for mutability In Detail Functional programming allows developers to divide programs into smaller, reusable components that ease the creation, testing, and maintenance of software as a whole. Combined with the power of Rust, you can develop robust and scalable applications that fulfill modern day software requirements. This book will help you discover all the Rust features that can be used to build software in a functional way. We begin with a brief comparison of the functional and object-oriented approach to different problems and patterns. We then quickly look at the patterns of control flow, data the abstractions of these unique to functional programming. The next part covers how to create functional apps in Rust; mutability and ownership, which are exclusive to Rust, are also discussed. Pure functions are examined next and you'll master closures, their various types, and currying. We also look at implementing concurrency through functional design principles and metaprogramming using macros. Finally, we look at best practices for debugging and optimization. By the end of the book, you will be familiar with the functional approach of programming and will be able to use these techniques on a daily basis. Style and approach Step-by-step guide covering advanced concepts and building functional applications in Rust
Cloud Security Automation
Cloud Security Automation
Prashant Priyam
¥81.74
Secure public and private cloud workloads with this comprehensive learning guide. About This Book ? Take your cloud security functions to the next level by automation ? Learn to automate your security functions on AWS and OpenStack ? Practical approach towards securing your workloads efficiently Who This Book Is For This book is targeted at DevOps Engineers, Security professionals, or any stakeholders responsible for securing cloud workloads. Prior experience with AWS or OpenStack will be an advantage. What You Will Learn ? Define security for public and private cloud services ? Address the security concerns of your cloud ? Understand Identity and Access Management ? Get acquainted with cloud storage and network security ? Improve and optimize public and private cloud security ? Automate cloud security ? Understand the security compliance requirements of your cloud In Detail Security issues are still a major concern for all IT organizations. For many enterprises, the move to cloud computing has raised concerns for security, but when applications are architected with focus on security, cloud platforms can be made just as secure as on-premises platforms. Cloud instances can be kept secure by employing security automation that helps make your data meet your organization's security policy. This book starts with the basics of why cloud security is important and how automation can be the most effective way of controlling cloud security. You will then delve deeper into the AWS cloud environment and its security services by dealing with security functions such as Identity and Access Management and will also learn how these services can be automated. Moving forward, you will come across aspects such as cloud storage and data security, automating cloud deployments, and so on. Then, you'll work with OpenStack security modules and learn how private cloud security functions can be automated for better time- and cost-effectiveness. Toward the end of the book, you will gain an understanding of the security compliance requirements for your Cloud. By the end of this book, you will have hands-on experience of automating your cloud security and governance. Style and approach This book follows a step-by-step, practical approach to help automate and secure your cloud account structure in an Amazon Web Services (AWS) and OpenStack environment.
Hands-On Cybersecurity with Blockchain
Hands-On Cybersecurity with Blockchain
Rajneesh Gupta
¥81.74
Develop blockchain application with step-by-step instructions, working example and helpful recommendations About This Book ? Understanding the blockchain technology from the cybersecurity perspective ? Developing cyber security solutions with Ethereum blockchain technology ? Understanding real-world deployment of blockchain based applications Who This Book Is For The book is targeted towards security professionals, or any stakeholder dealing with cybersecurity who wants to understand the next-level of securing infrastructure using Blockchain. Basic understanding of Blockchain can be an added advantage. What You Will Learn ? Understand the cyberthreat landscape ? Learn about Ethereum and Hyperledger Blockchain ? Program Blockchain solutions ? Build Blockchain-based apps for 2FA, and DDoS protection ? Develop Blockchain-based PKI solutions and apps for storing DNS entries ? Challenges and the future of cybersecurity and Blockchain In Detail Blockchain technology is being welcomed as one of the most revolutionary and impactful innovations of today. Blockchain technology was first identified in the world’s most popular digital currency, Bitcoin, but has now changed the outlook of several organizations and empowered them to use it even for storage and transfer of value. This book will start by introducing you to the common cyberthreat landscape and common attacks such as malware, phishing, insider threats, and DDoS. The next set of chapters will help you to understand the workings of Blockchain technology, Ethereum and Hyperledger architecture and how they fit into the cybersecurity ecosystem. These chapters will also help you to write your first distributed application on Ethereum Blockchain and the Hyperledger Fabric framework. Later, you will learn about the security triad and its adaptation with Blockchain. The last set of chapters will take you through the core concepts of cybersecurity, such as DDoS protection, PKI-based identity, 2FA, and DNS security. You will learn how Blockchain plays a crucial role in transforming cybersecurity solutions. Toward the end of the book, you will also encounter some real-world deployment examples of Blockchain in security cases, and also understand the short-term challenges and future of cybersecurity with Blockchain. Style and approach This book will follow a practical approach to help understand blockchain technology to transform cybersecurity solutions
Puppet 5 Cookbook
Puppet 5 Cookbook
Thomas Uphill
¥81.74
Write custom plugins for Puppet, including facts, providers, and functions About This Book ? Grasp recipes that work with centralized and decentralized deployments ? Explore language differences and enhancements anticipated in Puppet version 5.x ? Gain expert understanding of Puppet's latest and most advanced features Who This Book Is For Puppet 5 Cookbook is for anyone who builds and administers servers, especially in a web operations context. You’ll need some experience of Linux systems administration, including familiarity with the command line, filesystem, and text editing. No prior programming experience is required. What You Will Learn ? Discover the latest and most advanced features of Puppet ? Bootstrap your Puppet installation using powerful tools like Rake ? Master techniques to deal with centralized and decentralized Puppet deployments ? Use exported resources and forge modules to set up Puppet modules ? Create efficient manifests to streamline your deployments ? Automate Puppet master deployment using Git hooks and PuppetDB ? Make Puppet reliable, performant, and scalable In Detail Puppet is a configuration management system that automates all your IT configurations, giving you control of managing each node.Puppet 5 Cookbook will take you through Puppet's latest and most advanced features, including Docker containers, Hiera, and AWS Cloud Orchestration. Updated with the latest advancements and best practices, this book delves into various aspects of writing good Puppet code, which includes using Puppet community style, checking your manifests with puppet-lint, and learning community best practices with an emphasis on real-world implementation. You will learn to set up, install, and create your first manifests with Puppet version control, and also understand various sysadmin tasks, including managing config files, using Augeas, and generating files from snippets and templates. As the book progresses, you’ll explore virtual resources and use Puppet's resource scheduling and auditing features. In the concluding chapters, you’ll walk through managing applications and writing your own resource types, providers, and external node classifiers. By the end of this book, you will have learned to report, log, and debug your system. Style and approach A recipe-based guide filled with quick step-by-step instructions that are immediately applicable
Mastering Firebase for Android Development
Mastering Firebase for Android Development
Ashok Kumar S
¥81.74
Develop a fully functional dynamic Android application using the latest features of Firebase About This Book ? Explore all the latest tools in Firebase—Firebase Firestore, ML-Kit, and Firebase Predictions ? Master Firebase cloud messaging, remote configuration, and work with a real-time database ? Make your app a global success with the help of Google Analytics and AdMob Who This Book Is For Mastering Firebase for Android Development is for individualslooking to extend their skills with Firebase and build faster, scalable, and real-time mobile applications. Basic understanding of Android programming is necessary. In all, this in-depth guide is an accessible pathway to mastering Firebase. What You Will Learn ? Learn about Firebase push notifications and write backend functionalities ? Identify the root cause of an application crash and diagnose and fix bugs ? Store different Multipurpose Internet MailExtension(MIME) type files ? Explore web hosting and connect the Firebase functions to the host website ? Send push notifications and understand the deep integration of analytics tools and cohorts ? Market and monetize your application using Firebase Adwords and Admob ? Build a secure authentication framework while enhancing the sign-in and on-boarding experience for end users In Detail Firebase offers a wide spectrum of tools and services to help you develop high-quality apps in a short period of time. It also allows you to build web and mobile apps quickly without managing the infrastructure.Mastering Firebase for Android Development takes you through the complete toolchain of Firebase,including the latest tools announced in Google IO 2018 such as Firebase ML-Kit, FireStore, and Firebase Predictions. The book begins by teaching you to configure your development environment with Firebase and set up a different structure for a Firebase real-time database. As you make your way through the chapters, you’ll establish the authentication feature in Android and explore email and phone authentication for managing the on-boarding of users. You’ll be taken through topics on Firebase crash reporting, Firebase functions, Firebase Cloud, Firebase Hosting, and Cloud Messaging for push notifications and explore other key areas in depth. In the concluding chapters, you will learn to use Firebase Test Lab to test your application before using Firebase Performance Monitoring to trace performance setbacks. By the end of the book, you will be well equipped with the Firebase ecosystem, which will help you find solutions to your common application development challenges. Style and approach A step by step guide taking you through the different features of Firebase
Robot Operating System Cookbook
Robot Operating System Cookbook
Kumar Bipin
¥81.74
Leverage the power of ROS to build exciting collaborative robots. About This Book ? Delve into an open source, meta-operating system for your robot ? Get acquainted with tools and libraries for building and running code on multiple platforms ? Use Gazebo to model your robot and create a virtual environment Who This Book Is For If you’re a researcher or engineer with an interest in the problems, solutions, and future research issues that you may encounter in the development of robotic applications, this book is for you. Basic knowledge of C++ and Python programming with the GNU/Linux environment is strongly recommended to assist with understanding the key concepts covered in the book. What You Will Learn ? Explore advanced concepts, such as ROS pluginlib, nodelets, and actionlib ? Work with ROS visualization, profiling, and debugging tools ? Gain experience in robot modeling and simulation using Gazebo ? Understand the ROS Navigation Stack for mobile robots ? Configure a MoveIt! package for a manipulator robot ? Develop an autonomous navigation framework for MAV using ORB SLAM and MoveIt ? Integrate sensors, actuators, and robots into the ROS ecosystem ? Get acquainted with the ROS-Industrial package with hardware support, capabilities, and applications In Detail This book will leverage the power of ROS with an introduction to its core and advanced concepts through exciting recipes. You will get acquainted with the use of different synchronous and asynchronous communication methods, including messages, services, and actions. You will learn how to use the various debugging and visualization tools used in development and how to interface sensors and actuators with the ROS framework. Firstly, you will get to grips with ROS simulation frameworks, such as Gazebo and RotorS for modeling and simulating any physical robot and virtual environment. You will also cover mobile robotics, micro-aerial vehicles, and robotic arms, which are the leading branches of robotic applications. Robot Operating System Cookbook will also guide you in the development of an autonomous navigation framework for both mobile robots and micro-aerial vehicles. Finally, you will explore ROS-Industrial, an open source project that extends the advanced capabilities of ROS software to manufacturing industries. Style and approach The goal of this book is to provide an integrated overview of the concepts and techniques. ROS is not an operating system in the traditional sense of process management and scheduling; rather, it provides a structured communications layer above the host operating systems of a heterogeneous compute cluster.
Learning Linux Shell Scripting
Learning Linux Shell Scripting
Ganesh Naik
¥81.74
Break through the practice of writing tedious code with shell scripts About This Book ? Learn to impeccably build shell scripts and develop advanced applications ? Create smart solutions by writing and debugging scripts ? A step-by-step tutorial to automate routine tasks by developing scripts Who This Book Is For Learning Linux Shell Scripting is ideal for those who are proficient at working with Linux and want to learn about shell scripting to improve their efficiency and practical skills. What You Will Learn ? Familiarize yourself with the various text filtering tools available in Linux ? Understand expressions and variables and how to use them practically ? Automate decision-making and save a lot of time and effort of revisiting code ? Get to grips with advanced functionality such as using traps, dialogs to develop screens & Database administration such as MySQL or Oracle ? Start up a system and customize a Linux system ? Taking backup of local or remote data or important files. ? Use existing other language scripts such as Python, Perl & Ruby in Shell Scripts In Detail Linux is the most powerful and universally adopted OS. Shell is a program that gives the user direct interaction with the operating system. Scripts are collections of commands that are stored in a file. The shell reads this file and acts on commands as if they were typed on the keyboard. Learning Linux Shell Scripting covers Bash, GNU Bourne Again Shell, preparing you to work in the exciting world of Linux shell scripting. CentOS is a popular rpm-based stable and secured Linux distribution. Therefore, we have used CentOS distribution instead of Ubuntu distribution. Linux Shell Scripting is independent of Linux distributions, but we have covered both types of distros. We start with an introduction to the Shell environment and basic commands used. Next, we explore process management in Linux OS, real-world essentials such as debugging and perform Shell arithmetic fluently. You'll then take a step ahead and learn new and advanced topics in Shell scripting, such as decision making, starting up a system, and customizing a Linux environment. You will also learn about grep, stream editor, and AWK, which are very powerful text filters and editors. Finally, you'll get to grips with taking backup, using other language scripts in Shell Scripts as well as automating database administration tasks for MySQL and Oracle. By the end of this book, you will be able to confidently use your own shell scripts in the real world. Style and approach This practical book will go from the very basics of shell scripting to complex, customized automation. The idea behind this book is to be as practical as possible and give you the look and feel of what real-world scripting is like.
Mastering Metasploit
Mastering Metasploit
Nipun Jaswal
¥81.74
Discover the next level of network defense with the Metasploit framework About This Book ? Gain the skills to carry out penetration testing in complex and highly-secured environments ? Become a master using the Metasploit framework, develop exploits, and generate modules for a variety of real-world scenarios ? Get this completely updated edition with new useful methods and techniques to make your network robust and resilient Who This Book Is For This book is a hands-on guide to penetration testing using Metasploit and covers its complete development. It shows a number of techniques and methodologies that will help you master the Metasploit framework and explore approaches to carrying out advanced penetration testing in highly secured environments. What You Will Learn ? Develop advanced and sophisticated auxiliary modules ? Port exploits from PERL, Python, and many more programming languages ? Test services such as databases, SCADA, and many more ? Attack the client side with highly advanced techniques ? Test mobile and tablet devices with Metasploit ? Bypass modern protections such as an AntiVirus and IDS with Metasploit ? Simulate attacks on web servers and systems with Armitage GUI ? Script attacks in Armitage using CORTANA scripting In Detail We start by reminding you about the basic functionalities of Metasploit and its use in the most traditional ways. You’ll get to know about the basics of programming Metasploit modules as a refresher and then dive into carrying out exploitation as well building and porting exploits of various kinds in Metasploit. In the next section, you’ll develop the ability to perform testing on various services such as databases, Cloud environment, IoT, mobile, tablets, and similar more services. After this training, we jump into real-world sophisticated scenarios where performing penetration tests are a challenge. With real-life case studies, we take you on a journey through client-side attacks using Metasploit and various scripts built on the Metasploit framework. By the end of the book, you will be trained specifically on time-saving techniques using Metasploit. Style and approach This is a step-by-step guide that provides great Metasploit framework methodologies. All the key concepts are explained details with the help of examples and demonstrations that will help you understand everything you need to know about Metasploit.