万本电子书0元读

万本电子书0元读

Troubleshooting OpenStack
Troubleshooting OpenStack
Tony Campbell
¥54.49
Get unstuck and start stacking! About This Book Easily fix the nagging problems that commonly plague OpenStack and become the go-to person in your organization Get better equipped to troubleshoot and solve common problems in performance, availability, and automation that confront production-ready OpenStack environments Save time and decrease frustration by solving significant issues that arise from OpenStack deployments pertaining to storage and networking Who This Book Is For You will need a basic understanding of OpenStack, Linux, and Cloud computing. If you have an understanding of Linux, this book will help you leverage that knowledge in the world of OpenStack, giving you confidence to tackle most issues that may arise. What You Will Learn Diagnose and remediate authentication and authorization problems in Keystone Fix common issues with images served through Glance Master the art of troubleshooting Neutron networking Navigate and overcome problems with Nova Troubleshoot and resolve Cinder block storage issues Identify and correct Swift object storage problems Isolate and fix issues caused by Heat orchestration Leverage Ceilometer and other metering and monitoring tools for effective troubleshooting In Detail OpenStack is a collection of software projects that work together to provide a cloud fabric. OpenStack is one of the fastest growing open source projects in history that unlocks cloud computing for everyone. With OpenStack, you are able to create public or private clouds on your own hardware. The flexibility and control afforded by OpenStack puts the cloud within reach of anyone willing to learn this technology. Starting with an introduction to OpenStack troubleshooting tools, we’ll walk through each OpenStack service and how you can quickly diagnose, troubleshoot, and correct problems in your OpenStack. Understanding the various projects and how they interact is essential for anyone attempting to troubleshoot an OpenStack cloud. We will start by explaining each of the major components and the dependencies between them, and move on to show you how to identify and utilize an effective set of OpenStack troubleshooting tools and fix common Keystone problems. Next, we will expose you to common errors and problems you may encounter when using the OpenStack Block Storage service (Cinder). We will then examine Heat, the OpenStack Orchestration Service, where you will learn how to trace errors, determine their root cause, and effectively correct the issue. Finally, you will get to know the best practices to architect your OpenStack cloud in order to achieve optimal performance, availability, and reliability. Style and approach This is straight-to-the point guide to fixing your OpenStack cluster. Common problems are identified and suggestions to resolve these problems are presented in a simple, easy-to-understand manner.
Advanced Penetration Testing for Highly-Secured Environments - Second Edition
Advanced Penetration Testing for Highly-Secured Environments - Second Edition
Lee Allen
¥107.90
Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments About This Book Learn how to build your own pentesting lab environment to practice advanced techniques Customize your own *s, and learn methods to exploit 32-bit and 64-bit programs Explore a vast variety of stealth techniques to bypass a number of protections when penetration testing Who This Book Is For This book is for anyone who wants to improve their skills in penetration testing. As it follows a step-by-step approach, anyone from a novice to an experienced security tester can learn effective techniques to deal with highly secured environments. Whether you are brand new or a seasoned expert, this book will provide you with the skills you need to successfully create, customize, and plan an advanced penetration test. What You Will Learn A step-by-step methodology to identify and penetrate secured environments Get to know the process to test network services across enterprise architecture when defences are in place Grasp different web application testing methods and how to identify web application protections that are deployed Understand a variety of concepts to exploit software Gain proven post-exploitation techniques to exfiltrate data from the target Get to grips with various stealth techniques to remain undetected and defeat the latest defences Be the first to find out the latest methods to bypass firewalls Follow proven approaches to record and save the data from tests for analysis In Detail The defences continue to improve and become more and more common, but this book will provide you with a number or proven techniques to defeat the latest defences on the networks. The methods and techniques contained will provide you with a powerful arsenal of best practices to increase your penetration testing successes. The processes and methodology will provide you techniques that will enable you to be successful, and the step by step instructions of information gathering and intelligence will allow you to gather the required information on the targets you are testing. The exploitation and post-exploitation sections will supply you with the tools you would need to go as far as the scope of work will allow you. The challenges at the end of each chapter are designed to challenge you and provide real-world situations that will hone and perfect your penetration testing skills. You will start with a review of several well respected penetration testing methodologies, and following this you will learn a step-by-step methodology of professional security testing, including stealth, methods of evasion, and obfuscation to perform your tests and not be detected! The final challenge will allow you to create your own complex layered architecture with defences and protections in place, and provide the ultimate testing range for you to practice the methods shown throughout the book. The challenge is as close to an actual penetration test assignment as you can get! Style and approach The book follows the standard penetration testing stages from start to finish with step-by-step examples. The book thoroughly covers penetration test expectations, proper scoping and planning, as well as enumeration and foot printing
Learning C# by Developing Games with Unity 5.x - Second Edition
Learning C# by Developing Games with Unity 5.x - Second Edition
Greg Lukosek
¥80.65
Develop your first interactive 2D platformer game by learning the fundamentals of C# About This Book Get to grips with the fundamentals of *ing in C# with Unity Create an awesome, 2D platformer game from scratch using the principles of object-oriented programming and coding in C# This is a step-by-step guide to learn the fundamentals of C# *ing to develop GameObjects and master the basics of the new UI system in Unity Who This Book Is For The book is targeted at beginner level Unity developers with no programming experience. If you are a Unity developer and you wish to learn how to write C# *s and code by creating games, then this book is for you. What You Will Learn Understand the fundamentals of variables, methods, and code syntax in C# Get to know about techniques to turn your game idea into working project Use loops and collections efficiently in Unity to reduce the amount of code Develop a game using the object-oriented programming principles Generate infinite levels for your game Create and code a good-looking functional UI system for your game Publish and share your game with users In Detail Unity is a cross-platform game engine that is used to develop 2D and 3D video games. Unity 5 is the latest version, released in March 2015, and adds a real-time global illumination to the games, and its powerful new features help to improve a game’s efficiency. This book will get you started with programming behaviors in C# so you can create 2D games in Unity. You will begin by installing Unity and learning about its features, followed by creating a C# *. We will then deal with topics such as unity *ing for you to understand how codes work so you can create and use C# variables and methods. Moving forward, you will find out how to create, store, and retrieve data from collection of objects. You will also develop an understanding of loops and their use, and you’ll perform object-oriented programming. This will help you to turn your idea into a ready-to-code project and set up a Unity project for production. Finally, you will discover how to create the GameManager class to manage the game play loop, generate game levels, and develop a simple UI for the game. By the end of this book, you will have mastered the art of applying C# in Unity. Style and approach This is a step-by-step guide to developing a game from scratch by applying the fundamentals of C# and Unity *ing.
OpenStack Trove Essentials
OpenStack Trove Essentials
Alok Shrivastwa
¥63.21
Build your own cloud based Database as a Service using OpenStack Trove About This Book Familiarize yourself with the concept of Database as a Service and make your existing system scalable and efficient with OpenStack Trove Minimize the administrative tasks and complexities of managing your cloud infrastructure This is a fast-paced guide to datastore management on the OpenStack platform using OpenStack Trove Who This Book Is For If you are a DBA / system administrator / architect, or a student who wants to build a Database as a Service based on OpenStack, this book is for you. You should have a basic knowledge of OpenStack components, RDBMS/NoSQL, IaaS, and cloud computing. What You Will Learn Get to grips with the basics of OpenStack and the prerequisites to install Trove Understand the expectations of DBaaS and how Trove can help you achieve them Set up a basic installation of DevStack (Development Stack) in a virtual box Install Trove and utilize its configuration groups to manage and tune databases Use Image builder to create guest images for Trove Utilize Trove to provision your first database instance Back up and restore your databases with the help of Trove In Detail OpenStack has become an extremely popular solution to build public and private clouds with. Database as a Service (DBaaS) enables the delivery of more agile database services at lower costs. Some other benefits of DBaaS are secure database deployments and compliance to standards and best practices. Trove is a DBaaS built on OpenStack and is becoming more popular by the day. Since Trove is one of the most recent projects of OpenStack, DBAs and system administrators can find it difficult to set up and run a DBaaS using OpenStack Trove. This book helps DBAs make that step. We start by introducing you to the concepts of DBaaS and how is it implemented using OpenStack Trove. Following this, we look at implementing OpenStack and deploying Trove. Moving on, you will learn to create guest images to be used with Trove. We then look at how to provision databases in self-service mode, and how to perform administration tasks such as backup and recovery, and fine-tuning databases. At the end of the book, we will examine some advanced features of Trove such as replication. Style and approach This fast-paced, step-by-step guide introduces you to DBaaS, OpenStack Trove, and its components, leading you through building your own Cloud-based DBaaS. Using the DevStack deployment method, you will spend less time on installing OpenStack so you can devote more time to learning how to provision and manage databases in a DBaaS environment.
Swift Essentials - Second Edition
Swift Essentials - Second Edition
Dr Alex Blewitt
¥63.21
Discover how to build iOS and watchOS applications in Swift 2 using XcodeAbout This BookGets you up and running with Swift programming without any prior iOS development experience.A fast paced guide showing best practices and lets you get up to speed with Swift to quickly build your own iOS applicationsA unique practical approach to make your life with Swift easy.Who This Book Is ForAre you interested in learning SwiftDo you want to write iOS applications in SwiftIf yes, then this is the book for you. No prior iOS programming experience is assumed; however, having some experience with any programming language will be beneficial.What You Will LearnDive into Swift and explore its innovative and powerful syntaxWork with Swift in Xcode to get a unique and productive approach to developmentFind out how to create complete iOS applicationsDiscover rapid prototyping with a Swift playgroundGet to know how to use the Swift storyboard to develop multi-page applicationsGet to grips with parsing JSON and XML data from network sourcesBuild a network client for GitHub repositories, with full source code on GitHubIn DetailSwift was considered one of the biggest innovations last year, and certainly with Swift 2 announced at WWDC in 2015, this segment of the developer space will continue to be hot and dominating.This is a fast-paced guide to provide an overview of Swift programming and then walks you through in detail how to write iOS applications. Progress through chapters on custom views, networking, parsing and build a complete application as a Git repository, all by using Swift as the core languageStyle and approachThis fast-paced practical guide will quickly give you hands-on experience with all the features of Swift programming. Following the practical examples in the book will help you successfully create your own iOS applications.
Getting Started with ResearchKit
Getting Started with ResearchKit
Edward Cessna
¥80.65
Enter the era of medical research using mobile devices with the help of this guide on ResearchKit!About This BookCreate a simple clinical research app using most aspects of ResearchKitBuild a simple survey with various data types with the results printed on the screen.A step-by-step guide introducing Apple's ResearchKit and techniques to incorporate it into various apps.Who This Book Is ForThis book is aimed at medical researchers with basic iOS coding knowledge and iOS developers looking to create clinical research apps.What You Will LearnLearn to create customized consent formGet introduced to two backend services: a simple backend server using Sinatra and Sage BridgeBuild a custom task (a conditional survey example) and a navigable taskGet an Overview of ResearchKit's open source repository and App CoreInteraction with the hardware of the device including the gyro and the motion sensorsLearn the basics of this revolutionary technologyGet introduced to the barebones app and learn to write your first codeIn DetailResearchKit is an open source software development framework from Apple that lets you easily create mobile applications for clinical research studies. ResearchKit provides you the ability to orchestrate the administration of tasks and recording of the results. ResearchKit provides tasks in order to perform informed consent, active tasks, and surveys.Starting with the basics of the ResearchKit framework, this books walks you through the steps of creating iOS applications that could serve as the basis of a clinical research mobile app.This book will introduce readers to ResearchKit and how to turn your iPhone into into a clinical research tool. The book will start off by installing and building the research framework in line with the researcher's needs; during this, the reader will learn to embed ResearchKit in the application and create a small task.After this, the book will go a little deeper into creating modules for surveys, consents, and so on. The book will also cover the various aspects of privacy and security with regard to participant data, and how to build dashboards for visualizing medical data and results in line with the researcher's requirements: data backends, JSON serialization and deserialization, and so on.Readers will be able to fully utilize ResearchKit for medical research, will be able to get more and more patients to participate in their surveys, and will gain insights from the surveys using the dashboards created.Style and approachA hands-on guide with ample screenshots for you to follow and learn about ResearchKit. Each topic is explained sequentially and placed in context so that you can get a better understanding of every step in the process of creating clinical research apps.
Cocos2d Cross-Platform Game Development Cookbook - Second Edition
Cocos2d Cross-Platform Game Development Cookbook - Second Edition
Siddharth Shekar
¥90.46
Develop games for iOS and Android using Cocos2d with the aid of over 70 step-by-step recipesAbout This BookLearn to efficiently use Cocos2d to develop cross-platform games, and have them work on iOS as well as AndroidGet acquainted with industry-wide professional tools such as Glyph Designer, Texture Packer, and Physics Editor, as well as using the Swift/ Sprite builder implementation of Cocos2dUse the easy-to-follow recipes to develop as well as deploy games to the Playstore and the App StoreWho This Book Is ForThis book is for intermediate game developers and especially the ones who are generally curious to find out what’s new in Cocos2d v 3.3.What You Will LearnBuild custom sprites with custom animations for the gameBuild interactivity into your game by adding gestures and touch interactionsUnderstand AI enemy programming and path finding to make games more excitingAdd physics to your game to make it more lively and interactiveGet familiar with the Swift and Sprite builder implementations along with Objective-C programmingPerform hassle-free deployment of games built in iOS onto AndroidAdd effects and particle systems to make the game more colorfulIn DetailCocos2d is the world’s leading game development framework for developing iOS games. With the introduction of Swift and Spritebuilder, it has become easier than ever to develop the games of your dreams without much effort. With Cocos2d, you can also deploy the game on Android, thereby maximizing profit and reducing development and porting costs.The book starts off with a detailed look at how to implement sprites and animations into your game to make it livelier. You will then learn to add scenes to the game such as the gameplay scene and options scene and create menus and buttons in these scenes, as well as creating transitions between them. From there on, you will get an understanding of how to program user interactions such as tapping, holding, and swiping. You’ll then add accelerometer inputs and physics to the scene, and make objects respond back to the inputs. A game is practically incomplete without audio being added, so this will be covered next.The next section will include ways to add Artificial Intelligence to enemies in the game, allowing them to patrol, chase, and shoot in a projectile manner. You will then learn to use NSUserDefault to save and load game progress, and create and access files using JSON, Plist, and XML files for custom storage and retrieval of data. Then you will learn to add dynamic lighting to your game and will use industry-wide tools such as Texture Packer, Glyph Designer, Physics Editor, Particle Designer, and Sprite Illuminator to create more visually appealing and performance-optimized games.Towards the end of the book, we dive into Apple’s latest programming language—Swift, highlighting the major differences between Objective C and Swift. The book culminates with taking your existing game developed for iOS and porting it to Android, showing you how to install the Android Xcode plugin as well.Style and approachThe book is written in an extremely lucid and step-by-step manner; it can be understood easily by anyone. The topics included are broken down into individual chapters so you can refer to the specific chapter to get answers on the subject you are interested in.
Kali Linux Web Penetration Testing Cookbook
Kali Linux Web Penetration Testing Cookbook
Gilberto Nájera-Gutiérrez
¥90.46
Over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2About This BookFamiliarize yourself with the most common web vulnerabilities a web application faces, and understand how attackers take advantage of themSet up a penetration testing lab to conduct a preliminary assessment of attack surfaces and run exploitsLearn how to prevent vulnerabilities in web applications before an attacker can make the most of itWho This Book Is ForThis book is for IT professionals, web developers, security enthusiasts, and security professionals who want an accessible reference on how to find, exploit, and prevent security vulnerabilities in web applications. You should know the basics of operating a Linux environment and have some exposure to security technologies and tools.What You Will LearnSet up a penetration testing laboratory in a secure wayFind out what information is useful to gather when performing penetration tests and where to look for itUse crawlers and spiders to investigate an entire website in minutesDiscover security vulnerabilities in web applications in the web browser and using command-line toolsImprove your testing efficiency with the use of automated vulnerability scannersExploit vulnerabilities that require a complex setup, run custom-made exploits, and prepare for extraordinary scenariosSet up Man in the Middle attacks and use them to identify and exploit security flaws within the communication between users and the web serverCreate a malicious site that will find and exploit vulnerabilities in the user's web browserRepair the most common web vulnerabilities and understand how to prevent them becoming a threat to a site's securityIn DetailWeb applications are a huge point of attack for malicious hackers and a critical area for security professionals and penetration testers to lock down and secure. Kali Linux is a Linux-based penetration testing platform and operating system that provides a huge array of testing tools, many of which can be used specifically to execute web penetration testing.This book will teach you, in the form step-by-step recipes, how to detect a wide array of vulnerabilities, exploit them to analyze their consequences, and ultimately buffer attackable surfaces so applications are more secure, for you and your users.Starting from the setup of a testing laboratory, this book will give you the skills you need to cover every stage of a penetration test: from gathering information about the system and the application to identifying vulnerabilities through manual testing and the use of vulnerability scanners to both basic and advanced exploitation techniques that may lead to a full system compromise. Finally, we will put this into the context of OWASP and the top 10 web application vulnerabilities you are most likely to encounter, equipping you with the ability to combat them effectively. By the end of the book, you will have the required skills to identify, exploit, and prevent web application vulnerabilities.Style and approachTaking a recipe-based approach to web security, this book has been designed to cover each stage of a penetration test, with de*ions on how tools work and why certain programming or configuration practices can become security vulnerabilities that may put a whole system, or network, at risk. Each topic is presented as a sequence of tasks and contains a proper explanation of why each task is performed and what it accomplishes.
Mobile Application Penetration Testing
Mobile Application Penetration Testing
Vijay Kumar Velu
¥90.46
Explore real-world threat scenarios, attacks on mobile applications, and ways to counter them About This Book Gain insights into the current threat landscape of mobile applications in particular Explore the different options that are available on mobile platforms and prevent circumventions made by attackers This is a step-by-step guide to setting up your own mobile penetration testing environment Who This Book Is For If you are a mobile application evangelist, mobile application developer, information security practitioner, penetration tester on infrastructure web applications, an application security professional, or someone who wants to learn mobile application security as a career, then this book is for you. This book will provide you with all the skills you need to get started with Android and iOS pen-testing. What You Will Learn Gain an in-depth understanding of Android and iOS architecture and the latest changes Discover how to work with different tool suites to assess any application Develop different strategies and techniques to connect to a mobile device Create a foundation for mobile application security principles Grasp techniques to attack different components of an Android device and the different functionalities of an iOS device Get to know secure development strategies for both iOS and Android applications Gain an understanding of threat modeling mobile applications Get an in-depth understanding of both Android and iOS implementation vulnerabilities and how to provide counter-measures while developing a mobile app In Detail Mobile security has come a long way over the last few years. It has transitioned from "should it be done?" to "it must be done!"Alongside the growing number of devises and applications, there is also a growth in the volume of Personally identifiable information (PII), Financial Data, and much more. This data needs to be secured. This is why Pen-testing is so important to modern application developers. You need to know how to secure user data, and find vulnerabilities and loopholes in your application that might lead to security breaches. This book gives you the necessary skills to security test your mobile applications as a beginner, developer, or security practitioner. You'll start by discovering the internal components of an Android and an iOS application. Moving ahead, you'll understand the inter-process working of these applications. Then you'll set up a test environment for this application using various tools to identify the loopholes and vulnerabilities in the structure of the applications. Finally, after collecting all information about these security loop holes, we'll start securing our applications from these threats. Style and approach This is an easy-to-follow guide full of hands-on examples of real-world attack simulations. Each topic is explained in context with respect to testing, and for the more inquisitive, there are more details on the concepts and techniques used for different platforms.
Learning Swift - Second Edition
Learning Swift - Second Edition
Andrew J Wagner
¥71.93
Develop the skills required to create compelling, maintainable, and robust iOS and OS X apps with Swift About This Book Write expressive, understandable, and maintainable Swift 2 code with this hands-on tutorial Unveil the complex underpinnings of Swift to turn your app ideas into reality This book is packed with real-life examples to help you implement concepts as you learn Who This Book Is For If you are looking to build iOS or OS X apps using the most modern technology, this book is ideal for you. You will find this book especially useful if you are new to programming or if you are yet to develop for iOS or OS X. No prior programming exposure is required. What You Will Learn Form a solid understanding of the Swift 2 language Get to know the practical aspects of how a computer program actually works Understand the paradigms used by Apple’s frameworks so you are not intimidated by them Utilize the vast resources written in Objective-C to better inform your Swift programming Develop a basic portfolio of Swift code by learning the critical concepts Experience both object-oriented and functional programming Get to know the new coding techniques made available by Swift 2 Discover resources to ensure you never stop becoming a better developer In Detail Swift is Apple’s new programming language and the future of iOS and OS X app development. It is a high-performance language that feels like a modern *ing language. On the surface, Swift is easy to jump into, but it has complex underpinnings that are critical to becoming proficient at turning an idea into reality. This book is an approachable, step-by-step introduction into programming with Swift for everyone. It begins by giving you an overview of the key features through practical examples and progresses to more advanced topics that help differentiate the proficient developers from the mediocre ones. It covers important concepts such as Variables, Optionals, Closures, Generics, and Memory Management. Mixed in with those concepts, it also helps you learn the art of programming such as maintainability, useful design patterns, and resources to further your knowledge. This all culminates in writing a basic iOS app that will get you well on your way to turning your own app ideas into reality. Style and approach This is an approachable, step-by-step guide to programming in Swift 2. Each topic is separated into compressible sections that are full of practical examples and easy-to-understand explanations. Each section builds on the previous topics so you can develop a proficient and comprehensive understanding of app development in Swift 2.
Drupal 8 Theming with Twig
Drupal 8 Theming with Twig
Chaz Chumley
¥80.65
Master Drupal 8’s new Twig templating engine to create fun and fast websites with simple steps to help you move from concept to completion About This Book Create beautiful responsive Drupal 8 websites using Twig Quickly master theme administration, custom block layouts, views, and the Twig template structure A step-by-step guide to the most common approaches in web design Who This Book Is For This book is intended for front-end developers, designers, and anyone who is generally interested in learning all the new features of Drupal 8 theming. Discover what has changed from Drupal 7 to Drupal 8 and immerse yourself in the new Twig PHP templating engine. Familiarity with HTML5, CSS3, JavaScript, and the Drupal Admin interface would be helpful. Prior experience with setting up and configuring a standalone development environment is required as we will be working with PHP and MySQL. What You Will Learn Navigate the Drupal 8 Admin interface Build custom block layouts with reusable and fieldable blocks Create subthemes based on the Bartik and Classy base themes Construct a responsive theme with Twitter Bootstrap Work with the new Twig PHP templating engine Configure Drupal for Twig debugging Enable preprocessing of Twig variables Develop a theme from scratch following a step-by-step project outline In Detail Drupal 8 is an open source content management system and powerful framework that helps deliver great websites to individuals and organizations, including non-profits, commercial, and government around the globe. This new release has been built on top of object-oriented PHP and includes more than a handful of improvements such as a better user experience, cleaner HTML5 markup, a new templating engine called Twig, multilingual capabilities, new configuration management, and effortless content authoring. Drupal 8 will quickly become the new standard for deploying content to both the web and mobile applications. However, with so many new changes, it can quickly become overwhelming knowing where to start and how to quickly. Starting from the bottom up, we will install, set up, and configure Drupal 8. We’ll navigate the Admin interface so you can learn how to work with core themes and create new custom block layouts. Walk through a real-world project to create a Twig theme from concept to completion while adopting best practices to implement CSS frameworks and JavaScript libraries. We will see just how quick and easy it is to create beautiful, responsive Drupal 8 websites while avoiding the common mistakes that many front-end developers make. Style and approach Drupal 8 Theming with Twig is intended for front-end developers, designers, and anyone who is generally interested in learning all the new features of Drupal 8 theming. Discover what has changed from Drupal 7 to Drupal 8 and immerse yourself in the new Twig PHP templating engine. Familiarity with HTML5, CSS3, JavaScript, and the Drupal Admin interface would be helpful. Prior experience with setting up and configuring a standalone development environment is required as we will be working with PHP and MySQL.
Mastering Wireshark
Mastering Wireshark
Charit Mishra
¥90.46
Analyze data network like a professional by mastering Wireshark - From 0 to 1337 About This Book Master Wireshark and train it as your network sniffer Impress your peers and get yourself pronounced as a network doctor Understand Wireshark and its numerous features with the aid of this fast-paced book packed with numerous screenshots, and become a pro at resolving network anomalies Who This Book Is For Are you curious to know what’s going on in a networkDo you get frustrated when you are unable to detect the cause of problems in your networksThis is where the book comes into play. Mastering Wireshark is for developers or network enthusiasts who are interested in understanding the internal workings of networks and have prior knowledge of using Wireshark, but are not aware about all of its functionalities. What You Will Learn Install Wireshark and understand its GUI and all the functionalities of it Create and use different filters Analyze different layers of network protocols and know the amount of packets that flow through the network Decrypt encrypted wireless traffic Use Wireshark as a diagnostic tool and also for network security analysis to keep track of malware Troubleshoot all the network anomalies with help of Wireshark Resolve latencies and bottleneck issues in the network In Detail Wireshark is a popular and powerful tool used to analyze the amount of bits and bytes that are flowing through a network. Wireshark deals with the second to seventh layer of network protocols, and the analysis made is presented in a human readable form. Mastering Wireshark will help you raise your knowledge to an expert level. At the start of the book, you will be taught how to install Wireshark, and will be introduced to its interface so you understand all its functionalities. Moving forward, you will discover different ways to create and use capture and display filters. Halfway through the book, you’ll be mastering the features of Wireshark, analyzing different layers of the network protocol, looking for any anomalies. As you reach to the end of the book, you will be taught how to use Wireshark for network security analysis and configure it for troubleshooting purposes. Style and approach Every chapter in this book is explained to you in an easy way accompanied by real-life examples and screenshots of the interface, making it easy for you to become an expert at using Wireshark.
Flask By Example
Flask By Example
Gareth Dwyer
¥63.21
Unleash the full potential of the Flask web framework by creating simple yet powerful web applications About This Book The most up-to-date book on Flask on the market Create your own world-class applications and master the art of Flask by unravelling its enigma through this journey This step-by-step tutorial is packed with examples on blending different technologies with Flask to get you up and running Who This Book Is For Have you looked at PHP and hated the clunky bloated syntaxOr looked at .Net and wished it was more open and flexibleMaybe you’ve tried your hand at GUI libraries in Python and found them hard to useIf your answer to any one of these questions is a yes, then this is just the book for you. It is also intended for people who know the basics of Python and want to learn how to use it to build powerful solutions with a web front-end. What You Will Learn Build three web applications from the ground up using the powerful Python micro framework, Flask. Dynamically display data to your viewers, based on their requests Store user and static data in SQL and NoSQL databases and use this data to power your web applications Create a good user experience by combining HTML, CSS, and JavaScript Harness the convenience of freely available APIs, including OpenWeatherMap, Open Exchange Rates, and bitly Extend your applications to build advanced functionality, such as a user account control system using Flask-Login Learn about web application security and defend against common attacks, such as SQL injection and XSS In Detail This book will take you on a journey from learning about web development using Flask to building fully functional web applications. In the first major project, we develop a dynamic Headlines application that displays the latest news headlines along with up-to-date currency and weather information. In project two, we build a Crime Map application that is backed by a MySQL database, allowing users to submit information on and the location of crimes in order to plot danger zones and other crime trends within an area. In the final project, we combine Flask with more modern technologies, such as Twitter's Bootstrap and the NoSQL database MongoDB, to create a Waiter Caller application that allows restaurant patrons to easily call a waiter to their table. This pragmatic tutorial will keep you engaged as you learn the crux of Flask by working on challenging real-world applications. Style and approach This book will provide you with rich, practical experience of Flask. Every technology, that is employed along with Flask is comprehensively introduced, while the book focusses on developing web applications. Pointers to educational material are always given if you want to gain in-depth knowledge of the various technologies used.
Claude Monet:Vol1
Claude Monet:Vol1
Brodskaïa,Nathalia
¥122.54
对莫奈而言,艺术创作始终是一种痛苦的挣扎。较之同时代人,他更深沉地痴迷于表达情感,更强烈地渴望传达超越大自然的光线效果。用他自己的话来形容:“技巧来来去去……艺术始终如一——它是大自然的转译,需要与意志力同等的敏感性。我和太阳搏斗……(我)应该用金子和宝石作画。”
Claude Monet:Vol2
Claude Monet:Vol2
Brodskaïa,Nathalia
¥122.54
对莫奈而言,艺术创作始终是一种痛苦的挣扎。较之同时代人,他更深沉地痴迷于表达情感,更强烈地渴望传达超越大自然的光线效果。用他自己的话来形容:“技巧来来去去……艺术始终如一——它是大自然的转译,需要与意志力同等的敏感性。我和太阳搏斗……(我)应该用金子和宝石作画。”
Learning iOS Penetration Testing
Learning iOS Penetration Testing
Swaroop Yermalkar
¥71.93
Secure your iOS applications and uncover hidden vulnerabilities by conducting penetration testsAbout This BookAchieve your goal to secure iOS devices and applications with the help of this fast paced manualFind vulnerabilities in your iOS applications and fix them with the help of this example-driven guideAcquire the key skills that will easily help you to perform iOS exploitation and forensics with greater confidence and a stronger understandingWho This Book Is ForThis book is for IT security professionals who want to conduct security testing of applications. This book will give you exposure to diverse tools to perform penetration testing. This book will also appeal to iOS developers who would like to secure their applications, as well as security professionals. It is easy to follow for anyone without experience of iOS pentesting.What You Will LearnUnderstand the basics of iOS app development, deployment, security architecture, application signing, application sandboxing, and OWASP TOP 10 for mobileSet up your lab for iOS app pentesting and identify sensitive information stored locallyPerform traffic analysis of iOS devices and catch sensitive data being leaked by side channelsModify an application’s behavior using runtime analysisAnalyze an application’s binary for security protectionAcquire the knowledge required for exploiting iOS devicesLearn the basics of iOS forensicsIn DetailiOS has become one of the most popular mobile operating systems with more than 1.4 million apps available in the iOS App Store. Some security weaknesses in any of these applications or on the system could mean that an attacker can get access to the device and retrieve sensitive information. This book will show you how to conduct a wide range of penetration tests on iOS devices to uncover vulnerabilities and strengthen the system from attacks.Learning iOS Penetration Testing discusses the common vulnerabilities and security-related shortcomings in an iOS application and operating system, and will teach you to conduct static and dynamic analysis of iOS applications.This practical guide will help you uncover vulnerabilities in iOS phones and applications. We begin with basics of iOS security and dig deep to learn about traffic analysis, code analysis, and various other techniques. Later, we discuss the various utilities, and the process of reversing and auditing.Style and approachThis fast-paced and practical guide takes a step-by-step approach to penetration testing with the goal of helping you secure your iOS devices and apps quickly.
MongoDB Cookbook - Second Edition
MongoDB Cookbook - Second Edition
Cyrus Dasadia
¥80.65
Harness the latest features of MongoDB 3 with this collection of 80 recipes – from managing cloud platforms to app development, this book is a vital resourceAbout This BookGet to grips with the latest features of MongoDB 3Interact with the MongoDB server and perform a wide range of query operations from the shellFrom administration to automation, this cookbook keeps you up to date with the world’s leading NoSQL databaseWho This Book Is ForThis book is engineered for anyone who is interested in managing data in an easy and efficient way using MongoDB. You do not need any prior knowledge of MongoDB, but it would be helpful if you have some programming experience in either Java or Python.What You Will LearnInstall, configure, and administer MongoDB sharded clusters and replica setsBegin writing applications using MongoDB in Java and Python languagesInitialize the server in three different modes with various configurationsPerform cloud deployment and introduce PaaS for MongoDiscover frameworks and products built to improve developer productivity using MongoTake an in-depth look at the Mongo programming driver APIs in Java and PythonSet up enterprise class monitoring and backups of MongoDBIn DetailMongoDB is a high-performance and feature-rich NoSQL database that forms the backbone of the systems that power many different organizations – it’s easy to see why it’s the most popular NoSQL database on the market. Packed with many features that have become essential for many different types of software professionals and incredibly easy to use, this cookbook contains many solutions to the everyday challenges of MongoDB, as well as guidance on effective techniques to extend your skills and capabilities.This book starts with how to initialize the server in three different modes with various configurations. You will then be introduced to programming language drivers in both Java and Python. A new feature in MongoDB 3 is that you can connect to a single node using Python, set to make MongoDB even more popular with anyone working with Python. You will then learn a range of further topics including advanced query operations, monitoring and backup using MMS, as well as some very useful administration recipes including SCRAM-SHA-1 Authentication. Beyond that, you will also find recipes on cloud deployment, including guidance on how to work with Docker containers alongside MongoDB, integrating the database with Hadoop, and tips for improving developer productivity.Created as both an accessible tutorial and an easy to use resource, on hand whenever you need to solve a problem, MongoDB Cookbook will help you handle everything from administration to automation with MongoDB more effectively than ever before.Style and approachEvery recipe is explained in a very simple set-by-step manner yet is extremely comprehensive.
OpenCV By Example
OpenCV By Example
Prateek Joshi
¥90.46
Enhance your understanding of Computer Vision and image processing by developing real-world projects in OpenCV 3About This BookGet to grips with the basics of Computer Vision and image processingThis is a step-by-step guide to developing several real-world Computer Vision projects using OpenCV 3This book takes a special focus on working with Tesseract OCR, a free, open-source library to recognize text in imagesWho This Book Is ForIf you are a software developer with a basic understanding of Computer Vision and image processing and want to develop interesting Computer Vision applications with Open CV, this is the book for you. Knowledge of C++ is required.What You Will LearnInstall OpenCV 3 on your operating systemCreate the required CMake *s to compile the C++ application and manage its dependenciesGet to grips with the Computer Vision workflows and understand the basic image matrix format and filtersUnderstand the segmentation and feature extraction techniquesRemove backgrounds from a static scene to identify moving objects for video surveillanceTrack different objects in a live video using various techniquesUse the new OpenCV functions for text detection and recognition with TesseractIn DetailOpen CV is a cross-platform, free-for-use library that is primarily used for real-time Computer Vision and image processing. It is considered to be one of the best open source libraries that helps developers focus on constructing complete projects on image processing, motion detection, and image segmentation.Whether you are completely new to the concept of Computer Vision or have a basic understanding of it, this book will be your guide to understanding the basic OpenCV concepts and algorithms through amazing real-world examples and projects.Starting from the installation of OpenCV on your system and understanding the basics of image processing, we swiftly move on to creating optical flow video analysis or text recognition in complex scenes, and will take you through the commonly used Computer Vision techniques to build your own Open CV projects from scratch.By the end of this book, you will be familiar with the basics of Open CV such as matrix operations, filters, and histograms, as well as more advanced concepts such as segmentation, machine learning, complex video analysis, and text recognition.Style and approachThis book is a practical guide with lots of tips, and is closely focused on developing Computer vision applications with OpenCV. Beginning with the fundamentals, the complexity increases with each chapter. Sample applications are developed throughout the book that you can execute and use in your own projects.
Boost.Asio C++ Network Programming Cookbook
Boost.Asio C++ Network Programming Cookbook
Dmytro Radchuk
¥90.46
Over 25 hands-on recipes to create robust and highly-efficient cross-platform distributed applications with the Boost.Asio libraryAbout This BookBuild highly efficient distributed applications with easeEnhance your cross-platform network programming skills with one of the most reputable C++ librariesFind solutions to real-world problems related to network programming with ready-to-use recipes using this detailed and practical handbookWho This Book Is ForIf you want to enhance your C++ network programming skills using the Boost.Asio library and understand the theory behind development of distributed applications, this book is just what you need. The prerequisite for this book is experience with general C++11. To get the most from the book and comprehend advanced topics, you will need some background experience in multithreading.What You Will LearnBoost your working knowledge of one of the most reputable C++ networking libraries—Boost.AsioFamiliarize yourself with the basics of TCP and UDP protocolsCreate scalable and highly-efficient client and server applicationsUnderstand the theory behind development of distributed applicationsIncrease the security of your distributed applications by adding SSL supportImplement a HTTP client easilyUse iostreams, scatter-gather buffers, and timersIn DetailStarting with recipes demonstrating the execution of basic Boost.Asio operations, the book goes on to provide ready-to-use implementations of client and server applications from simple synchronous ones to powerful multithreaded scalable solutions. Finally, you are presented with advanced topics such as implementing a chat application, implementing an HTTP client, and adding SSL support. All the samples presented in the book are ready to be used in real projects just out of the box.As well as excellent practical examples, the book also includes extended supportive theoretical material on distributed application design and construction.Style and approachThis book is a set of recipes, each containing the statement and de*ion of a particular practical problem followed by code sample providing the solution to the problem and detailed step-by-step explanation. Recipes are grouped by topic into chapters and ordered by the level of complexity from basic to advanced.
Mastering SciPy
Mastering SciPy
Francisco J. Blanco-Silva
¥80.65
Implement state-of-the-art techniques to visualize solutions to challenging problems in scientific computing, with the use of the SciPy stackAbout This BookMaster the theory and algorithms behind numerical recipes and how they can be applied to real-world problemsLearn to combine the most appropriate built-in functions from the SciPy stack by understanding the connection between the sources of your problem, volume of data, or computer architectureA comprehensive coverage of all the mathematical techniques needed to solve the presented topics, with a discussion of the relevant algorithms built in the SciPy stackWho This Book Is ForIf you are a mathematician, engineer, or computer scientist with a proficiency in Python and familiarity with IPython, this is the book for you. Some basic knowledge of numerical methods in scientific computing would be helpful.What You Will LearnMaster relevant algorithms used in symbolic or numerical mathematics to address approximation, interpolation, differentiation, integration, root-finding, and optimization of scalar or multi-variate functionsDevelop different algorithms and strategies to efficiently store and manipulate large matrices of data, in particular to solve systems of linear equations, or compute their eigenvalues/eigenvectorsUnderstand how to model physical problems with systems of differential equations and distinguish the factors that dictate the strategies to solve themPerform statistical analysis, hypothesis test design and resolution, or data mining at a higher level, and apply them to real-life problems in the field of data analysisGain insights on the power of distances, Delaunay triangulations and Voronoi diagrams for Computational Geometry, and apply them to various engineering problemsFamiliarize yourself with different techniques in signal/image processing, including filtering audio, images, or video to extract information, features, or remove componentsIn DetailThe SciPy stack is a collection of open source libraries of the powerful *ing language Python, together with its interactive shells. This environment offers a cutting-edge platform for numerical computation, programming, visualization and publishing, and is used by some of the world’s leading mathematicians, scientists, and engineers. It works on any operating system that supports Python and is very easy to install, and completely free of charge! It can effectively transform into a data-processing and system-prototyping environment, directly rivalling MATLAB and Octave.This book goes beyond a mere de*ion of the different built-in functions coded in the libraries from the SciPy stack. It presents you with a solid mathematical and computational background to help you identify the right tools for each problem in scientific computing and visualization. You will gain an insight into the best practices with numerical methods depending on the amount or type of data, properties of the mathematical tools employed, or computer architecture, among other factors.The book kicks off with a concise exploration of the basics of numerical linear algebra and graph theory for the treatment of problems that handle large data sets or matrices. In the subsequent chapters, you will delve into the depths of algorithms in symbolic algebra and numerical analysis to address modeling/simulation of various real-world problems with functions (through interpolation, approximation, or creation of systems of differential equations), and extract their representing features (zeros, extrema, integration or differentiation).Lastly, you will move on to advanced concepts of data analysis, image/signal processing, and computational geometry.Style and approachPacked with real-world examples, this book explores the mathematical techniques needed to solve the presented topics, and focuses on the algorithms built in the SciPy stack.
Getting Started with Citrix XenApp? 7.6
Getting Started with Citrix XenApp? 7.6
Konstantin Cvetanov
¥99.18
Install, configure, and support your XenApp systems with the power of Citrix XenAppAbout This BookFamiliarize yourself with Citrix applications and desktop virtualizationMaintain and troubleshoot your XenApp environment to minimize system downtimeA hands-on, step-by-step guide with a practical approach and real-world examples to get you up and running with XenApp systemsWho This Book Is ForThis book is intended for IT administrators and consultants who want to build application and desktop virtualization solutions for their employers and customers. No prior knowledge of Citrix technologies is required.What You Will LearnMake the use case for Citrix XenApp and design your first systemPrepare your existing IT infrastructure for XenApp and learn what licenses you needInstall and configure the XenApp infrastructureEnable access with StoreFront and NetScaler GatewayEnable load balancing with NetScalerMaintain servers and publish applications and desktopsManage printing in a Citrix environmentTroubleshoot your environment using advanced tools and methodologies employed by Citrix Escalation TeamsIn DetailIf you want to effectively deploy the various components of Citrix XenApp to create an enterprise environment for application and desktop delivery, this hands-on guide is perfect for you. You start off by understanding the need and benefits of Citrix XenApp with respect to Virtualization technology. After this, you will get to grips with the requirement analysis and designing aspect of building XenApp systems and all the necessary installation and configuration procedures for Citrix XenApp, StoreFront and NetScalar Gateway are explained one by one in detail.Step-by-step, you will learn to deploy your first XenApp with the Machine Creation Services method and Provisioning Services method. After this, you will explore the administering part of applications and systems, followed by printing in the XenApp environment. Next, you will learn all the trips and tricks required to troubleshoot and support the XenApp environment. By the end of this book, you will be ready to go live with your new XenApp environment.Style and approachThis is a step-by-step guide to technical implementations in a conversational and easy-to-follow style. Each component is deployed sequentially until a full solution is built. Basic as well as advanced features of the product are explored to appeal to the widest possible audience interested in the topic.