万本电子书0元读

万本电子书0元读

Augmented Reality for Android Application Development
Augmented Reality for Android Application Development
Jens Grubert
¥63.21
A step-by-step tutorial-based guide aimed at giving you hands-on practical experience to develop AR applications for Android.Augmented Reality for Android Application Development is for Android mobile application developers who are familiar with Android Development Tools and deployment, JMonkeyEngine, and the Vuforia SDK.
Getting Started with nopCommerce
Getting Started with nopCommerce
Brandon Atkinson
¥63.21
A friendly, tutorial style book, which will help you learn your way through creating a live storefront with nopCommerce in a step-by-step manner.Getting Started with nopCommerce is for anyone who wants to sell products online using nopCommerce. If you are a non-technical person and are discouraged by the complexity of this powerful e-commerce application, then this book is for you.
Getting started with Simulink
Getting started with Simulink
Luca Zamboni
¥63.21
This practical and easy-to-understand learning tutorial is one big exciting exercise for students and engineers that are always short on their schedules and want to regain some lost time with the help of Simulink.This book is aimed at students and engineers who need a quick start with Simulink. Though it's not required in order to understand how Simulink works, knowledge of physics will help the reader to understand the exercises described.
KNIME Essentials
KNIME Essentials
Gábor Bakos
¥63.21
KNIME Essentials is a practical guide aimed at getting the results you want, as quickly as possible."Knime Essentials" is written for data analysts looking to quickly get up to speed using the market leader in data processing tools, KNIME. No knowledge of KNIME is required, but we will assume that you have some background in data processing.
Getting Started with Kivy
Getting Started with Kivy
Roberto Ulloa
¥63.21
into the world of Kivy.This book is aimed at Python developers who are familiar with Python and have a good understanding of concepts like inheritance, classes, and instances. No previous experience of Kivy is required, though some knowledge of event handling, scheduling, and user interfaces, in general, would boost your learning.
OpenCV Android Application Programming
OpenCV Android Application Programming
Joseph Howse
¥63.21
A step-by-step tutorial to help you master computer vision and mobile app development.This book is for Java developers who are new to computer vision and who would like to learn about how it is used in relation to application development. It is assumed that you have previous experience in Java, but not necessarily Android. A basic understanding of image data (for example pixels and color channels) would be helpful too. You are expected to have a mobile device running Android 2.2 (Froyo) or greater and it must have a camera
Extending Jenkins
Extending Jenkins
Donald Simpson
¥63.21
Get a complete walkthrough of the many interfaces available in Jenkins with the help of real-world examples to take you to the next level with Jenkins About This Book Find out how to interact with Jenkins from within Eclipse, NetBeans, and IntelliJ IDEA Develop custom solutions that act upon Jenkins information in real time A step-by-step, practical guide to help you learn about extension points in existing plugins and how to build your own plugin Who This Book Is For This book is aimed primarily at developers and administrators who are interested in taking their interaction and usage of Jenkins to the next level. The book assumes you have a working knowledge of Jenkins and programming in general, and an interest in learning about the different approaches to customizing and extending Jenkins so it fits your requirements and your environment perfectly. What You Will Learn Retrieve and act upon Jenkins information in real time Find out how to interact with Jenkins through a variety of IDEs Develop your own Form and Input validation and customization Explore how Extension points work, and develop your own Jenkins plugin See how to use the Jenkins API and command-line interface Get to know how to remotely update your Jenkins configuration Design and develop your own Information Radiator Discover how Jenkins customization can help improve quality and reduce costs In Detail Jenkins CI is the leading open source continuous integration server. It is written in Java and has a wealth of plugins to support the building and testing of virtually any project. Jenkins supports multiple Software Configuration Management tools such as Git, Subversion, and Mercurial. This book explores and explains the many extension points and customizations that Jenkins offers its users, and teaches you how to develop your own Jenkins extensions and plugins. First, you will learn how to adapt Jenkins and leverage its abilities to empower DevOps, Continuous Integration, Continuous Deployment, and Agile projects. Next, you will find out how to reduce the cost of modern software development, increase the quality of deliveries, and thereby reduce the time to market. We will also teach you how to create your own custom plugins using Extension points. Finally, we will show you how to combine everything you learned over the course of the book into one real-world scenario. Style and approach Extending Jenkins explores and explains advanced Jenkins functionality from a practical point of view, teaching you real-world skills that will help you get more from this powerful software. Each key topic is explained clearly with a practical example, and in sufficient detail so you understand the concepts and can then develop your own solutions using your preferred software and languages.
Learning Hunk
Learning Hunk
Dmitry Anoshin
¥63.21
Visualize and analyze your Hadoop data using Hunk About This Book Explore your data in Hadoop and NoSQL data stores Create and optimize your reporting experience with advanced data visualizations and data analytics A comprehensive developer's guide that helps you create outstanding analytical solutions efficiently Who This Book Is For If you are Hadoop developers who want to build efficient real-time Operation Intelligence Solutions based on Hadoop deployments or various NoSQL data stores using Hunk, this book is for you. Some familiarity with Splunk is assumed. What You Will Learn Deploy and configure Hunk on top of Cloudera Hadoop Create and configure Virtual Indexes for datasets Make your data presentable using the wide variety of data visualization components and knowledge objects Design a data model using Hunk best practices Add more flexibility to your analytics solution via extended SDK and custom visualizations Discover data using MongoDB as a data source Integrate Hunk with AWS Elastic MapReduce to improve scalability In Detail Hunk is the big data analytics platform that lets you rapidly explore, analyse, and visualize data in Hadoop and NoSQL data stores. It provides a single, fluid user experience, designed to show you insights from your big data without the need for specialized skills, fixed schemas, or months of development. Hunk goes beyond typical data analysis methods and gives you the power to rapidly detect patterns and find anomalies across petabytes of raw data. This book focuses on exploring, analysing, and visualizing big data in Hadoop and NoSQL data stores with this powerful full-featured big data analytics platform. You will begin by learning the Hunk architecture and Hunk Virtual Index before moving on to how to easily analyze and visualize data using Splunk Search Language (SPL). Next you will meet Hunk Apps which can easy integrate with NoSQL data stores such as MongoDB or Sqqrl. You will also discover Hunk knowledge objects, build a semantic layer on top of Hadoop, and explore data using the friendly user-interface of Hunk Pivot. You will connect MongoDB and explore data in the data store. Finally, you will go through report acceleration techniques and analyze data in the AWS Cloud. Style and approach A step-by-step guide starting right from the basics and deep diving into the more advanced and technical aspects of Hunk.
Augmented Reality with Kinect
Augmented Reality with Kinect
Rui Wang
¥63.21
This book is a mini tutorial with plenty of code examples and strategies to give you many options when building your own applications.This book is meant for readers who are familiar with C/C++ programming and want to write simple programs with Kinect. The standard template library can also be used as it is simple enough to understand.
Splunk Developer's Guide
Splunk Developer's Guide
Kyle Smith
¥63.21
If you are a Splunk user and want to enter the wonderful world of Splunk application development, then this book is for you. Some experience with Splunk, writing searches, and designing basic dashboards is expected.
VMware vSphere Design Essentials
VMware vSphere Design Essentials
Puthiyavan Udayakumar
¥63.21
If you are a VMware beginner, VMware engineer, VMware SME, or VMware architect, then this is the book for you. A basic understanding of virtualization is a prerequisite.
Nginx Essentials
Nginx Essentials
Valery Kholodkov
¥63.21
This book is ideal for skilled web masters and site reliability engineers who want to switch to Nginx or solidify their knowledge of Nginx. Knowledge of Unix and webmaster skills are required.
Microsoft System Center Orchestrator 2012 R2 Essentials
Microsoft System Center Orchestrator 2012 R2 Essentials
Miguel Oliveira
¥63.21
This book is targeted at those who want to gain time in their administrative tasks and profit from it to also improve their environment by reaching a more autonomous infrastructure.
Learning Dynamics NAV Patterns
Learning Dynamics NAV Patterns
Mark Brummel
¥63.21
Create solutions that are easy to maintain, quick to upgrade, and follow proven concepts and designs About This Book Design software that is maintainable outside the ecosystem of their creators Ensure quality by following patterns that have been proved to work Over two dozen practical Architectural and Design patterns Who This Book Is For Learning Dynamics NAV Patterns is intended for developers, architects, (technical) consultants, and application managers. You may have very little or no knowledge about NAV patterns, but you should be acquainted with programming. What You Will Learn Apply object-oriented practices to C/AL programming Structure your application to avoid merge conflicts Refactor legacy code and avoid anti-patterns Design decision trees to decide when to use which patterns Clone codes and their application in Dynamics NAV Make your application extensible by creating predefined hooks and facades In Detail Microsoft Dynamics NAV is a complete ERP system, which also contains a robust set of development tools to support customization and enhancement. These include an object designer for each of the seven application object types, a business application oriented programming language with .NET interface capability, a compiler, a debugger, and programming testing language support. Learning Dynamics NAV Patterns will guide you through the NAV way of solving problems. This book will first introduce you to patterns and the software architecture of the NAV and then help you to build an example application. Then, it walks you through the details of architectural patterns, design patterns, and implementation patterns. This book will also talk about anti-patterns and handling legacy code. Finally, it teaches you to build solutions using patterns. Proven patterns and best practices will help you create better solutions that are easy to maintain in larger teams across several locations. It will guide you through combining abstract patterns using easy-to-understand examples and will help you decide which patterns to use in which scenarios. Style and approach This book explains the concepts of patterns, code structuring, and object-oriented concepts in a way that is easy to understand for Dynamics NAV specialists through practical examples.
ASP.NET Web API Security Essentials
ASP.NET Web API Security Essentials
Rajesh Gunasundaram
¥63.21
Take the security of your ASP.NET Web API to the next level using some of the most amazing security techniques around About This Book This book has been completely updated for ASP.NET Web API 2.0 including the new features of ASP.NET Web API such as Cross-Origin Resource Sharing (CORS) and OWIN self-hosting Learn various techniques to secure ASP.NET Web API, including basic authentication using authentication filters, forms, Windows Authentication, external authentication services, and integrating ASP.NET’s Identity system An easy-to-follow guide to enable SSL, prevent Cross-Site Request Forgery (CSRF) attacks, and enable CORS in ASP.NET Web API Who This Book Is For This book is intended for anyone who has previous knowledge of developing ASP.NET Web API applications. Good working knowledge and experience with C# and.NET Framework are prerequisites for this book. What You Will Learn Secure your web API by enabling Secured Socket Layer (SSL) Manage your application’s user accounts by integrating ASP.NET’s Identity system Ensure the security of your web API by implementing basic authentication Implement forms and Windows authentication to secure your web API Use external authentication such as Facebook and Twitter to authenticate a request to a web API Protect your web API from CSRF attacks Enable CORS in your web API to explicitly allow some cross-origin requests while rejecting others Fortify your web API using OAuth2 In Detail This book incorporates the new features of ASP.NET Web API 2 that will help you to secure an ASP.NET Web API and make a well-informed decision when choosing the right security mechanism for your security requirements. We start by showing you how to set up a browser client to utilize ASP.NET Web API services. We then cover ASP.NET Web API’s security architecture, authentication, and authorization to help you secure a web API from unauthorized users. Next, you will learn how to use SSL with ASP.NET Web API, including using SSL client certificates, and integrate the ASP.NET Identity system with ASP.NET Web API. We’ll show you how to secure a web API using OAuth2 to authenticate against a membership database using OWIN middleware. You will be able to use local logins to send authenticated requests using OAuth2. We also explain how to secure a web API using forms authentication and how users can log in with their Windows credentials using integrated Windows authentication. You will come to understand the need for external authentication services to enable OAuth/OpenID and social media authentication. We’ll then help you implement anti-Cross-Site Request Forgery (CSRF) measures in ASP.NET Web API. Finally, you will discover how to enable Cross-Origin Resource Sharing (CORS) in your web API application. Style and approach Each chapter is dedicated to a specific security technique, in a task-based and easy-to-follow way. Most of the chapters are accompanied with source code that demonstrates the step-by-step guidelines of implementing the technique, and includes an explanation of how each technique works.
Amazon EC2 Cookbook
Amazon EC2 Cookbook
Sekhar Reddy
¥63.21
Over 40 hands-on recipes to develop and deploy real-world applications using Amazon EC2 About This Book Design and build applications using Amazon EC2 and a range of supporting AWS tools Find highly effective solutions to your AWS Cloud-based application development, deployment, and infrastructural issues A comprehensive set of recipes to implement your product’s functional and non-functional requirements Who This Book Is For This book is targeted at Cloud-based developers who have prior exposure to AWS concepts and features. Some experience in building small applications and creating some proof-of-concept applications is required. What You Will Learn Select and configure the right EC2 instances Create, configure, and secure a Virtual Private Cloud Create an AWS CloudFormation template Use AWS Identity and Access Management to secure access to EC2 instances Configure auto-scaling groups using CloudWatch Choose and use the right data service such as SimpleDB and DynamoDB for your cloud applications Access key AWS services using client tools and AWS SDKs Deploy AWS applications using Docker containers In Detail Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides flexible and resizable compute capacity in the cloud. The main purpose of Amazon EC2 is to make web-scale cloud computing easier for the developers. It offers developers and companies the raw building blocks like load balancers, object stores and virtual machines running on general hardware (that is, Amazon runs a multitude of hardware components but presents them as a generic utility to its users) with accessible APIs in order to create scalable software products This book covers designing, developing, and deploying scalable, highly available, and secure applications on the AWS platform. By following the steps in the recipes, you will be able to effectively and systematically resolve issues related to development, deployment, and infrastructure for enterprise-grade cloud applications or products. This book starts with helping you choose and configure the right EC2 instances to meet your application-specific requirements. The book then moves on to creating a CloudFormation template and will teach you how to work with stacks. You will then be introduced to using IAM services to configure users, groups, roles, and multi-factor authentication. You will also learn how to connect AD to AWS IAM. Next, you will be using AWS data services and accessing other AWS services including Route 53, Amazon S3, and AWS SES (Amazon Simple Email Service). Finally, you will be deploying AWS applications using Docker containers. Style and approach This book contains a rich set of recipes that cover not only the full spectrum of real-world cloud application development using Amazon EC2, but also the services and security of the applications. The book contains easy-to-follow recipes with step-by-step instructions to leverage EC2 within your applications.
Application Development with Swift
Application Development with Swift
Hossam Ghareeb
¥63.21
If you are an iOS developer with experience in Objective-C, and wish to develop applications with Swift, then this book is ideal for you. Familiarity with the fundamentals of Swift is an added advantage but not a necessity.
Getting Started with Grunt: The JavaScript Task Runner
Getting Started with Grunt: The JavaScript Task Runner
Jaime Pillora
¥63.21
A stepbystep, practical tutorial to help you transform into a Grunt poweruser. This book is for JavaScript developers who want to get to grips with GruntJS and use it to build and test their JavaScript applications. The only requirement for this book is a basic understanding of objects and functions in JavaScript.
Magento Search Engine Optimization
Magento Search Engine Optimization
Robert Kent
¥63.21
This book is an easytofollow tutorial with best practices and advanced references which will help you to take full advantage of Magento with SEO. This book is aimed at both Magento developers and SEO specialists who wish to optimize search and end user elements such as clickthrough rates to ensure the design of their online shop sites effectively maximize sales. Magento store owners may also find large sections of this book useful in order to understand the larger impact small tweaks and changes can have on SEO especially when editing products and categories. This book assumes that the reader will understand the basic concepts of keyword research and the external factors that are required in order to manage an ongoing SEO campaign.
IPython Notebook Essentials
IPython Notebook Essentials
L. Felipe Martins
¥63.21
If you are a professional, student, or educator who wants to learn to use IPython Notebook as a tool for technical and scientific computing, visualization, and data analysis, this is the book for you. This book will prove valuable for anyone that needs to do computations in an agile environment.
Packet Analysis with Wireshark
Packet Analysis with Wireshark
Anish Nath
¥63.21
Leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing improved protocol analysis About This Book Gain hands-on experience of troubleshooting errors in TCP/IP and SSL protocols through practical use cases Identify and overcome security flaws in your network to get a deeper insight into security analysis This is a fast-paced book that focuses on quick and effective packet captures through practical examples and exercises Who This Book Is For If you are a network or system administrator who wants to effectively capture packets, a security consultant who wants to audit packet flows, or a white hat hacker who wants to view sensitive information and remediate it, this book is for you. This book requires decoding skills and a basic understanding of networking. What You Will Learn Utilize Wireshark's advanced features to analyze packet captures Locate the vulnerabilities in an application server Get to know more about protocols such as DHCPv6, DHCP, DNS, SNMP, and HTTP with Wireshark Capture network packets with tcpdump and snoop with examples Find out about security aspects such as OS-level ARP scanning Set up 802.11 WLAN captures and discover more about the WAN protocol Enhance your troubleshooting skills by understanding practical TCP/IP handshake and state diagrams In Detail Wireshark provides a very useful way to decode an RFC and examine it. The packet captures displayed in Wireshark give you an insight into the security and flaws of different protocols, which will help you perform the security research and protocol debugging. The book starts by introducing you to various packet analyzers and helping you find out which one best suits your needs. You will learn how to use the command line and the Wireshark GUI to capture packets by employing filters. Moving on, you will acquire knowledge about TCP/IP communication and its use cases. You will then get an understanding of the SSL/TLS flow with Wireshark and tackle the associated problems with it. Next, you will perform analysis on application-related protocols. We follow this with some best practices to analyze wireless traffic. By the end of the book, you will have developed the skills needed for you to identify packets for malicious attacks, intrusions, and other malware attacks. Style and approach This is an easy-to-follow guide packed with illustrations and equipped with lab exercises to help you reproduce scenarios using a sample program and command lines.