Old Yeller
¥39.13
At first, Travis couldn't stand the sight of Old Yeller The stray dog was ugly, and a thieving rascal, too. But he sure was clever, and a smart dog could be a big help on the wild Texas frontier, especially with Papa away on a long cattle drive up to Abilene. Strong and courageous, Old Yeller proved that he could protect Travis's family from any sort of danger. But can Travis do the same for Old Yeller?
One Crazy Summer
¥44.73
In this Newbery Honor novel, New York Times bestselling author Rita Williams-Garcia tells the story of three sisters who travel to Oakland, California, in 1968 to meet the mother who abandoned them. Eleven-year-old Delphine is like a mother to her two younger sisters, Vonetta and Fern. She had to be, ever since their mother, Cecile, left them seven years ago for a radical new life in California. When they arrive from Brooklyn to spend the summer with her, Cecile is nothing like they imagined. While the girls hope to go to Disneyland and meet Tinker Bell, their mother sends them to a day camp run by the Black Panthers. Unexpectedly, Delphine, Vonetta, and Fern learn much about their family, their country, and themselves during one truly crazy summer. This moving, funny novel won the Scott O'Dell Award for Historical Fiction and the Coretta Scott King Award and was a National Book Award Finalist. Readers who enjoy Christopher Paul Curtis The Watsons Go to Birmingham will find much to love in One Crazy Summer . Delphine, Vonetta, and Fern story continues in P.S. Be Eleven . Supports the Common Core State Standards
Nginx HTTP Server - Third Edition
¥80.65
Harness the power of Nginx to make the most of your infrastructure and serve pages faster than ever About This Book ?Discover possible interactions between Nginx and Apache to get the best of both worlds ?Learn to exploit the features offered by NGinx for your web applications ?Get the newest techniques available, designed with the latest version in mind Who This Book Is For By covering both the early setup stages and advanced topics, this book suits web administrators who interested in solutions to optimize their infrastructure, whether you are looking into replacing your existing web server software or integrating a new tool to cooperate with applications that are already up and running. If you, your visitors, and your operating system have been disappointed by Apache, this book is exactly what you need. What You Will Learn ?Get to know the basics of the Nginx configuration: syntax, structure, and semantics ?Understand the advanced load balancing functionality of Nginx and the newest innovative IO mechanisms ?Create virtual host configurations effortlessly ?Discover all the first-party modules: how to enable, configure, and use them ?Establish advanced rewrite rules with the Nginx Rewrite module ?Set up Nginx to work with PHP, Python, and more via FastCGI ?Configure Nginx to work as frontend for your existing HTTP server ?Manipulate configuration files with ease and adapt them to various situations ?Discover the common pitfalls and find out how to avoid them In Detail Nginx is a lightweight HTTP server designed for high-traffic websites, with network scalability as the primary objective. With the advent of high speed Internet access, short loading times and fast transfer rates have become a necessity. This free, open source solution will either come as a full replacement of other software such as Apache, or stand in front of your existing infrastructure to improve its overall speed. This book is a detailed guide to setting up Nginx in different ways that correspond to actual production situations: as a standalone server, as a reverse proxy, interacting with applications via FastCGI, and more. In addition, this complete directive reference will be your best friend at all stages of the configuration and maintenance processes. This book is the perfect companion for both Nginx beginners and experienced administrators. For beginners, it will take you through the complete process of setting up this lightweight HTTP server on your system and configuring its various modules so it does exactly what you need quickly and securely. For more experienced administrators, this book provides different approaches that can help you make the most of your current infrastructure. Nginx can be employed in many situations, whether you are looking to construct an entirely new web-serving architecture or simply want to integrate an efficient tool to optimize your site loading speeds. Style and approach This tutorial-style book includes detailed instructions on each of the processes it describes, as well as step-by-step tutorials, commented configuration sections, and in-depth module de*ions, so you can make the most of the performance potential offered by Nginx.
Python for Secret Agents - Volume II
¥45.77
Gather, analyze, and decode data to reveal hidden facts using Python, the perfect tool for all aspiring secret agents About This Book Discover the essential features of Python programming: statements, variables, expressions, and many of the built-in data types Use Python’s standard library to do more sophisticated data gathering and analysis Written by a Python programming expert, with over 35 years' experience as a consultant, teacher, author and software developer Who This Book Is For This book is for Secret Agents who have some exposure to Python. Our focus is on the Field Agents who are ready to do more sophisticated and complex programming in Python. We'll stick to simple statistics for the most part. A steady hand with a soldering iron is not required, but a skilled field agent should be able to assemble a working Arduino circuit to gather their own sensor data.What You Will Learn Upgrade Python to the latest version and discover its latest and greatest tools Use Python libraries to extract data from log files that are designed more for people to read than for automated analysis Summarize log files and extract meaningful information Gather data from social networking sites and leverage your experience of analyzing log files to summarize the data you find Extract text and images from social networking sites Parse the complex and confusing data structures in a PDF file to extract meaningful text that we can analyze Connect small, intelligent devices to our computer to use them as remote sensors Use Python to analyze measurements from sensors to calibrate them and use sensors efficiently In Detail Python is easy to learn and extensible programming language that allows any manner of secret agent to work with a variety of data. Agents from beginners to seasoned veterans will benefit from Python's simplicity and sophistication. The standard library provides numerous packages that move beyond simple beginner missions. The Python ecosystem of related packages and libraries supports deep information processing. This book will guide you through the process of upgrading your Python-based toolset for intelligence gathering, analysis, and communication. You'll explore the ways Python is used to analyze web logs to discover the trails of activities that can be found in web and database servers. We'll also look at how we can use Python to discover details of the social network by looking at the data available from social networking websites. Finally, you'll see how to extract history from PDF files, which opens up new sources of data, and you’ll learn about the ways you can gather data using an Arduino-based sensor device. Style and approach Each chapter will include a background briefing that covers an essential Python technology. After some in-depth exploration of the features, the chapter will conclude with a mission that is a concrete application of the Python tools and techniques covered.
Mastering XenApp?
¥99.18
Master the skills required to implement CitrixXenApp7.6 to deploy a complete Citrix?-hosted application from scratch About This Book Learn to implement and configure components of CitrixXenApp7.6, which are XenServer?, XenApp?, CitrixLicense server, PVS, Storefront, CitrixReceiver, and Netscaler to secure WAN traffic Build the XenApp7.6 environment independently and perform tests to make sure the components are working as expected for internal and external traffic Implement advanced tools in CitrixXenAppto build and manage a cost effective, secure, and high-performing application delivery infrastructure with this comprehensive guide Who This Book Is For This is book is for administrators who are currently managing the implemented environment and want to learn how to deploy the CitrixHosted virtualization solution for the application in a windows server 2012 R2 environment. A reasonable knowledge and understanding of core XenAppelements and concepts used during virtualizing applications are assumed. What You Will Learn Understand how to set up Hypervisor, install the management console, configure the storage repository, and create a virtual machine on hypervisor Set up an Infrastructure component and explore ways to tune them up so that they can be used for Citrixenvironment Set up a Domain controller, DHCP, Certificate authority, and SQL server for static database for CitrixXenAppValidate the CitrixXenApp7.6 solution to make sure components are communicating properly Manage the essential Citrixcomponents – Director, Licensing, and Policies with the Help of Citrixstudio Optimize the behavior of an Application and share desktop via Policies Installing and configuring CitrixProvisioning services to deliver CitrixXenApp7.6 virtual machines Secure the external Delivery of an application and shared desktop via netscaler to enjoy mobility In Detail CitrixXenAppis one of the leading pieces of Application delivery software that delivers Windows compatible apps to users on any device, anywhere. CitrixXenAppalso gives administrators the ability to manage and control the freedom of mobility by increasing the security and saving costs at the same time. This book will provide you with all the knowledge required to successfully deploy and master a complete Citrixhosted application. First, it will cover essential concepts of the architecture of XenApp?. You will then learn how to set up Hypervisor and how to set up Infrastructure components. Next you will learn how to Set up CitrixComponents, XenAppresources, PVS, and Netscaler. We will further look at how to prepare the environment for Rollout. Additionally, you will learn how to configure the Citrixcomponents such as CitrixDirector. Moreover, you’ll learn about shared desktop for delivery to end users and the application of policies for effective and secure delivery. Finally, you will learn how to implement provisioning services for a CitrixXenApp7.6 environment. Style and approach This book is based on a course outline and hence takes a very practical approach so you will understand how to implement the components of XenAppin a production environment. Complemented with many best practices and troubleshooting concepts of XenApp?, this book will help you master XenAppswiftly.
Monitoring Docker
¥71.93
Monitor your Docker containers and their apps using various native and third-party tools with the help of this exclusive guide!About This Book Get the only book that covers multiple methods to monitoring Docker Containers -your one-stop solution to all your Docker monitoring needs Learn how to implement third-party tools such as Datalog, cAdvisor, and more with this example-rich, hands-on guide Learn how to efficiently monitor Docker containers and get an edge over other administrators while maintaining apps on these containers Who This Book Is For This book is for DevOps engineers and system administrators who manage Docker containers and want to better manage these containers using expert techniques and methods and better maintain applications built on Docker. What You Will Learn Discover the tools built into Docker to gain an insight into your containers’ performance Augment Docker’s built-in tools with modern tools such as cAdvisor from Google, SysDig by Draios, and Soundcloud’s Prometheus Integrate the monitoring of your containers with more traditional monitoring solutions such as Zabbix Take advantage of the various SaaS offerings from third parties to move monitoring away from your local infrastructure and into the cloud Discover the various ways to ship your applications’ logs from the container to a central logging service Get the most out of your application and resources with the right implementation of your monitoring method In Detail This book will show you how monitoring containers and keeping a keen eye on the working of applications helps improve the overall performance of the applications that run on Docker. With the increased adoption of Docker containers, the need to monitor which containers are running, what resources they are consuming, and how these factors affect the overall performance of the system has become the need of the moment. This book covers monitoring containers using Docker's native monitoring functions, various plugins, as well as third-party tools that help in monitoring. Well start with how to obtain detailed stats for active containers, resources consumed, and container behavior. We also show you how to use these stats to improve the overall performance of the system. Next, you will learn how to use SysDig to both view your containers performance metrics in real time and record sessions to query later. By the end of this book, you will have a complete knowledge of how to implement monitoring for your containerized applications and make the most of the metrics you are collecting Style and approach This is an easy-to-follow guide with plenty of hands-on examples that can be executed both on your local machine and externally hosted services.
Learning PowerShell DSC
¥90.46
Get started with the fundamentals of PowerShell DSC and utilize its power to automate deployment and configuration of your serversAbout This BookCreate flexible and maintainable deployments using DSC configuration *s that stand the test of timeExplore the in depth details of the core architecture, concepts, and practices used by PowerShell DSCA step-by-step guide that shows you how to start using and taking advantage of PowerShell DSC Who This Book Is For This book is intended for system administrators, developers, or engineers who are responsible for configuration management and automation and wish to learn PowerShell Desired State Configuration for efficient management, configuration and deployment of systems and applications.What You Will LearnUnderstand configuration management and why you need itCraft flexible, reusable, and maintainable configuration *s for thousands of serversCreate custom DSC resources to manage any application or server settingApply configuration data to deploy applications to different environmentsUtilize DSC push deployments to test your configuration *s and custom DSC resourcesInstall, configure and use DSC pull serversRun a Windows MSI packageDeploy a website In Detail Windows PowerShell is a task-based command-line shell and *ing language designed especially for system administration. PowerShell DSC is a new management platform that enables you to deploy and manage configuration data for software services and manage the environment in which these services run. This book begins with an overview of the basics of PowerShell DSC by covering the architecture and components of the Desired Sate Configuration. It will then familiarize you with the set of PowerShell language extensions and new PowerShell commands. It will help you understand and create DSC configurations with the help of practical examples, and to create DSC custom resources for your custom applications. Finally, you will learn to deploy a real world application using PowerShell DSC. By the end of the book, you will have better knowledge about the powerful Desired State Configuration platform, which helps you to achieve continuous delivery, and efficient management and easy deployment of data for systems.Style and approach This book is an in-depth guide to using PowerShell DSC, full of real-world experiences and best practices using PowerShell DSC. The topics are explained and build on one another other to provide a holistic learning experience. At the end, all the features learned will be used to create a real world application deployment using DSC.
Internet of Things with Arduino Blueprints
¥71.93
Develop interactive Arduino-based Internet projects with Ethernet and WiFiAbout This BookBuild Internet-based Arduino devices to make your home feel more secureLearn how to connect various sensors and actuators to the Arduino and access data from InternetA project-based guide filled with schematics and wiring diagrams to help you build projects incrementally Who This Book Is For This book is intended for those who want to learn more about Arduino and make Internet-based interactive projects with Arduino. If you are an experienced software developer who understands the basics of electronics, then you can quickly learn how to build the Arduino projects explained in this book.What You Will LearnMake a powerful Internet controlled relay with an embedded web server to monitor and control your home electrical appliancesBuild a portable Wi-Fi signal strength sensor to give haptic feedback about signal strength to the userMeasure water flow speed and volume with liquid flow sensors and record real-time readingsSecure your home with motion-activated Arduino security cameras and upload images to the cloudImplement real-time data logging of a solar panel voltage with Arduino cloud connectorsTrack locations with GPS and upload location data to the cloudControl a garage door light with your Twitter feedControl infrared enabled devices with IR remote and Arduino In Detail Arduino is a small single-chip computer board that can be used for a wide variety of creative hardware projects. The hardware consists of a simple microcontroller, board, and chipset. It comes with a Java-based IDE to allow creators to program the board. Arduino is the ideal open hardware platform for experimenting with the world of the Internet of Things. This credit card sized Arduino board can be used via the Internet to make more useful and interactive Internet of things projects. Internet of Things with Arduino Blueprints is a project-based book that begins with projects based on IoT and cloud computing concepts. This book covers up to eight projects that will allow devices to communicate with each other, access information over the Internet, store and retrieve data, and interact with users—creating smart, pervasive, and always-connected environments. It explains how wired and wireless Internet connections can be used with projects and the use of various sensors and actuators. The main aim of this book is to teach you how Arduino can be used for Internet-related projects so that users are able to control actuators, gather data from various kinds of sensors, and send and receive data wirelessly across HTTP and TCP protocols. Finally, you can use these projects as blueprints for many other IoT projects and put them to good use. By the end of the book, you will be an expert in the use of IoT with Arduino to develop a set of projects that can relate very well to IoT applications in the real world.Style and approach Every chapter in this book clearly explains how to assemble components through easy-to-follow steps on while laying out important concepts, code snippets, and expected output results so that you can easily end up with a successful project where you can also enhance or modify the project according to your requirements.
Mastering OAuth 2.0
¥80.65
Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework About This Book Learn how to use the OAuth 2.0 protocol to interact with the world's most popular service providers, such as Facebook, Google, Instagram, Slack, Box, and more Master the finer details of this complex protocol to maximize the potential of your application while maintaining the utmost of security Step through the construction of a real-world working application that logs you in with your Facebook account to create a compelling infographic about the most important person in the world—you! Who This Book Is Fo If you are an application developer, software architect, security engineer, or even a casual programmer looking to leverage the power of OAuth, Mastering OAuth 2.0 is for you. Covering basic topics such as registering your application and choosing an appropriate workflow, to advanced topics such as security considerations and extensions to the specification, this book has something for everyone. A basic knowledge of programming and OAuth is recommended. What You Will Learn Discover the power and prevalence of OAuth 2.0 and use it to improve your application's capabilities Step through the process of creating a real-world application that interacts with Facebook using OAuth 2.0 Examine the various workflows described by the specification, looking at what they are and when to use them Learn about the many security considerations involved with creating an application that interacts with other service providers Develop your debugging skills with dedicated pages for tooling and troubleshooting Build your own rich, powerful applications by leveraging world-class technologies from companies around the world In Detail OAuth 2.0 is a powerful authentication and authorization framework that has been adopted as a standard in the technical community. Proper use of this protocol will enable your application to interact with the world's most popular service providers, allowing you to leverage their world-class technologies in your own application. Want to log your user in to your application with their Facebook accountWant to display an interactive Google Map in your applicationHow about posting an update to your user's LinkedIn feedThis is all achievable through the power of OAuth. With a focus on practicality and security, this book takes a detailed and hands-on approach to explaining the protocol, highlighting important pieces of information along the way. At the beginning, you will learn what OAuth is, how it works at a high level, and the steps involved in creating an application. After obtaining an overview of OAuth, you will move on to the second part of the book where you will learn the need for and importance of registering your application and types of supported workflows. You will discover more about the access token, how you can use it with your application, and how to refresh it after expiration. By the end of the book, you will know how to make your application architecture robust. You will explore the security considerations and effective methods to debug your applications using appropriate tools. You will also have a look at special considerations to integrate with OAuth service providers via native mobile applications. In addition, you will also come across support resources for OAuth and credentials grant. Style and approach With a focus on practicality and security, Mastering OAuth 2.0 takes a top-down approach at exploring the protocol. Discussed first at a high level, examining the importance and overall structure of the protocol, the book then dives into each subject, adding more depth as we proceed. This all culminates in an example application that will be built, step by step, using the valuable and practical knowledge you have gained.
The Fall of Advertising and the Rise of PR
¥83.03
Bestselling authors and world-renowned marketing strategists Al and Laura Ries usher in the new era of public relations. Today's major brands are born with publicity, not advertising. A closer look at the history of the most successful modern brands shows this to be true. In fact, an astonishing number of brands, including Palm, Starbucks, the Body Shop, Wal-Mart, Red Bull and Zara have been built with virtually no advertising. Using in-depth case histories of successful PR campaigns coupled with those of unsuccessful advertising campaigns, The Fall of Advertising provides valuable ideas for marketers -- all the while demonstrating why advertising lacks credibility, the crucial ingredient in brand building, and how only PR can supply that credibility; the big bang approach advocated by advertising people should be abandoned in favor of a slow build-up by PR; advertising should only be used to maintain brands once they have been established through publicity. Bold and accessible, The Fall of Advertising is bound to turn the world of marketing upside down.
HarperCollins
¥44.25
As shadows of the past continue to haunt the forest, Brambleclaw is haunted by a dark figure on a dangerous quest for revenge, and must struggle to remain true to his Clan. A sinister path is unfolding and the time is coming for certain warriors to make the choices that will determine their destiny . . . and the destiny of all the Clans.
Wringer
¥50.33
Palmer LaRue is running out of birthdays. For as long as he can remember, he's dreaded the day he turns ten -- the day he'll take his place beside all the other ten-year-old boys in town, the day he'll be a wringer. But Palmer doesn't want to be a wringer. It's one of the first things he learned about himself and it's one of the biggest things he has to hide. In Palmer's town being a wringer is an honor, a tradition passed down from father to son. Palmer can't stop himself from being a wringer just like he can't stop himself from growing one year older, just like he can't stand up to a whole town -- rightNewbery Medal winner Jerry Spinelli's most powerful novel yet is a gripping tale of how one boy learns how not to be afraid.
Stardust 星尘
¥55.33
Young Tristran Thorn will do anything to win the cold heart of beautiful Victoria even fetch her the star they watch fall from the night sky. But to do so, he must enter the unexplored lands on the other side of the ancient wall that gives their tiny village its name. Beyond that old stone wall, Tristran learns, lies Faerie where nothing, not even a fallen star, is what he imagined. From #1 New York Times bestselling author Neil Gaiman comes a remarkable quest into the dark and miraculous in pursuit of love and the utterly impossible.
HarperCollins
¥44.73
In the first novel from Newbery Award-winning author Beverly Cleary, boys and girls alike will instantly be charmed by an average boy whose life is turned upside down when he meets a lovable puppy with a nose for mischief. Just as Henry Huggins is complaining that nothing exciting ever happens, a friendly dog sits down beside him and looks pleadingly at his ice-cream cone. From that moment on, the two are inseparable. But when Ribsy's original owner appears, trying to reclaim his dog, Henry's faced with the possibility of losing his new best friend. Has Klickitat Street seen the last of rambunctious Ribsy?
Ramona the Pest
¥44.73
Ramona Quimby is excited to start kindergarten. No longer does she have to watch her older sister, Beezus, ride the bus to school with all the big kids. She's finally old enough to do it too! Then she gets into trouble for pulling her classmate's boingy curls during recess. Even worse, her crush rejects her in front of everyone. Beezus says Ramona needs to quit being a pest, but how can she stop if she never was trying to be one in the first placeNewbery Medal winning author Beverly Cleary expertly depicts the trials and triumphs of growing up through a relatable heroine in Ramona Quimby. Supports the Common Core State Standards
My Weird School #12: Ms. Todd Is Odd!
¥27.94
Something weird is going on! Ms. Todd is subbing, and A.J. and his friends are sure she kidnapped Miss Daisy so she could take over her job. They’re going to have to do the detective work to get the goods on her. But it won’t be easy! Ms. Todd is the weirdest substitute teacher in the history of the world!
My Weird School #4: Ms. Hannah Is Bananas!
¥27.94
Ms. Hannah wears dresses made out of potholders and collects garbage instead of throwing it out. Plus she's making A.J. be partners with smelly Andrea. This is the worst art class ever!
My Weird School #7: Mrs. Cooney Is Loony!
¥27.94
Something weird is going on! Mrs. Cooney, the school nurse, is a knockout and A.J. has a crush on her! But are her charms just a cover for her secret identity as an international spyWill A.J.'s love for Mrs. Cooney win out over his love for the good old USA?
My Weird School #8: Ms. LaGrange Is Strange!
¥27.94
Something weird is going on! Ms. LaGrange talks funny, and she's from some other country called France! She thinks the vomitorium is a fancy restaurant! Plus she's writing secret messages in the mashed potatoes. Ms. LaGrange is the weirdest lunch lady in the history of the world!
My Weird School Daze #1: Mrs. Dole Is Out of Control!
¥28.01
A.J. and the gang are graduating! But the out-of-control PTA president is turning the whole thing into a huge ceremony complete with fireworks, a petting zoo, and a flyover by the Blue Angels! Is moving up to third grade such a big dealAnd what could possibly go wrong?
My Weird School Daze #2: Mr. Sunny Is Funny!
¥27.94
A.J.'s family rented a beach house for the summer, and you'll never guess in a million hundred years who rented the house next door. Well, you have to read the book to find out. So nah-nah-nah boo-boo on you!* *Okay, okay, it's Andrea and her family. And she has a monster crush on Mr. Sunny, the hunky (but weird) lifeguard. Ooooh! When are they gonna get married?

购物车
个人中心

