万本电子书0元读

万本电子书0元读

Oracle Primavera Contract Management, Business Intelligence Publisher Edition v1
Oracle Primavera Contract Management, Business Intelligence Publisher Edition v1
Stephen D. Kelly
¥63.21
This book is packed with real world examples that cover concepts and usability of the core modules of a complex application. If you are Project manager or consultant looking forward to using and implementing Oracle Primavera Contract Management in your organization, then this is the best guide for you. No prior knowledge of PCM required.
What's new in SQL Server 2012
What's new in SQL Server 2012
Rachel Clements
¥63.21
This is a hands-on book to quickly get you up to speed with SQL Server 2012. It covers all the new features of the core database engine as well as the business intelligence (BI) services.The book begins by taking you step-by-step through the installation process, showing you what to install and which services and features you need. Once you have your SQL Server in place, you learn how to administer it and then explore new T-SQL functions to expand your query-writing toolkit. You will discover how the enhancements to Integration Services, Analysis Services and Reporting Services make developing BI solutions easier. It will then introduce you to SQL Server Data Tools, your new and improved development environment for creating database and BI projects.A hands-on example guides you through the steps required to run Distributed Replay, giving you the experience you need to apply this in the field. The book then takes you through a detailed example to show you how to create a Data Quality Services project and cleanse real-world data. Easy to follow code samples provide you with the queries you need to set up Availability Groups using the new AlwaysOn technology.Once you are comfortable with these new features you will be ready to migrate your data to the cloud and into SQL Azure. An exploration of Hadoop will help you understand big data and how it really is the next big thing,This concise reference is for database administrators, SQL Server Developers and BI professionals. Anyone who is familiar with SQL Server 2008 R2 and needs to make the jump to the latest version with the shortest learning curve will find this book useful.
Magento Search Engine Optimization
Magento Search Engine Optimization
Robert Kent
¥63.21
This book is an easytofollow tutorial with best practices and advanced references which will help you to take full advantage of Magento with SEO. This book is aimed at both Magento developers and SEO specialists who wish to optimize search and end user elements such as clickthrough rates to ensure the design of their online shop sites effectively maximize sales. Magento store owners may also find large sections of this book useful in order to understand the larger impact small tweaks and changes can have on SEO especially when editing products and categories. This book assumes that the reader will understand the basic concepts of keyword research and the external factors that are required in order to manage an ongoing SEO campaign.
Python Geospatial Analysis Essentials
Python Geospatial Analysis Essentials
Erik Westra
¥63.21
If you are an experienced Python developer and wish to get up-to-speed with geospatial programming, then this book is for you. While familiarity with installing third-party Python libraries would be an advantage, no prior knowledge of geospatial programming is required.
Splunk Developer's Guide
Splunk Developer's Guide
Kyle Smith
¥63.21
If you are a Splunk user and want to enter the wonderful world of Splunk application development, then this book is for you. Some experience with Splunk, writing searches, and designing basic dashboards is expected.
VMware vSphere Design Essentials
VMware vSphere Design Essentials
Puthiyavan Udayakumar
¥63.21
If you are a VMware beginner, VMware engineer, VMware SME, or VMware architect, then this is the book for you. A basic understanding of virtualization is a prerequisite.
Nginx Essentials
Nginx Essentials
Valery Kholodkov
¥63.21
This book is ideal for skilled web masters and site reliability engineers who want to switch to Nginx or solidify their knowledge of Nginx. Knowledge of Unix and webmaster skills are required.
Getting Started with Grunt: The JavaScript Task Runner
Getting Started with Grunt: The JavaScript Task Runner
Jaime Pillora
¥63.21
A stepbystep, practical tutorial to help you transform into a Grunt poweruser. This book is for JavaScript developers who want to get to grips with GruntJS and use it to build and test their JavaScript applications. The only requirement for this book is a basic understanding of objects and functions in JavaScript.
Microsoft Azure Storage Essentials
Microsoft Azure Storage Essentials
Chukri Soueidi
¥63.21
If you are an IT professional with a basic knowledge of Microsoft Azure and want to learn Azure Storage services, then this book is for you.
Amazon EC2 Cookbook
Amazon EC2 Cookbook
Sekhar Reddy
¥63.21
Over 40 hands-on recipes to develop and deploy real-world applications using Amazon EC2 About This Book Design and build applications using Amazon EC2 and a range of supporting AWS tools Find highly effective solutions to your AWS Cloud-based application development, deployment, and infrastructural issues A comprehensive set of recipes to implement your product’s functional and non-functional requirements Who This Book Is For This book is targeted at Cloud-based developers who have prior exposure to AWS concepts and features. Some experience in building small applications and creating some proof-of-concept applications is required. What You Will Learn Select and configure the right EC2 instances Create, configure, and secure a Virtual Private Cloud Create an AWS CloudFormation template Use AWS Identity and Access Management to secure access to EC2 instances Configure auto-scaling groups using CloudWatch Choose and use the right data service such as SimpleDB and DynamoDB for your cloud applications Access key AWS services using client tools and AWS SDKs Deploy AWS applications using Docker containers In Detail Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides flexible and resizable compute capacity in the cloud. The main purpose of Amazon EC2 is to make web-scale cloud computing easier for the developers. It offers developers and companies the raw building blocks like load balancers, object stores and virtual machines running on general hardware (that is, Amazon runs a multitude of hardware components but presents them as a generic utility to its users) with accessible APIs in order to create scalable software products This book covers designing, developing, and deploying scalable, highly available, and secure applications on the AWS platform. By following the steps in the recipes, you will be able to effectively and systematically resolve issues related to development, deployment, and infrastructure for enterprise-grade cloud applications or products. This book starts with helping you choose and configure the right EC2 instances to meet your application-specific requirements. The book then moves on to creating a CloudFormation template and will teach you how to work with stacks. You will then be introduced to using IAM services to configure users, groups, roles, and multi-factor authentication. You will also learn how to connect AD to AWS IAM. Next, you will be using AWS data services and accessing other AWS services including Route 53, Amazon S3, and AWS SES (Amazon Simple Email Service). Finally, you will be deploying AWS applications using Docker containers. Style and approach This book contains a rich set of recipes that cover not only the full spectrum of real-world cloud application development using Amazon EC2, but also the services and security of the applications. The book contains easy-to-follow recipes with step-by-step instructions to leverage EC2 within your applications.
ASP.NET Web API Security Essentials
ASP.NET Web API Security Essentials
Rajesh Gunasundaram
¥63.21
Take the security of your ASP.NET Web API to the next level using some of the most amazing security techniques around About This Book This book has been completely updated for ASP.NET Web API 2.0 including the new features of ASP.NET Web API such as Cross-Origin Resource Sharing (CORS) and OWIN self-hosting Learn various techniques to secure ASP.NET Web API, including basic authentication using authentication filters, forms, Windows Authentication, external authentication services, and integrating ASP.NET’s Identity system An easy-to-follow guide to enable SSL, prevent Cross-Site Request Forgery (CSRF) attacks, and enable CORS in ASP.NET Web API Who This Book Is For This book is intended for anyone who has previous knowledge of developing ASP.NET Web API applications. Good working knowledge and experience with C# and.NET Framework are prerequisites for this book. What You Will Learn Secure your web API by enabling Secured Socket Layer (SSL) Manage your application’s user accounts by integrating ASP.NET’s Identity system Ensure the security of your web API by implementing basic authentication Implement forms and Windows authentication to secure your web API Use external authentication such as Facebook and Twitter to authenticate a request to a web API Protect your web API from CSRF attacks Enable CORS in your web API to explicitly allow some cross-origin requests while rejecting others Fortify your web API using OAuth2 In Detail This book incorporates the new features of ASP.NET Web API 2 that will help you to secure an ASP.NET Web API and make a well-informed decision when choosing the right security mechanism for your security requirements. We start by showing you how to set up a browser client to utilize ASP.NET Web API services. We then cover ASP.NET Web API’s security architecture, authentication, and authorization to help you secure a web API from unauthorized users. Next, you will learn how to use SSL with ASP.NET Web API, including using SSL client certificates, and integrate the ASP.NET Identity system with ASP.NET Web API. We’ll show you how to secure a web API using OAuth2 to authenticate against a membership database using OWIN middleware. You will be able to use local logins to send authenticated requests using OAuth2. We also explain how to secure a web API using forms authentication and how users can log in with their Windows credentials using integrated Windows authentication. You will come to understand the need for external authentication services to enable OAuth/OpenID and social media authentication. We’ll then help you implement anti-Cross-Site Request Forgery (CSRF) measures in ASP.NET Web API. Finally, you will discover how to enable Cross-Origin Resource Sharing (CORS) in your web API application. Style and approach Each chapter is dedicated to a specific security technique, in a task-based and easy-to-follow way. Most of the chapters are accompanied with source code that demonstrates the step-by-step guidelines of implementing the technique, and includes an explanation of how each technique works.
Microsoft System Center Orchestrator 2012 R2 Essentials
Microsoft System Center Orchestrator 2012 R2 Essentials
Miguel Oliveira
¥63.21
This book is targeted at those who want to gain time in their administrative tasks and profit from it to also improve their environment by reaching a more autonomous infrastructure.
Internet of Things with Arduino Cookbook
Internet of Things with Arduino Cookbook
Marco Schwartz
¥63.21
Over 60 recipes will help you build smart IoT solutions and surprise yourself with captivating IoT projects you thought only existed in Bond movies About This Book This book offers key solutions and advice to address the hiccups faced when working on Arduino-based IoT projects in the real world Take your existing skills and capabilities to the next level by building challenging IoT applications with ease. Be the tech disruptor you always wanted to be with key recipes that help you solve Arduino IoT related problems smarter and faster. Put IoT to work through recipes on building Arduino-based devices that take control of your home, health, and life! Who This Book Is For This book is primarily for tech enthusiasts and early IoT adopters who would like to make the most of IoT and address the challenges encountered while developing IoT-based applications with Arduino. This book is also good for developers with basic electronics knowledge who need help to successfully build Arduino projects. What You Will Learn Monitor several Arduino boards simultaneously Tweet sensor data directly from your Arduino board Post updates on your Facebook wall directly from your Arduino board Create an automated access control with a fingerprint sensor Control your entire home from a single dashboard Make a GPS tracker that you can track in Google Maps Build a live camera that streams directly from your robot In Detail Arduino is a powerful and very versatile platform used by millions of people around the world to create DIY electronics projects. It can be connected to a wide variety of sensors and other components, making it the ideal platform to build amazing Internet of Things (IoT) projects on—the next wave in the era of computing. This book takes a recipe-based approach, giving you precise examples on how to build IoT projects of all types using the Arduino platform. You will come across projects from several fields, including the popular robotics and home automation domains. Along with being introduced to several forms of interactions within IoT, including projects that directly interact with well-known web services such as Twitter, Facebook, and Dropbox we will also focus on Machine-to-Machine (M2M) interactions, where Arduino projects interact without any human intervention. You will learn to build a few quick and easy-to-make fun projects that will really expand your horizons in the world of IoT and Arduino. Each chapter ends with a troubleshooting recipe that will help you overcome any problems faced while building these projects. By the end of this book, you will not only know how to build these projects, but also have the skills necessary to build your own IoT projects in the future. Style and approach This book takes a recipe-based approach, giving you precise examples on how to build IoT projects using the Arduino platform. You will learn to build fun and easy projects through a task-oriented approach.
Getting Started with Angular - Second Edition
Getting Started with Angular - Second Edition
Minko Gechev
¥63.21
Fast-track your web development skills to build high performance SPA with Angular 2 and beyond About This Book Up to date with the latest API changes introduced by Angular 2 and 4 Get familiar with the improvements to directives, change detection, dependency injection, router, and more Understand Angular's new component-based architecture Start using TypeScript to supercharge your Angular applications Who This Book Is For Do you want to jump in at the deep end of AngularOr perhaps you’re interested assessing the changes to AngularJS before moving overIf so, then "Getting Started with Angular" is the book for you. To get the most out of the book, you’ll need to be familiar with AngularJS 1.x, and have a good understanding of JavaScript. What You Will Learn Understand the changes made from AngularJS with side-by-side code samples to help demystify the Angular learning curve Start working with Angular’s new method of implementing directives Use TypeScript to write modern, powerful Angular applications Dig in to the change detection method, and other architectural changes to make sure you know what’s going on under the hood of Angular Get to work with the new router in Angular Use the new features of Angular, including pipes, and the updated features such as forms, services, and dependency injection Learn about the server-side rendering in Angular to keep your new applications SEO-friendly Enhance your applications using Ahead-of-Time compilation and Web Workers In Detail I'm delighted to see this new update and hope it helps you build amazing things with Angular. - Mi?ko Hevery, Creator of AngularJS and Angular Angular is the modern framework you need to build performant and robust web applications. This book is the quickest way to upgrade your AngularJS knowledge to the brave new world of Angular, and get grips with the framework. It starts with an overview putting the changes of the framework in context with version 1. After that, you will be taken on a TypeScript crash-course so you can take advantage of Angular in its native, statically-typed environment. You'll explore the new change detection mechanism in detail, how directives and components have changed, how you create applications with Angular, and much more. Next, you'll understand how to efficienly develop forms, use the router, implement communication with HTTP services, and transform data with custom pipes. Finally, we will take a look at the Angular's Ahead-of-Time compiler, angular-cli and other such tools that help us build professional applications. By the end of the book, you’ll be ready to start building quick and efficient Angular applications compatible with v2 and v4, that take advantage of all the new features on offer. This book is up to date for the 2.4 release and is compatible with the 4.0 release as well. Style and approach Starting with a comparison between Angular versions, this book is filled with side-by-side code examples to help highlight the changes. Each chapter then looks at major changes to the framework and is filled with small examples and sample code to get you started.
Android Studio 2 Essentials - Second Edition
Android Studio 2 Essentials - Second Edition
Belén Cruz Zapata
¥63.21
A fast-paced guide to get you up and running with Android application development using Android Studio 2 About This Book Configure, build, and run Android projects with Android Studio 2 Test your apps using the Android emulator and learn how to manage virtual devices Explore how Android Studio 2 can be made a part of your workflow to reduce the overall development time Who This Book Is For If you are an Android developer looking to quickly take advantage of Android Studio 2 and add it to your workflow, then this book is for you. It is assumed that you are familiar with the OOP paradigm and Java. You are recommended to have prior knowledge of the main characteristics of the Android mobile system to get the most out of this book. What You Will Learn Install Android Studio on your system and configure the Android Software Development Kit Create your first project and explore its structure Manage a project in Android Studio 2 with Gradle Improve your productivity while programming by getting the best of the code editor Design the user interface using layouts and see how to handle various user events Integrate Google Play services into your project efficiently Monitor your app while it's running and constantly improve its performance In Detail Android Studio 2, the official IDE for Android application development, dramatically improves your workflow by letting you quickly see changes running on your device or emulator. It gives developers a unique platform by making app builds and deployment faster. This book will get you up and running with all the essential features of Android Studio 2 to optimize your development workflow. Starting off with the basic installation and configuration of Android Studio 2, this book will help you build a new project by showing you how to create a custom launcher icon and guiding you to choose your project. You will then gain an insight into the additional tools provided in Android Studio, namely the Software Development Kit (SDK) Manager, Android Virtual Device (AVD) Manager, and Javadoc. You’ll also see how to integrate Google Play Services in an Android project. Finally, you’ll become familiar with the Help section in Android Studio, which will enable you to search for support you might require in different scenarios. Style and approach A comprehensive and practical guide that will give you the essential skills required to develop Android applications quickly using Android Studio. With the help of a real-world project, this book will show how to make Android Studio a part of your development process and optimize it.
Learning SaltStack - Second Edition
Learning SaltStack - Second Edition
Colton Myers
¥63.21
Build, manage, and secure your infrastructure by utilizing the power of SaltStack About This Book First book in the market to incorporate all the latest features of SaltStack. Leverage the power of SaltStack for building, managing and securing your infrastructure. Effectively use commands and control the state of your infrastructure in a jiffy. Who This Book Is For This book is aimed at System Administrators who are looking forward to manage their infrastructure using SaltStack with no prior knowledge about it. What You Will Learn Install Salt on your servers Run commands on all or some of your minions instantly from a central managing server Write custom Salt modules to handle your infrastructure’s unique needs Define the state of your infrastructure and use Salt to enforce that state. Create platform-agnostic state definitions for greater flexibility and power Manage virtual servers on public or private clouds using Salt Cloud Use the event system in Salt to create a reactive and self-healing infrastructure In Detail SaltStack is one of the best infrastructure management platforms available. It provides powerful tools for defining and enforcing the state of your infrastructure in a clear, concise way. With this book learn how to use these tools for your own infrastructure by understanding the core pieces of Salt. In this book we will take you from the initial installation of Salt, through running their first commands, and then talk about extending Salt for individual use cases. From there you will explore the state system inside of Salt, learning to define the desired state of our infrastructure in such a way that Salt can enforce that state with a single command. Finally, you will learn about some of the additional tools that salt provides, including salt-cloud, the reactor, and the event system. We?ll finish by exploring how to get involved with salt and what?s new in the salt community. Finally, by the end of the book, you'll be able to build a reliable, scalable, secure, high-performance infrastructure and fully utilize the power of cloud computing. Style and approach This will be a comprehensive guide on SaltStack along with installation and setting up of Salt on couple of platforms. Then enlightening the readers about remote execution system and configuration management system and ending with concepts of security and best practices.
Learning Modular Java Programming
Learning Modular Java Programming
Tejaswini Mandar Jog
¥63.21
Explore the power of modular programming for building applications with Java and Spring! About This Book Understand the basic concepts of Modular Programming to build enterprise applications with Java Create short and precise code and eliminate recursion The book follows a step-by-step approach that makes implementing Modular Programming easy Who This Book Is For This book targets Java developers who have a basic knowledge of application development with Java and are interested in learning the Modular Programming approach for building reusable applications that are easy to test, and thus improve overall project management. What You Will Learn Learn about Modular Programming and what modules an enterprise application can be divided into. Set up a development environment and create a "Hello World" application. Start implementing a sample application from the presentation layer. Implement the persistence layer. Implement the business layer, wrapping up all of the modules with Contexts and Dependency Injection (CDI). Manage an application's life cycle. Learn how to secure Web applications. Test enterprise applications and their automation. Understand how to version source code using Source Code Management (SCM) systems such as GIT and SVN. In Detail Modular programming means dividing an application into small parts and then developing it. It is an approach taken by developers to build applications and helps them add efficiency in their development process, thus making it more effective. The book starts with the fundamentals of Modular Programming. Then we move on to the actual implementation, where we teach developers how to divide an application into different modules or layers (such as presentation, execution, security, lifecycle, services, and so on) for better management. Once readers are well-versed in these modules and their development, the book shows how to create bindings in order to join these different modules and form a complete application. Next, the readers will learn how to manage these modules through dependency injection. Later, we move on to testing; readers will learn how to test the different modules of an application. The book ends by teaching readers how to maintain different versions of their application and how to modify it. By the end of the book, readers will have a good understanding of modular programming and will be able to use it to build applications with Java. Style and approach This book is a practical guide to help readers learn Modular Programming with Java and build an enterprise-ready app along the way. The book is divided into three major sections. The first teaches the fundamentals of Modular Programming and how to implement them; the second teaches readers to combine and manage the modules developed; in the final section, the book explains the applications of Modular Programming.
Monitoring Elasticsearch
Monitoring Elasticsearch
Dan Noble
¥63.21
Monitor your Elasticsearch cluster's health, and diagnose and solve its performance and reliability issues About This Book Understand common performance and reliability pitfalls in ElasticSearch Use popular monitoring tools such as ElasticSearch-head, BigDesk, Marvel, Kibana, and more This is a step-by-step guide with lots of case studies on solving real-world ElasticSearch cluster issues Who This Book Is For This book is for developers and system administrators who use ElasticSearch in a wide range of capacities. Prior knowledge of ElasticSearch and related technologies would be helpful, but is not necessary. What You Will Learn Explore your cluster with ElasticSearch-head and BigDesk Access the underlying data of the ElasticSearch monitoring plugins using the ElasticSearch API Analyze your cluster’s performance with Marvel Troubleshoot some of the common performance and reliability issues that come up when using ElasticSearch Analyze a cluster’s historical performance, and get to the bottom of and recover from system failures Use and install various other tools and plugins such as Kibana and Kopf, which is helpful to monitor ElasticSearch In Detail ElasticSearch is a distributed search server similar to Apache Solr with a focus on large datasets, a schema-less setup, and high availability. This schema-free architecture allows ElasticSearch to index and search unstructured content, making it perfectly suited for both small projects and large big data warehouses with petabytes of unstructured data. This book is your toolkit to teach you how to keep your cluster in good health, and show you how to diagnose and treat unexpected issues along the way. You will start by getting introduced to ElasticSearch, and look at some common performance issues that pop up when using the system. You will then see how to install and configure ElasticSearch and the ElasticSearch monitoring plugins. Then, you will proceed to install and use the Marvel dashboard to monitor ElasticSearch. You will find out how to troubleshoot some of the common performance and reliability issues that come up when using ElasticSearch. Finally, you will analyze your cluster’s historical performance, and get to know how to get to the bottom of and recover from system failures. This book will guide you through several monitoring tools, and utilizes real-world cases and dilemmas faced when using ElasticSearch, showing you how to solve them simply, quickly, and cleanly. Style and approach This is a step-by-step guide to monitoring your ElasticSearch cluster and correcting performance issues. It is filled with lots of in-depth, real-world use-cases on solving different ElasticSearch cluster issues.
Raspberry Pi for Secret Agents - Third Edition
Raspberry Pi for Secret Agents - Third Edition
Matthew Poole
¥63.21
Turn your Raspberry Pi into a secret agent toolbox with this set of exciting projects About This Book Turn your Raspberry Pi into a multi-purpose secret agent gadget for audio and video surveillance, Wi-Fi exploration, or playing pranks on your friends Detect an intruder on camera or with sensors and set off an alarm or receive messages to your phone Find out what the other computers on your network are up to and make yourself anonymous on the Internet This book has been updated for new additions to your toolkit featuring the tiny, recently released Raspberry Pi Zero board Who This Book Is For This book is for those who are new to the Raspberry Pi Zero ,Raspberry Pi 2 or Raspberry Pi 3 and have some experience with the original Raspberry Pi models, and even for those budding secret agents who would like to use Pi Zero as a secret agent toolbox. No programming experience is assumed. Suitable for the novice and expert alike, each topic provides a fast and easy way to get started with exciting applications, with practical examples in every chapter. What You Will Learn Install and configure the Raspbian Jessie operating system for maximum mischief Detect an intruder with motion detection or a laser trip wire and set off an alarm Listen in to conversations from a distance over Bluetooth Distort your voice in weird and wonderful ways Track the Pi's whereabouts using GPS Connect your Pi to the mobile Internet using a 3G dongle and make yourself anonymous on the net Display secret messages and codes to fellow agents on a LED display In Detail This book is for all mischievous Raspberry Pi owners who’d like to see their computer transform into a neat spy gadget to be used in a series of practical pranks and projects. No previous skills are required to follow along, and if you’re completely new to Linux, you’ll pick up much of the basics for free. We’ll help you set up your Raspberry Pi Zero , Raspberry Pi 2 and Raspberry Pi 3 and guide you through a number of pranks and secret agent techniques that are so inconspicuous yet high on mischief. You’ll learn how to configure your operating system for maximum mischief and start exploring audio, video, or Wi-Fi techniques. We’ll show you how to record, listen, or talk to people from a distance and how to set up your own phone network. Then, you’ll plug in your webcam and set up a motion detector with an alarm and find out what the other computers on your Wi-Fi network are up to. Once you've mastered the techniques, we’ll combine them with a battery pack and GPS for the ultimate off-road spy kit. Style and Approach This easy-to-follow guide is for budding secret agents who want to create tools for mischief, stealth, and reconnaissance. It’s full of fun, practical examples and easy-to-follow recipes, guaranteeing maximum mischief for all skill levels.
Introduction to R for Business Intelligence
Introduction to R for Business Intelligence
Jay Gendron
¥63.21
Learn how to leverage the power of R for Business Intelligence About This Book Use this easy-to-follow guide to leverage the power of R analytics and make your business data more insightful. This highly practical guide teaches you how to develop dashboards that help you make informed decisions using R. Learn the A to Z of working with data for Business Intelligence with the help of this comprehensive guide. Who This Book Is For This book is for data analysts, business analysts, data science professionals or anyone who wants to learn analytic approaches to business problems. Basic familiarity with R is expected. What You Will Learn Extract, clean, and transform data Validate the quality of the data and variables in datasets Learn exploratory data analysis Build regression models Implement popular data-mining algorithms Visualize results using popular graphs Publish the results as a dashboard through Interactive Web Application frameworks In Detail Explore the world of Business Intelligence through the eyes of an analyst working in a successful and growing company. Learn R through use cases supporting different functions within that company. This book provides data-driven and analytically focused approaches to help you answer questions in operations, marketing, and finance. In Part 1, you will learn about extracting data from different sources, cleaning that data, and exploring its structure. In Part 2, you will explore predictive models and cluster analysis for Business Intelligence and analyze financial times series. Finally, in Part 3, you will learn to communicate results with sharp visualizations and interactive, web-based dashboards. After completing the use cases, you will be able to work with business data in the R programming environment and realize how data science helps make informed decisions and develops business strategy. Along the way, you will find helpful tips about R and Business Intelligence. Style and approach This book will take a step-by-step approach and instruct you in how you can achieve Business Intelligence from scratch using R. We will start with extracting data and then move towards exploring, analyzing, and visualizing it. Eventually, you will learn how to create insightful dashboards that help you make informed decisions—and all of this with the help of real-life examples.
Packet Analysis with Wireshark
Packet Analysis with Wireshark
Anish Nath
¥63.21
Leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing improved protocol analysis About This Book Gain hands-on experience of troubleshooting errors in TCP/IP and SSL protocols through practical use cases Identify and overcome security flaws in your network to get a deeper insight into security analysis This is a fast-paced book that focuses on quick and effective packet captures through practical examples and exercises Who This Book Is For If you are a network or system administrator who wants to effectively capture packets, a security consultant who wants to audit packet flows, or a white hat hacker who wants to view sensitive information and remediate it, this book is for you. This book requires decoding skills and a basic understanding of networking. What You Will Learn Utilize Wireshark's advanced features to analyze packet captures Locate the vulnerabilities in an application server Get to know more about protocols such as DHCPv6, DHCP, DNS, SNMP, and HTTP with Wireshark Capture network packets with tcpdump and snoop with examples Find out about security aspects such as OS-level ARP scanning Set up 802.11 WLAN captures and discover more about the WAN protocol Enhance your troubleshooting skills by understanding practical TCP/IP handshake and state diagrams In Detail Wireshark provides a very useful way to decode an RFC and examine it. The packet captures displayed in Wireshark give you an insight into the security and flaws of different protocols, which will help you perform the security research and protocol debugging. The book starts by introducing you to various packet analyzers and helping you find out which one best suits your needs. You will learn how to use the command line and the Wireshark GUI to capture packets by employing filters. Moving on, you will acquire knowledge about TCP/IP communication and its use cases. You will then get an understanding of the SSL/TLS flow with Wireshark and tackle the associated problems with it. Next, you will perform analysis on application-related protocols. We follow this with some best practices to analyze wireless traffic. By the end of the book, you will have developed the skills needed for you to identify packets for malicious attacks, intrusions, and other malware attacks. Style and approach This is an easy-to-follow guide packed with illustrations and equipped with lab exercises to help you reproduce scenarios using a sample program and command lines.