万本电子书0元读

万本电子书0元读

Moodle 3 Administration - Third Edition
Moodle 3 Administration - Third Edition
Alex Büchner
¥90.46
An administrator’s guide to configuring, securing, customizing, and extending MoodleAbout This BookLearn how to plan, install, optimize, customize, and configure MoodleGuarantee a cutting-edge learning experience in a secure and customizable environment while optimizing your day-to-day workloadA one-stop guide with a problem-solution approach and a wide range of real-world examplesWho This Book Is ForIf you are a technician, systems administrator, or part of academic staff, this is the book for you. This book is ideal for anyone who has to administer a Moodle system. Whether you are dealing with a small-scale local Moodle system or a large-scale multi-site Virtual Learning Environment, this book will assist you with any administrative task. Some basic Moodle knowledge is helpful, but not essential.What You Will LearnInstall and update Moodle on multiple platforms manually and via CLI and GITManage courses and categories, users and cohorts, as well as rolesGet Moodle hooked up to repositories, portfolios, and open badgesConfigure Moodle for mobile usage, accessibility, localization, communication, and collaborationGuarantee backups, security and privacy, and achieve maximum performance via the Moodle Universal Cache and the new cron systemConfigure the Moodle events system to generate comprehensive reports, statistics, and learning analyticsNetwork Moodle with Mahara and extend it with third-party add-ons and via LTICustomize Moodle web services to enable mobile learning and integration with other IT systemsIn DetailMoodle is the de facto standard for open source learning platforms. However, setting up and managing a learning environment can be a complex task since it covers a wide range of technical, organizational, and pedagogical topics. This ranges from basic user and course management, to configuring plugins and design elements, all the way to system settings, performance optimization, events frameworks, and so on.This book concentrates on basic tasks such as how to set up and configure Moodle and how to perform day-to-day administration activities, and progresses on to more advanced topics that show you how to customize and extend Moodle, manage courses, cohorts, and users, and how to work with roles and capabilities. You’ll learn to configure Moodle plugins and ensure your VLE conforms to pedagogical and technical requirements in your organization. You’ll then learn how to integrate the VLE via web services and network it with other sites, including Mahara, and extend your system via plugins and LTI. By the end of this book, you will be able to set up an efficient, fully fledged, and secure Moodle system.Style and approachThe book takes a problem-solution approach to fall in line with your day-to-day operations. This is a one-stop reference for any task you will ever come across when administering a Moodle site of any shape and size.
Scala Design Patterns
Scala Design Patterns
Ivan Nikolov
¥99.18
Write efficient, clean, and reusable code with ScalaAbout This BookUnleash the power of Scala and apply it in the real worldIncrease your efficiency by leveraging the power of Creational, Structural, Behavioural, and Functional design patternsBuild object oriented and functional applications quickly and effectivelyWho This Book Is ForIf you want to increase your understanding of Scala and apply it to real-life application development, then this book is for you. We’ve also designed the book to be used as a quick reference guide while creating applications. Previous Scala programming knowledge is expected.What You Will LearnImmerse yourself in industry-standard design patterns—structural, creational, and behavioral—to create extraordinary applicationsFeel the power of traits and their application in ScalaImplement abstract and self types and build clean design patternsBuild complex entity relationships using structural design patternsCreate applications faster by applying functional design patternsIn DetailScala has become increasingly popular in many different IT sectors. The language is exceptionally feature-rich which helps developers write less code and get faster results. Design patterns make developer’s lives easier by helping them write great software that is easy to maintain, runs efficiently and is valuable to the company or people concerned.You will learn about the various features of Scala and be able to apply well-known, industry-proven design patterns in your work. The book starts off by focusing on some of the most interesting features of Scala while using practical real-world examples. We will also cover the popular "Gang of Four" design patterns and show you how to incorporate functional patterns effectively. By the end of this book, you will have enough knowledge and understanding to quickly assess problems and come up with elegant solutions.Style and approachThe design patterns in the book will be explained using real-world, step-by-step examples. For each design pattern, there will be hints about when to use it and when to look for something more suitable. This book can also be used as a practical guide, showing you how to leverage design patterns effectively.
3D Printing Designs: Octopus Pencil Holder
3D Printing Designs: Octopus Pencil Holder
Joe Larson
¥35.96
Learn to design and 3D print organic and functional designs using BlenderAbout This BookLearn how to make complex shapes by editing basic onesMake printable objects from multiple shapes and partsLearn how to design from scratch, without a reference to physical objectsWho This Book Is ForYou should have basic knowledge of Blender and 3D printing and be interested in printing your first object.What You Will LearnGet to know the guiding principles required to create 3D printer-friendly modelsUnderstand material characteristics, printing specifications, tolerances, and design tipsMaster the art of modifying basic shapes with Blender's powerful editing tools: extrude, loop cuts, and other transformationsLearn techniques of editing complex meshes, smoothing, combining shapes, and exporting them into STL files for printingIn DetailThis book will cover the very basic but essential techniques you need to model an organic and functional object for 3D printing using Blender.Starting with pen and paper and then moving on to the computer, you will create your first project in Blender, add basic geometric shapes, and use techniques such as extruding and subdividing to transform these shapes into complex meshes. You will learn how modifiers can automatically refine the shape further and combine multiple shapes into a single 3D printable model.By the end of the book, you will have gained enough practical hands-on experience to be able to create a 3D printable object of your choice, which in this case is a 3D print-ready octopus pencil holder.Style and approachThis is a starter project designed to introduce you to your first real-world 3D printing designs, where you'll learn how to handle the fundamental principles of 3D printing design and have your hands on your reward in no time.
OpenGL Game Development By Example
OpenGL Game Development By Example
Robert Madsen
¥107.90
Design and code your own 2D and 3D games efficiently using OpenGL and C++ About This Book Create 2D and 3D games completely, through a series of end-to-end game projects Learn to render high performance 2D and 3D graphics using OpenGL Implement a rudimentary game engine using step-by-step code Who This Book Is For If you are a prospective game developer with some experience using C++, then this book is for you. Both prospective and experienced game programmers will find nuggets of wisdom and practical advice as they learn to code two full games using OpenGL, C++, and a host of related tools. What You Will Learn Set up your development environment in Visual Studio using OpenGL Use 2D and 3D coordinate systems Implement an input system to handle the mouse and the keyboard Create a state machine to handle complex changes in the game Load, display, and manipulate both 2D and 3D graphics Implement collision detection and basic physics Discover the key components needed to complete a polished game Handle audio files and implement sound effects and music In Detail OpenGL is one of the most popular rendering SDKs used to develop games. OpenGL has been used to create everything from 3D masterpieces running on desktop computers to 2D puzzles running on mobile devices. You will learn to apply both 2D and 3D technologies to bring your game idea to life. There is a lot more to making a game than just drawing pictures and that is where this book is unique! It provides a complete tutorial on designing and coding games from the setup of the development environment to final credits screen, through the creation of a 2D and 3D game. The book starts off by showing you how to set up a development environment using Visual Studio, and create a code framework for your game. It then walks you through creation of two games–a 2D platform game called Roboracer 2D and a 3D first-person space shooter game–using OpenGL to render both 2D and 3D graphics using a 2D coordinate system. You'll create sprite classes, render sprites and animation, and navigate and control the characters. You will also learn how to implement input, use audio, and code basic collision and physics systems. From setting up the development environment to creating the final credits screen, the book will take you through the complete journey of creating a game engine that you can extend to create your own games. Style and approach An easy-to-follow guide full of code examples to illustrate every concept and help you build a 2D and 3D game from scratch, while learning the key tools that surround a typical OpenGL project.
Mobile Application Penetration Testing
Mobile Application Penetration Testing
Vijay Kumar Velu
¥90.46
Explore real-world threat scenarios, attacks on mobile applications, and ways to counter them About This Book Gain insights into the current threat landscape of mobile applications in particular Explore the different options that are available on mobile platforms and prevent circumventions made by attackers This is a step-by-step guide to setting up your own mobile penetration testing environment Who This Book Is For If you are a mobile application evangelist, mobile application developer, information security practitioner, penetration tester on infrastructure web applications, an application security professional, or someone who wants to learn mobile application security as a career, then this book is for you. This book will provide you with all the skills you need to get started with Android and iOS pen-testing. What You Will Learn Gain an in-depth understanding of Android and iOS architecture and the latest changes Discover how to work with different tool suites to assess any application Develop different strategies and techniques to connect to a mobile device Create a foundation for mobile application security principles Grasp techniques to attack different components of an Android device and the different functionalities of an iOS device Get to know secure development strategies for both iOS and Android applications Gain an understanding of threat modeling mobile applications Get an in-depth understanding of both Android and iOS implementation vulnerabilities and how to provide counter-measures while developing a mobile app In Detail Mobile security has come a long way over the last few years. It has transitioned from "should it be done?" to "it must be done!"Alongside the growing number of devises and applications, there is also a growth in the volume of Personally identifiable information (PII), Financial Data, and much more. This data needs to be secured. This is why Pen-testing is so important to modern application developers. You need to know how to secure user data, and find vulnerabilities and loopholes in your application that might lead to security breaches. This book gives you the necessary skills to security test your mobile applications as a beginner, developer, or security practitioner. You'll start by discovering the internal components of an Android and an iOS application. Moving ahead, you'll understand the inter-process working of these applications. Then you'll set up a test environment for this application using various tools to identify the loopholes and vulnerabilities in the structure of the applications. Finally, after collecting all information about these security loop holes, we'll start securing our applications from these threats. Style and approach This is an easy-to-follow guide full of hands-on examples of real-world attack simulations. Each topic is explained in context with respect to testing, and for the more inquisitive, there are more details on the concepts and techniques used for different platforms.
Drupal 8 Theming with Twig
Drupal 8 Theming with Twig
Chaz Chumley
¥80.65
Master Drupal 8’s new Twig templating engine to create fun and fast websites with simple steps to help you move from concept to completion About This Book Create beautiful responsive Drupal 8 websites using Twig Quickly master theme administration, custom block layouts, views, and the Twig template structure A step-by-step guide to the most common approaches in web design Who This Book Is For This book is intended for front-end developers, designers, and anyone who is generally interested in learning all the new features of Drupal 8 theming. Discover what has changed from Drupal 7 to Drupal 8 and immerse yourself in the new Twig PHP templating engine. Familiarity with HTML5, CSS3, JavaScript, and the Drupal Admin interface would be helpful. Prior experience with setting up and configuring a standalone development environment is required as we will be working with PHP and MySQL. What You Will Learn Navigate the Drupal 8 Admin interface Build custom block layouts with reusable and fieldable blocks Create subthemes based on the Bartik and Classy base themes Construct a responsive theme with Twitter Bootstrap Work with the new Twig PHP templating engine Configure Drupal for Twig debugging Enable preprocessing of Twig variables Develop a theme from scratch following a step-by-step project outline In Detail Drupal 8 is an open source content management system and powerful framework that helps deliver great websites to individuals and organizations, including non-profits, commercial, and government around the globe. This new release has been built on top of object-oriented PHP and includes more than a handful of improvements such as a better user experience, cleaner HTML5 markup, a new templating engine called Twig, multilingual capabilities, new configuration management, and effortless content authoring. Drupal 8 will quickly become the new standard for deploying content to both the web and mobile applications. However, with so many new changes, it can quickly become overwhelming knowing where to start and how to quickly. Starting from the bottom up, we will install, set up, and configure Drupal 8. We’ll navigate the Admin interface so you can learn how to work with core themes and create new custom block layouts. Walk through a real-world project to create a Twig theme from concept to completion while adopting best practices to implement CSS frameworks and JavaScript libraries. We will see just how quick and easy it is to create beautiful, responsive Drupal 8 websites while avoiding the common mistakes that many front-end developers make. Style and approach Drupal 8 Theming with Twig is intended for front-end developers, designers, and anyone who is generally interested in learning all the new features of Drupal 8 theming. Discover what has changed from Drupal 7 to Drupal 8 and immerse yourself in the new Twig PHP templating engine. Familiarity with HTML5, CSS3, JavaScript, and the Drupal Admin interface would be helpful. Prior experience with setting up and configuring a standalone development environment is required as we will be working with PHP and MySQL.
Troubleshooting OpenStack
Troubleshooting OpenStack
Tony Campbell
¥54.49
Get unstuck and start stacking! About This Book Easily fix the nagging problems that commonly plague OpenStack and become the go-to person in your organization Get better equipped to troubleshoot and solve common problems in performance, availability, and automation that confront production-ready OpenStack environments Save time and decrease frustration by solving significant issues that arise from OpenStack deployments pertaining to storage and networking Who This Book Is For You will need a basic understanding of OpenStack, Linux, and Cloud computing. If you have an understanding of Linux, this book will help you leverage that knowledge in the world of OpenStack, giving you confidence to tackle most issues that may arise. What You Will Learn Diagnose and remediate authentication and authorization problems in Keystone Fix common issues with images served through Glance Master the art of troubleshooting Neutron networking Navigate and overcome problems with Nova Troubleshoot and resolve Cinder block storage issues Identify and correct Swift object storage problems Isolate and fix issues caused by Heat orchestration Leverage Ceilometer and other metering and monitoring tools for effective troubleshooting In Detail OpenStack is a collection of software projects that work together to provide a cloud fabric. OpenStack is one of the fastest growing open source projects in history that unlocks cloud computing for everyone. With OpenStack, you are able to create public or private clouds on your own hardware. The flexibility and control afforded by OpenStack puts the cloud within reach of anyone willing to learn this technology. Starting with an introduction to OpenStack troubleshooting tools, we’ll walk through each OpenStack service and how you can quickly diagnose, troubleshoot, and correct problems in your OpenStack. Understanding the various projects and how they interact is essential for anyone attempting to troubleshoot an OpenStack cloud. We will start by explaining each of the major components and the dependencies between them, and move on to show you how to identify and utilize an effective set of OpenStack troubleshooting tools and fix common Keystone problems. Next, we will expose you to common errors and problems you may encounter when using the OpenStack Block Storage service (Cinder). We will then examine Heat, the OpenStack Orchestration Service, where you will learn how to trace errors, determine their root cause, and effectively correct the issue. Finally, you will get to know the best practices to architect your OpenStack cloud in order to achieve optimal performance, availability, and reliability. Style and approach This is straight-to-the point guide to fixing your OpenStack cluster. Common problems are identified and suggestions to resolve these problems are presented in a simple, easy-to-understand manner.
Magento 2 Cookbook
Magento 2 Cookbook
Ray Bogman
¥80.65
Over 50 practical recipes that will help you realize the full potential of Magento in order to build a professional online store About This Book Take advantage of the latest features in Magento 2 to set up an e-commerce store that fits your business needs Packed with several advanced recipes, not just to manage your online store, but to extend and design it as well Written in a cookbook style, you can pick and choose your recipe to carry out your day- to- day Magento store tasks Who This Book Is For The book is for existing Magento users who want to gain further expertise and insights into managing, designing, and extending their online store in Magento to fit their business needs. Working knowledge of Magento and basic familiarity with programming is expected. What You Will Learn Set up a Magento 2 project on Apache or Nginx. Transfer your Magento 1 database to Magento 2 using the Magento 2 system tools. Boost the performance of Magento 2 by enabling different types of caching. Build a Magento 2 multi-store by creating a root catalog, subdirectories, and products. Create and manage pages, blocks, and front-end apps. Manage your Magento store by setting up the correct TAX rules. Design custom themes within the Magento 2 framework. Create basic and advanced extensions using Magento 2. In Detail Magento 2 is an open source e-commerce platform that has all the functionality to function from small to large online stores. It is preferred by developers and merchants due to its new architecture, which makes it possible to extend the functionalities with plugins, a lot of which are now created by the community. This merchant and developer guide is packed with recipes that cover all aspects of Magento 2. The recipes start with simple how-to’s then delve into more advanced topics as the book progresses. We start with the basics of setting up a Magento 2 project on Apache or Nginx. Next, you will learn about basics including system tools and caching to get your Magento 2 system ready for the real work. We move on to simple tasks such as managing your store and catalog configuration. When you are familiar with this, we cover more complex features such as module and extension development. Then we will jump to the final part: advanced Magento 2 extensions. By the end of this book, you’ll be competent with all the development phases of Magento 2 and its most common elements. Style and approach Step by step guide for real world tasks for Magento users to gain a more advanced insight on managing, extending and designing their e-commerce store to fit their business needs.
Advanced Penetration Testing for Highly-Secured Environments - Second Edition
Advanced Penetration Testing for Highly-Secured Environments - Second Edition
Lee Allen
¥107.90
Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments About This Book Learn how to build your own pentesting lab environment to practice advanced techniques Customize your own *s, and learn methods to exploit 32-bit and 64-bit programs Explore a vast variety of stealth techniques to bypass a number of protections when penetration testing Who This Book Is For This book is for anyone who wants to improve their skills in penetration testing. As it follows a step-by-step approach, anyone from a novice to an experienced security tester can learn effective techniques to deal with highly secured environments. Whether you are brand new or a seasoned expert, this book will provide you with the skills you need to successfully create, customize, and plan an advanced penetration test. What You Will Learn A step-by-step methodology to identify and penetrate secured environments Get to know the process to test network services across enterprise architecture when defences are in place Grasp different web application testing methods and how to identify web application protections that are deployed Understand a variety of concepts to exploit software Gain proven post-exploitation techniques to exfiltrate data from the target Get to grips with various stealth techniques to remain undetected and defeat the latest defences Be the first to find out the latest methods to bypass firewalls Follow proven approaches to record and save the data from tests for analysis In Detail The defences continue to improve and become more and more common, but this book will provide you with a number or proven techniques to defeat the latest defences on the networks. The methods and techniques contained will provide you with a powerful arsenal of best practices to increase your penetration testing successes. The processes and methodology will provide you techniques that will enable you to be successful, and the step by step instructions of information gathering and intelligence will allow you to gather the required information on the targets you are testing. The exploitation and post-exploitation sections will supply you with the tools you would need to go as far as the scope of work will allow you. The challenges at the end of each chapter are designed to challenge you and provide real-world situations that will hone and perfect your penetration testing skills. You will start with a review of several well respected penetration testing methodologies, and following this you will learn a step-by-step methodology of professional security testing, including stealth, methods of evasion, and obfuscation to perform your tests and not be detected! The final challenge will allow you to create your own complex layered architecture with defences and protections in place, and provide the ultimate testing range for you to practice the methods shown throughout the book. The challenge is as close to an actual penetration test assignment as you can get! Style and approach The book follows the standard penetration testing stages from start to finish with step-by-step examples. The book thoroughly covers penetration test expectations, proper scoping and planning, as well as enumeration and foot printing
Mastering Wireshark
Mastering Wireshark
Charit Mishra
¥90.46
Analyze data network like a professional by mastering Wireshark - From 0 to 1337 About This Book Master Wireshark and train it as your network sniffer Impress your peers and get yourself pronounced as a network doctor Understand Wireshark and its numerous features with the aid of this fast-paced book packed with numerous screenshots, and become a pro at resolving network anomalies Who This Book Is For Are you curious to know what’s going on in a networkDo you get frustrated when you are unable to detect the cause of problems in your networksThis is where the book comes into play. Mastering Wireshark is for developers or network enthusiasts who are interested in understanding the internal workings of networks and have prior knowledge of using Wireshark, but are not aware about all of its functionalities. What You Will Learn Install Wireshark and understand its GUI and all the functionalities of it Create and use different filters Analyze different layers of network protocols and know the amount of packets that flow through the network Decrypt encrypted wireless traffic Use Wireshark as a diagnostic tool and also for network security analysis to keep track of malware Troubleshoot all the network anomalies with help of Wireshark Resolve latencies and bottleneck issues in the network In Detail Wireshark is a popular and powerful tool used to analyze the amount of bits and bytes that are flowing through a network. Wireshark deals with the second to seventh layer of network protocols, and the analysis made is presented in a human readable form. Mastering Wireshark will help you raise your knowledge to an expert level. At the start of the book, you will be taught how to install Wireshark, and will be introduced to its interface so you understand all its functionalities. Moving forward, you will discover different ways to create and use capture and display filters. Halfway through the book, you’ll be mastering the features of Wireshark, analyzing different layers of the network protocol, looking for any anomalies. As you reach to the end of the book, you will be taught how to use Wireshark for network security analysis and configure it for troubleshooting purposes. Style and approach Every chapter in this book is explained to you in an easy way accompanied by real-life examples and screenshots of the interface, making it easy for you to become an expert at using Wireshark.
飯桌上
飯桌上
簡簡
¥16.77
  書中講述幼兒日常生活中的小故事,貼近孩子生活,透過生動形象的小故事,教導孩子適當的行為處事方法,從小建立良好品格。   書後設置「互動小遊戲」、「成長小貼士」小欄目,加強孩子對書中故事相關禮貌常識的認識,同時也給父母一些實用的指導,幫助孩子培養良好的品格。   書後還設有「齊來評評分」,列舉故事中可以的禮儀小常識,讓家長和孩子參考對照,增進親子間的互動。   《飯桌上》小明跟媽媽一起到同學美美家做客,美美的媽媽燒了好吃的小菜招待他們。吃飯時,小明知道了要細嚼慢嚥,還不能發出聲音。看到了喜歡的雞腿,小明會怎麼做呢?
Boost.Asio C++ Network Programming Cookbook
Boost.Asio C++ Network Programming Cookbook
Dmytro Radchuk
¥90.46
Over 25 hands-on recipes to create robust and highly-efficient cross-platform distributed applications with the Boost.Asio libraryAbout This BookBuild highly efficient distributed applications with easeEnhance your cross-platform network programming skills with one of the most reputable C++ librariesFind solutions to real-world problems related to network programming with ready-to-use recipes using this detailed and practical handbookWho This Book Is ForIf you want to enhance your C++ network programming skills using the Boost.Asio library and understand the theory behind development of distributed applications, this book is just what you need. The prerequisite for this book is experience with general C++11. To get the most from the book and comprehend advanced topics, you will need some background experience in multithreading.What You Will LearnBoost your working knowledge of one of the most reputable C++ networking libraries—Boost.AsioFamiliarize yourself with the basics of TCP and UDP protocolsCreate scalable and highly-efficient client and server applicationsUnderstand the theory behind development of distributed applicationsIncrease the security of your distributed applications by adding SSL supportImplement a HTTP client easilyUse iostreams, scatter-gather buffers, and timersIn DetailStarting with recipes demonstrating the execution of basic Boost.Asio operations, the book goes on to provide ready-to-use implementations of client and server applications from simple synchronous ones to powerful multithreaded scalable solutions. Finally, you are presented with advanced topics such as implementing a chat application, implementing an HTTP client, and adding SSL support. All the samples presented in the book are ready to be used in real projects just out of the box.As well as excellent practical examples, the book also includes extended supportive theoretical material on distributed application design and construction.Style and approachThis book is a set of recipes, each containing the statement and de*ion of a particular practical problem followed by code sample providing the solution to the problem and detailed step-by-step explanation. Recipes are grouped by topic into chapters and ordered by the level of complexity from basic to advanced.
Splunk Developer's Guide - Second Edition
Splunk Developer's Guide - Second Edition
Kyle Smith
¥80.65
Learn the A to Z of building excellent Splunk applications with the latest techniques using this comprehensive guideAbout This BookThis is the most up-to-date book on Splunk 6.3 for developersGet ahead of being just a Splunk user and start creating custom Splunk applications as per your needsYour one-stop-solution to Splunk application developmentWho This Book Is ForThis book is for those who have some familiarity with Splunk and now want to learn how to develop an efficient Splunk application. Previous experience with Splunk, writing searches, and designing basic dashboards is expected.What You Will LearnImplement a Modular Input and a custom D3 data visualizationCreate a directory structure and set view permissionsCreate a search view and a dashboard view using advanced XML modulesEnhance your application using eventtypes, tags, and macrosPackage a Splunk application using best practicesPublish a Splunk application to the Splunk communityIn DetailSplunk provides a platform that allows you to search data stored on a machine, analyze it, and visualize the analyzed data to make informed decisions. The adoption of Splunk in enterprises is huge, and it has a wide range of customers right from Adobe to Dominos. Using the Splunk platform as a user is one thing, but customizing this platform and creating applications specific to your needs takes more than basic knowledge of the platform.This book will dive into developing Splunk applications that cater to your needs of making sense of data and will let you visualize this data with the help of stunning dashboards.This book includes everything on developing a full-fledged Splunk application right from designing to implementing to publishing. We will design the fundamentals to build a Splunk application and then move on to creating one. During the course of the book, we will cover application data, objects, permissions, and more. After this, we will show you how to enhance the application, including branding, workflows, and enriched data. Views, dashboards, and web frameworks are also covered.This book will showcase everything new in the latest version of Splunk including the latest data models, alert actions, XML forms, various dashboard enhancements, and visualization options (with D3). Finally, we take a look at the latest Splunk cloud applications, advanced integrations, and development as per the latest release.Style and approachThis book is an easy-to-follow guide with lots of tips and tricks to help you master all the concepts necessary to develop and deploy your Splunk applications.
Programming the BeagleBone
Programming the BeagleBone
Yogesh Chavan
¥54.49
Master BeagleBone programming by doing simple electronics and Internet of Things projectsAbout This BookQuickly develop electronics projects that interact with Internet applications using JavaScript and PythonLearn about electronics components such as sensors and motors, and how to communicate with them by writing programsA step-by-step guide to explore the exciting world of BeagleBone—from connecting BeagleBone to doing electronics projects and creating IoT applicationsWho This Book Is ForIf you want to learn programming on embedded systems with BeagleBone by doing simple electronics projects, this book is for you. This book is also helpful to BeagleBone owners who want to quickly implement small-scale home automation solutions. It is assumed that you have familiarity with C and Python programming. Some familiarity with electronics is helpful but not essential.What You Will LearnConnect your BeagleBone to a computer in different ways and get the Cloud9 IDE running to quick-start programming on the BeagleBoneGet to know about BeagleBone extension pins such as GPIO and how to connect various electronics components with BeagleBoneRead and write to various electronics components such as LED, Push-button, sensors, and motorsGrasp in-depth theory on Analog, PWM, and BUS programming and the electronics components used in programsHandle data to and from various BUS supporting modules such as UART, I2C, and SPI using the Adafruit BBIO Python libraryWrite real-life IoT applications in JavaScript and Python such as shooting an e-mail on overheat and controlling a servo motor remotelyMake use of online free cloud services to store and analyze sensor data collected on the BeagleBoneDiscover what else can be done using the BeagleBoneGet to grips with embedded system BUS communicationIn DetailThe whole world is moving from desktop computers to smartphones and embedded systems. We are moving towards utilizing Internet of Things (IoT). An exponential rise in the demand for embedded systems and programming in the last few years is driving programmers to use embedded development boards such as Beaglebone.BeagleBone is an ultra-small, cost-effective computer that comes with a powerful hardware. It runs a full-fledged Debian Linux OS and provides numerous electronics solutions. BeagleBone is open source and comes with an Ethernet port, which allows you to deploy IoT projects without any additions to the board. It provides plenty of GPIO, Anlaog pins, and UART, I2C, SPI pins which makes it the right choice to perform electronics projects. This gives you all the benefits of Linux kernel such as multitasking, multiusers, and extensive device driver support. This allows you to do programming in many languages including high-level languages such as JavaScript and Python.This book aims to exploit the hardware and software capabilities of BeagleBone to create real-life electronics and IoT applications quickly. It is divided into two parts. The first part covers JavaScript programs. The second part provides electronics projects and IoT applications in Python.First, you will learn to use BeagleBone as tool to write useful applications on embedded systems. Starting with the basics needed to set up BeagleBone and the Cloud9 IDE, this book covers interfacing with various electronics components via simple programs. The electronics theory related to these components is then explained in depth before you use them in a program. Finally, the book helps you create some real-life IoT applications.Style and approachAn easy-to-follow guide full of real-world electronics programs and quick troubleshooting tips using BeagleBone. All the required electronics concepts are explained in detail before using them in a program and all programs are explained in depth. Most of the theory is covered in the first part; while the second part gives you some quick programs.
CentOS 7 Linux Server Cookbook - Second Edition
CentOS 7 Linux Server Cookbook - Second Edition
Oliver Pelz
¥90.46
Over 80 recipes to get up and running with CentOS 7 Linux serverAbout This BookA practical guide to install, configure, administer and maintain CentOS 7 serversAn in-depth guide to the CentOS 7 operating system, exploring its various new features and changes in server administrationPresents tricks and solutions to tackle common server issues with the help of practical examples and real-life scenariosWho This Book Is ForThis book is targeted at beginner and more experienced system administrators alike who want to use CentOS as their server solution. Readers do not need much pre-knowledge or experience at all to work with this book.What You Will LearnInstall and configure CentOS 7 Linux server system from scratch using normal and advanced methodsMaintain a performance-based and secure server solution by deploying expert configuration advice and managing software packagesMonitor, manage and develop your server's file system to maintain a stable performanceGain best practice methods on sharing files and resources through a networkInstall and configure common standard services such as web, mail, FTP, database and domain name server technologiesIntroduce you to the world of operating-system-level virtualization using the Docker platform.Understand the fundamentals of the Security-Enhanced Linux access control architectureMonitor your IT infrastructure using NagiosIn DetailThis book will provide you with a comprehensive series of starting points that will give you direct access to the inner workings of the latest CentOS version 7 and help you trim the learning curve to master your server.You will begin with the installation and basic configuration of CentOS 7, followed by learning how to manage your system, services and software packages. You will then gain an understanding of how to administer the file system, secure access to your server and configure various resource sharing services such as file, printer and DHCP servers across your network. Further on, we cover advanced topics such as FTP services, building your own DNS server, running database servers, and providing mail and web services. Finally, you will get a deep understanding of SELinux and you will learn how to work with Docker operating-system virtualization and how to monitor your IT infrastructure with Nagios.By the end of this book, you will have a fair understanding of all the aspects of configuring, implementing and administering CentOS 7 Linux server and how to put it in control.Style and approachThis book is a practical reference guide with hands-on examples and solutions to real-world administration problems. It covers in-depth and comprehensive information on CentOS 7 and its new features.
AWS Administration – The Definitive Guide
AWS Administration – The Definitive Guide
Yohan Wadia
¥80.65
Learn to design, build, and manage your infrastructure on the most popular of all the Cloud platforms—Amazon Web ServicesAbout This BookLearn how to leverage various Amazon Web Services (AWS) components and services to build a secure, reliable, and robust environment to host your applications onDeep dive into the core AWS service offerings with hands-on tutorials, real-world use case scenarios, and best practicesA self-paced, systematic, and step-by-step guide to learning and implementing AWS in your own environmentWho This Book Is ForThis book is for those who want to learn and leverage AWS. Although no prior experience with AWS is required, it is recommended that you have some hands-on experienceofLinux, Web Services, and basic networkingWhat You Will LearnA brief introduction to Cloud Computing and AWS accompanied by steps to sign up for your first AWS accountCreate and manage users, groups, and permissions using AWSS Identity and Access Management servicesGet started with deploying and accessing EC2 instances, working with EBS Volumes and SnapshotsCustomize and create your very own Amazon Machine ImageDesign and deploy your instances on a highly secured, network isolated environment using Amazon VPCEffectively monitor your AWS environment using specialized alarms, custom monitoring metrics, and much moreExplore the various benefits of Database-as-a-Service offerings and leverage them using Amazon RDS and Amazon DynamoDBTake an in-depth look at what’s new with AWS, including EC2 Container Service and Elastic File SystemIn DetailAWS is at the forefront of Cloud Computing today. Many businesses are moving away from traditional datacenters and toward AWS because of its reliability, vast service offerings, lower costs, and high rate of innovation. Because of its versatility and flexible design, AWS can be used to accomplish a variety of simple and complicated tasks such as hosting multitier websites, running large scale parallel processing, content delivery, petabyte storage and archival, and lots more.Whether you are a seasoned sysadmin or a rookie, this book will provide you with all the necessary skills to design, deploy, and manage your applications on the AWS cloud platform. The book guides you through the core AWS services such as IAM, EC2, VPC, RDS, and S3 using a simple real world application hosting example that you can relate to. Each chapter is designed to provide you with the most information possible about a particular AWS service coupled with easy to follow hands-on steps, best practices, tips, and recommendations.By the end of the book, you will be able to create a highly secure, fault tolerant, and scalable environment for your applications to run on.Style and approach This in-depth and insightful guide is filled with easy-to-follow examples, real-world use cases, best practices, and recommendations that will help you design and leverage AWS.
Getting Started with ResearchKit
Getting Started with ResearchKit
Edward Cessna
¥80.65
Enter the era of medical research using mobile devices with the help of this guide on ResearchKit!About This BookCreate a simple clinical research app using most aspects of ResearchKitBuild a simple survey with various data types with the results printed on the screen.A step-by-step guide introducing Apple's ResearchKit and techniques to incorporate it into various apps.Who This Book Is ForThis book is aimed at medical researchers with basic iOS coding knowledge and iOS developers looking to create clinical research apps.What You Will LearnLearn to create customized consent formGet introduced to two backend services: a simple backend server using Sinatra and Sage BridgeBuild a custom task (a conditional survey example) and a navigable taskGet an Overview of ResearchKit's open source repository and App CoreInteraction with the hardware of the device including the gyro and the motion sensorsLearn the basics of this revolutionary technologyGet introduced to the barebones app and learn to write your first codeIn DetailResearchKit is an open source software development framework from Apple that lets you easily create mobile applications for clinical research studies. ResearchKit provides you the ability to orchestrate the administration of tasks and recording of the results. ResearchKit provides tasks in order to perform informed consent, active tasks, and surveys.Starting with the basics of the ResearchKit framework, this books walks you through the steps of creating iOS applications that could serve as the basis of a clinical research mobile app.This book will introduce readers to ResearchKit and how to turn your iPhone into into a clinical research tool. The book will start off by installing and building the research framework in line with the researcher's needs; during this, the reader will learn to embed ResearchKit in the application and create a small task.After this, the book will go a little deeper into creating modules for surveys, consents, and so on. The book will also cover the various aspects of privacy and security with regard to participant data, and how to build dashboards for visualizing medical data and results in line with the researcher's requirements: data backends, JSON serialization and deserialization, and so on.Readers will be able to fully utilize ResearchKit for medical research, will be able to get more and more patients to participate in their surveys, and will gain insights from the surveys using the dashboards created.Style and approachA hands-on guide with ample screenshots for you to follow and learn about ResearchKit. Each topic is explained sequentially and placed in context so that you can get a better understanding of every step in the process of creating clinical research apps.
Nagios Core Administration Cookbook - Second Edition
Nagios Core Administration Cookbook - Second Edition
Tom Ryder
¥90.46
Over 90 hands-on recipes that will employ Nagios Core as the anchor of monitoring on your networkAbout This BookMaster the advanced configuration techniques of Nagios Core to model your network better by improving hosts, services, and contactsFilter and improve the notifications that Nagios Core sends in response to failed checks, which can greatly assist you when diagnosing problemsPull Nagios Core's data into a database to write clever custom reports of your own deviseWho This Book Is ForIf you are a network or system administrator and are looking for instructions and examples on working with Nagios Core, then this book is for you. Some basic shell command-line experience is required, and some knowledge of *ing would be helpful when we discuss how plugins work.What You Will LearnManage the configuration of Nagios Core with advanced techniques to achieve fine detail in your checksFind, install, and even write your own check pluginsFilter notifications to send them to the right people or programs at the right timeWork around difficult network accessibility issues and delegate checks to other machinesTweak a Nagios Core server to achieve both high performance and redundancy in case of disasterProcess the results of checks performed by other machines to monitor backups and similar processesExtend Nagios Core to allow advanced *ing, reporting, and network visualization behaviorIn DetailNagios Core is an open source monitoring framework suitable for any network that ensures both internal and customer-facing services are running correctly and manages notification and reporting behavior to diagnose and fix outages promptly. It allows very fine configuration of exactly when, where, what, and how to check network services to meet both the uptime goals of your network and systems team and the needs of your users.This book shows system and network administrators how to use Nagios Core to its fullest as a monitoring framework for checks on any kind of network services, from the smallest home network to much larger production multi-site services. You will discover that Nagios Core is capable of doing much more than pinging a host or to see whether websites respond.The recipes in this book will demonstrate how to leverage Nagios Core's advanced configuration, *ing hooks, reports, data retrieval, and extensibility to integrate it with your existing systems, and to make it the rock-solid center of your network monitoring world.Style and approachEach chapter contains a set of step-by-step recipes to perform an example of a commonly performed task related to network administration. The book begins by focusing closely on the properties and configuration of Nagios Core itself, and gradually moves on to other pieces of software that can support, manage, and extend the system.
Kali Linux Web Penetration Testing Cookbook
Kali Linux Web Penetration Testing Cookbook
Gilberto Nájera-Gutiérrez
¥90.46
Over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2About This BookFamiliarize yourself with the most common web vulnerabilities a web application faces, and understand how attackers take advantage of themSet up a penetration testing lab to conduct a preliminary assessment of attack surfaces and run exploitsLearn how to prevent vulnerabilities in web applications before an attacker can make the most of itWho This Book Is ForThis book is for IT professionals, web developers, security enthusiasts, and security professionals who want an accessible reference on how to find, exploit, and prevent security vulnerabilities in web applications. You should know the basics of operating a Linux environment and have some exposure to security technologies and tools.What You Will LearnSet up a penetration testing laboratory in a secure wayFind out what information is useful to gather when performing penetration tests and where to look for itUse crawlers and spiders to investigate an entire website in minutesDiscover security vulnerabilities in web applications in the web browser and using command-line toolsImprove your testing efficiency with the use of automated vulnerability scannersExploit vulnerabilities that require a complex setup, run custom-made exploits, and prepare for extraordinary scenariosSet up Man in the Middle attacks and use them to identify and exploit security flaws within the communication between users and the web serverCreate a malicious site that will find and exploit vulnerabilities in the user's web browserRepair the most common web vulnerabilities and understand how to prevent them becoming a threat to a site's securityIn DetailWeb applications are a huge point of attack for malicious hackers and a critical area for security professionals and penetration testers to lock down and secure. Kali Linux is a Linux-based penetration testing platform and operating system that provides a huge array of testing tools, many of which can be used specifically to execute web penetration testing.This book will teach you, in the form step-by-step recipes, how to detect a wide array of vulnerabilities, exploit them to analyze their consequences, and ultimately buffer attackable surfaces so applications are more secure, for you and your users.Starting from the setup of a testing laboratory, this book will give you the skills you need to cover every stage of a penetration test: from gathering information about the system and the application to identifying vulnerabilities through manual testing and the use of vulnerability scanners to both basic and advanced exploitation techniques that may lead to a full system compromise. Finally, we will put this into the context of OWASP and the top 10 web application vulnerabilities you are most likely to encounter, equipping you with the ability to combat them effectively. By the end of the book, you will have the required skills to identify, exploit, and prevent web application vulnerabilities.Style and approachTaking a recipe-based approach to web security, this book has been designed to cover each stage of a penetration test, with de*ions on how tools work and why certain programming or configuration practices can become security vulnerabilities that may put a whole system, or network, at risk. Each topic is presented as a sequence of tasks and contains a proper explanation of why each task is performed and what it accomplishes.
Cisco UCS Cookbook
Cisco UCS Cookbook
Victor Wu
¥90.46
Over 40 practical recipes to get your hands dirty with the powerful Cisco UCS and overcome various challenges About This Book Master the skills of minimizing cost, enabling your business to work faster by reducing cycle times for reporting and improving overall revenue Work through hands-on recipes for efficient deployment approaches, see computing techniques, and explore new operational models with UCS Render a better work-flow management, ensure effective monitoring, and learn new deployment paradigms for the operational infrastructure with the help of this book Who This Book Is For This book is for competent system/network or storage administrators who are working with Cisco UCS, but now want to learn new ways to compute UCS. What You Will Learn Familiarize yourself with information on the latest information on memory management practices, virtualization architectures, and the specific technical advantages of UCS Get a concrete understanding of integrating processes and techniques to ensure effective convergence of LAN/SAN Get to know the best practices of Cisco UCS, EMC Storage, and VMware vSphere Master migrating data from other band servers or Blade to Cisco UCS Comprehend how to replicate and back up UCS to remote sites UCS Assimilate innovative techniques to deploy UCS to leverage its full potential Gather information on installing and configuring automatic and manual Pinning Discover ways to integrate a system in Cisco UCS In Detail Cisco Unified Computing System (UCS) is a data center server platform that is used for computing, deploying, and storing resources in data center environments. This cookbook aims to teach you about various tasks you can implement to improve your existing method of configuring and deploying UCS. You will start by learning how to upgrade your firmware on Brocade and Cisco Fibre Channel Switch and will move on to enhance your knowledge of LAN connectivity. We will then discuss how to configure Windows 2008 and 2012 local boot in Cisco UCS. Next, you will learn how to install the operating system on Cisco UCS and use Cisco UCS Power Calculator to calculate the UCS consumption. Finally, we’ll take a look at backup solutions. By the end of the book, you will know several ways to build and compute in data center environment using Cisco UCS. Style and approach This guide explains every task in a conversational and easy-to-follow style. You can open this book up to the task you want to learn and will be able to perform that task by the end of the recipe.
Mapbox Cookbook
Mapbox Cookbook
Bill Kastanakis
¥71.93
Over 35 recipes to design and implement uniquely styled maps using the Mapbox platform About This Book Design and develop beautifully styled maps using TileMill, MapBox Studio, and CartoCSS Get to grips with the mapbox.js and Leaflet to create visually stunning web and mobile applications An easy-to-follow, quick reference guide to integrate powerful APIs and services like Foursquare, Fusion Tables, Geoserver, and CartoDB to populate your maps Who This Book Is For If you are a web developer seeking for GIS expertise on how to create, style, and publish interactive and unique styled maps, then this book is for you. Basic knowledge of programming and java*s is assumed. What You Will Learn Get accustomed to the MapBox Editor to visually style your maps Learn everything about CartoCSS, and how it will help you fine tune your styled maps Use MapBox Studio and Tilemill to generate your own tiles and vector maps Publish your maps using a variety of technologies like node.js, PHP, and Geoserver Integrate with third party APIs and services to populate your maps with public or private data Create many different map visualization styles like choropleth and heat maps, add interactivity, and even learn how to animate data over time Work with many different data formats and external services to create robust maps Learn to use MapBox GL to create a mobile application In Detail Maps are an essential element in today’s location aware applications. Right from displaying earth surface information to creating thematic maps displaying plethora of information, most of the developers lack the necessary knowledge to create customizable maps with combination of various tools and libraries. The MapBox platform is one such platform which offers all the tools and API required to create and publish a totally customizable map. Starting with building your first map with the online MapBox Editor, we will take you all the way to building advanced web and mobile applications with totally customizable map styles. Through the course of chapters we’ll learn CartoCSS styling language and understand the various components of MapBox platform and their corresponding JavaScript API. In the initial few chapters we will dive deeper into the TileMill and MapBox Studio components of MapBox and use them to generate custom styled map tiles and vector maps. Furthermore, we will publish these custom maps using PHP, node.js and third party tools like Geoserver. We’ll also learn to create different visualizations and map styles like a choropleth map, a heat map and add user interactivity using a UFTGrid. Moving on, we dive into advanced concepts and focus on integration with third party services like Foursquare, Google FusionTables, CartoDB, and Torque to help you populate and even animate your maps. In the final chapter we’ll learn to use the Mapbox SDK to create and publish interactive maps for the iOS platform. By the end of this book, you will learn about MapBox GL and how to create a fully functional, location-aware mobile app, using the maps styles created in the recipes. Style and approach An easy-to-use recipe driven book that will not just serve code samples, but also explains all the theory and concepts required to fully understand each recipe.