
SignalR Real-time Application Cookbook
¥90.46
This book contains illustrated code examples to help you create realtime, asynchronous, and bidirectional clientserver applications. Each recipe will concentrate on one specific aspect of application development with SignalR showing you how that aspect can be used proficiently. Different levels of developers will find this book useful. Beginners will be able to learn all the fundamental concepts of SignalR, quickly becoming productive in a difficult arena. Experienced programmers will find in this book a handy and useful collection of readymade solutions to common use cases, which they will be able to enhance as needed. Developers can also use the book as a quick reference to the most important SignalR features. No previous practical experience either with SignalR or with realtime communication in general is required.

Oracle ADF Faces Cookbook
¥90.46
This is a cookbook that covers more than 80 different recipes to teach you about different aspects of Oracle ADF Faces. It follows a practical approach and covers how to build your components for reuse in different applications. This book will also help you in tuning the performance of your ADF Faces application. If you are an ADF developer who wants to harness the power of Oracle ADF Faces to create exceptional user interfaces and reactive applications, this book will provide you with the recipes needed to do just that. You will not need to be familiar with Oracle ADF Faces, but you should be comfortable with Java application development, Java EE frameworks, and JSF. This book is also for ADF developers who know how to use Oracle ADF Faces but who want to know what’s new in Oracle ADF Faces 12c.

LibGDX Cross platform Development Cookbook
¥90.46
If you want to make cross-platform games without the hassle and dangers of writing platform-specific code, or If you are a game programmer who may have some experience with Java and you want to learn everything you need to know about Libgdx to produce awesome work, this is the book for you. To take full advantage of the recipes in this book, you are expected to be familiar with java with good game programming knowledge.

MariaDB Cookbook
¥90.46
A practical cookbook, filled with advanced recipes , and plenty of code and commands used for illustration,which will make your learning curve easy and quick. This book is for anyone who wants to learn more about databases in general or MariaDB in particular. Some familiarity with SQL databases is assumed, but the recipes are approachable to almost anyone with basic database skills.

Functional Python Programming
¥90.46
This book is for developers who want to use Python to write programs that lean heavily on functional programming design patterns. You should be comfortable with Python programming, but no knowledge of functional programming paradigms is needed.

Blender Cycles: Materials and Textures Cookbook - Third Edition
¥90.46
This book is aimed at those familiar with the basics of Blender, looking to delve into the depths of the Cycles rendering engine to create an array of breath-taking materials and textures.

Learning Android Application Testing
¥90.46
If you are an Android developer looking to test your applications or optimize your application development process, then this book is for you. No previous experience in application testing is required.

Lua Game Development Cookbook
¥90.46
This book is for all programmers and game enthusiasts who want to stop dreaming about creating a game, and actually create one from scratch. The reader should know the basics of programming and using the Lua language. Knowledge of the C/C++ programming language is not necessary, but it's strongly recommended in order to write custom Lua modules extending game engine capabilities or to rewrite parts of the Lua code into a more efficient form. Algebra and matrix operations are required in order to understand advanced topics in Chapter 4, Graphics – Legacy Method with OpenGL 1.x-2.1 and Chapter 5, Graphics – Modern Method with OpenGL 3.0+. Sample demonstrations are coupled with binary libraries for Windows and Linux operating systems for convenience.

Learning Ext JS - Fourth Edition
¥90.46
If you are a JavaScript developer who now wants to use the Ext JS framework, this is the book for you. This guide is useful to you whether you're new to Ext JS 5 or are a seasoned expert. Experience in HTML, CSS, and JavaScript is required in order to understand and get the most out of this book.

Python 3 Object-oriented Programming - Second Edition
¥90.46
If you're new to object-oriented programming techniques, or if you have basic Python skills and wish to learn in depth when to correctly apply object-oriented programming in Python to design software, this is the book for you.

Mastering SaltStack
¥90.46
This book is ideal for professionals who have been managing groups of servers, and want to learn how to expand their toolset. This book will also explain some of the more advanced features of Salt, and explore how to use them to bring additional power to the fundamentals that the professionals have already been using.

Clojure Data Structures and Algorithms Cookbook
¥90.46
This book is for intermediate Clojure developers who can read and write in this language quite comfortably. Besides, it is assumed that you have some knowledge of how to set up Clojure projects, include dependencies, how to run REPLs, and so on through Leiningen and Figwheel. No prior awareness of any of the algorithms covered in this book is needed, and, when appropriate, pointers are given to the explanation material about any theory related to them.

Python Parallel Programming Cookbook
¥90.46
This book is intended for software developers who want to use parallel programming techniques to write powerful and efficient code. After reading this book, you will be able to master the basics and the advanced features of parallel computing. The Python programming language is easy to use and allows nonexperts to deal with and easily understand the topics exposed in this book.

Amazon S3 Cookbook
¥90.46
This book is for cloud developers who have experience of using Amazon S3 and are also familiar with Amazon S3.

Mastering Citrix? XenDesktop?
¥90.46
This book is intended for IT administrators who want to use Citrixas a desktop virtualization solution or for IT architects who want to learn how to design and implement highly available and scalable XenDesktopenvironments. It is assumed that you have intermediate-level knowledge of virtualization concepts, Windows desktop operating systems, and Windows Server technologies. Citrix?, Citrix Systems?, XenApp?, XenDesktop?, and CloudPortalare trademarks of CitrixSystems?, Inc. and/or one or more of its subsidiaries, and may be registered in the United States Patent and Trademark Office and in other countries.

Administering ArcGIS for Server
¥90.46
This book is a practical, stepbystep tutorial providing a complete reference guide to the setup, installation, and administration of ArcGIS Server technology. If you are a GIS user, analyst, DBA, or programmer with a basic knowledge of ESRI GIS, then this book is for you.

Visual Media Processing Using Matlab Beginner's Guide
¥90.46
Written in a friendly, Beginner's Guide format, showing the user how to use the digital media aspects of Matlab (image, video, sound) in a practical, tutorial-based style.This is great for novice programmers in any language who would like to use Matlab as a tool for their image and video processing needs, and also comes in handy for photographers or video editors with even less programming experience wanting to find an all-in-one tool for their tasks.

Microsoft Azure Development Cookbook
¥90.46
If you are an architect, this book will help you make the correct decisions about which Azure building blocks to use. If you are a developer, this book will help you understand how to use them appropriately, and if you are a .NET developer, this book is a pure delight.

Mastering Metasploit
¥90.46
A comprehensive and detailed, step by step tutorial guide that takes you through important aspects of the Metasploit framework. If you are a penetration tester, security engineer, or someone who is looking to extend their penetration testing skills with Metasploit, then this book is ideal for you. The readers ofthis book must have a basic knowledge of using Metasploit. They are also expected to have knowledge of exploitation and an indepth understanding of object-oriented programming languages.

Implementing Samba 4
¥90.46
This book is an implementation tutorial covering stepbystep procedures, examples, and sample code, and has a practical approach to set up a Samba 4 Server as an Active Directory Domain Controller and also set up different Samba 4 server roles. This book is ideal for system administrators who are new to the Samba 4 software, and who are looking to get a good grounding in how to use Samba 4 to implement Active Directory Services. It's assumed that you will have some experience with general system administration, Active Directory, and GNU/Linux systems. Readers are expected to have some test machines (virtual machines), which will be used to execute the examples within this book.

Windows Malware Analysis Essentials
¥90.46
Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set About This Book Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware Understand how to decipher x86 assembly code from source code inside your favourite development environment A step-by-step based guide that reveals malware analysis from an industry insider and demystifies the process Who This Book Is For This book is best for someone who has prior experience with reverse engineering Windows executables and wants to specialize in malware analysis. The book presents the malware analysis thought process using a show-and-tell approach, and the examples included will give any analyst confidence in how to approach this task on their own the next time around. What You Will Learn Use the positional number system for clear conception of Boolean algebra, that applies to malware research purposes Get introduced to static and dynamic analysis methodologies and build your own malware lab Analyse destructive malware samples from the real world (ITW) from fingerprinting and static/dynamic analysis to the final debrief Understand different modes of linking and how to compile your own libraries from assembly code and integrate the codein your final program Get to know about the various emulators, debuggers and their features, and sandboxes and set them up effectively depending on the required scenario Deal with other malware vectors such as pdf and MS-Office based malware as well as *s and shellcode In Detail Windows OS is the most used operating system in the world and hence is targeted by malware writers. There are strong ramifications if things go awry. Things will go wrong if they can, and hence we see a salvo of attacks that have continued to disrupt the normal scheme of things in our day to day lives. This book will guide you on how to use essential tools such as debuggers, disassemblers, and sandboxes to dissect malware samples. It will expose your innards and then build a report of their indicators of compromise along with detection rule sets that will enable you to help contain the outbreak when faced with such a situation. We will start with the basics of computing fundamentals such as number systems and Boolean algebra. Further, you'll learn about x86 assembly programming and its integration with high level languages such as C++.You'll understand how to decipher disassembly code obtained from the compiled source code and map it back to its original design goals. By delving into end to end analysis with real-world malware samples to solidify your understanding, you'll sharpen your technique of handling destructive malware binaries and vector mechanisms. You will also be encouraged to consider analysis lab safety measures so that there is no infection in the process. Finally, we'll have a rounded tour of various emulations, sandboxing, and debugging options so that you know what is at your disposal when you need a specific kind of weapon in order to nullify the malware. Style and approach An easy to follow, hands-on guide with de*ions and screenshots that will help you execute effective malicious software investigations and conjure up solutions creatively and confidently.