万本电子书0元读

万本电子书0元读

Hands-on Machine Learning with JavaScript
Hands-on Machine Learning with JavaScript
Burak Kanber
¥81.74
A definitive guide to creating an intelligent web application with the best of machine learning and JavaScript About This Book ? Solve complex computational problems in browser with JavaScript ? Teach your browser how to learn from rules using the power of machine learning ? Understand discoveries on web interface and API in machine learning Who This Book Is For This book is for you if you are a JavaScript developer who wants to implement machine learning to make applications smarter, gain insightful information from the data, and enter the field of machine learning without switching to another language. Working knowledge of JavaScript language is expected to get the most out of the book. What You Will Learn ? Get an overview of state-of-the-art machine learning ? Understand the pre-processing of data handling, cleaning, and preparation ? Learn Mining and Pattern Extraction with JavaScript ? Build your own model for classification, clustering, and prediction ? Identify the most appropriate model for each type of problem ? Apply machine learning techniques to real-world applications ? Learn how JavaScript can be a powerful language for machine learning In Detail In over 20 years of existence, JavaScript has been pushing beyond the boundaries of web evolution with proven existence on servers, embedded devices, Smart TVs, IoT, Smart Cars, and more. Today, with the added advantage of machine learning research and support for JS libraries, JavaScript makes your browsers smarter than ever with the ability to learn patterns and reproduce them to become a part of innovative products and applications. Hands-on Machine Learning with JavaScript presents various avenues of machine learning in a practical and objective way, and helps implement them using the JavaScript language. Predicting behaviors, analyzing feelings, grouping data, and building neural models are some of the skills you will build from this book. You will learn how to train your machine learning models and work with different kinds of data. During this journey, you will come across use cases such as face detection, spam filtering, recommendation systems, character recognition, and more. Moreover, you will learn how to work with deep neural networks and guide your applications to gain insights from data. By the end of this book, you'll have gained hands-on knowledge on evaluating and implementing the right model, along with choosing from different JS libraries, such as NaturalNode, brain, harthur, classifier, and many more to design smarter applications. Style and approach This is a practical tutorial that uses hands-on examples to step through some real-world applications of machine learning. Without shying away from the technical details, you will explore machine learning with JavaScript using clear and practical examples.
Python Robotics Projects
Python Robotics Projects
Prof. Diwakar Vaish
¥81.74
Leverage the power of Python to build DIY robotic projects About This Book ? Design, build, and stimulate collaborative robots ? Build high-end robotics projects such as a customized personal Jarvis ? Leverage the power of Python and ROS for DIY robotic projects Who This Book Is For If building robots is your dream, then this book is made for you. Prior knowledge of Python would be an added advantage. What You Will Learn ? Get to know the basics of robotics and its functions ? Walk through interface components with microcontrollers ? Integrate robotics with the IoT environment ? Build projects using machine learning ? Implement path planning and vision processing ? Interface your robots with Bluetooth In Detail Robotics is a fast-growing industry. Multiple surveys state that investment in the field has increased tenfold in the last 6 years, and is set to become a $100-billion sector by 2020. Robots are prevalent throughout all industries, and they are all set to be a part of our domestic lives. This book starts with the installation and basic steps in configuring a robotic controller. You'll then move on to setting up your environment to use Python with the robotic controller. You'll dive deep into building simple robotic projects, such as a pet-feeding robot, and more complicated projects, such as machine learning enabled home automation system (Jarvis), vision processing based robots and a self-driven robotic vehicle using Python. By the end of this book, you'll know how to build smart robots using Python. Style and approach A simple step-by-step guide to help you learn the concepts of robotics using simple to advanced steps. You’ll not only learn the concepts of AI, machine learning, and Vision Processing, but also how to practically implement them in your projects.
Architecting Angular Applications with Redux, RxJS, and NgRx
Architecting Angular Applications with Redux, RxJS, and NgRx
Christoffer Noring
¥81.74
Manage state in Angular to write high performing web apps by combining the power of Flux, RxJS, and NgRx About This Book ? Learn what makes an excellent Angular application architecture ? Use Redux to write performant, consistent Angular applications ? Incorporate Reactive Programming principles and RxJS to make it easier to develop, test, and debug your Angular applications Who This Book Is For If you have been developing Angular applications and want to dive deeper into the Angular architecture with Redux, RxJS, and NgRx to write robust web apps, then this book is for you. What You Will Learn ? Understand the one-way data flow and Flux pattern ? Work with functional programming and asynchronous data streams ? Figure out how RxJS can help us address the flaws in promises ? Set up different versions of cascading calls ? Explore advanced operators ? Get familiar with the Redux pattern and its principles ? Test and debug different features of your application ? Build your own lightweight app using Flux, Redux, and NgRx In Detail Managing the state of large-scale web applications is a highly challenging task with the need to align different components, backends, and web workers harmoniously. When it comes to Angular, you can use NgRx, which combines the simplicity of Redux with the reactive programming power of RxJS to build your application architecture, making your code elegant and easy to reason about, debug, and test. In this book, we start by looking at the different ways of architecting Angular applications and some of the patterns that are involved in it. This will be followed by a discussion on one-way data flow, the Flux pattern, and the origin of Redux. The book introduces you to declarative programming or, more precisely, functional programming and talks about its advantages. We then move on to the reactive programming paradigm. Reactive programming is a concept heavily used in Angular and is at the core of NgRx. Later, we look at RxJS, as a library and master it. We thoroughly describe how Redux works and how to implement it from scratch. The two last chapters of the book cover everything NgRx has to offer in terms of core functionality and supporting libraries, including how to build a micro implementation of NgRx. This book will empower you to not only use Redux and NgRx to the fullest, but also feel confident in building your own version, should you need it. Style and approach This book covers everything there is to know to get well-acquainted with Angular without bogging you down. Everything is neatly laid out under clear headings for quick consultation, giving you the information required to understand a concept immediately.
Developing Middleware in Java EE 8
Developing Middleware in Java EE 8
Abdalla Mahmoud
¥81.74
Use Java features such as JAX-RS, EJBs, and JPAs to build powerful middleware for newer architectures such as the cloud About This Book ? Explore EJBs to build middleware solutions for enterprise and distributed applications ? Understand middleware designs such as event-based and message-driven web services ? Learn to design and maintain large-scale systems and vendor disputes Who This Book Is For Enterprise architects, designers, developers, and programmers who are interested in learning how to build robust middleware solutions for enterprise software will find this book useful. Prior knowledge of Java EE is essential What You Will Learn ? Implement the latest Java EE 8 APIs and manage dependencies with CDI 2.0 ? Perform CRUD operations and access databases with JPA 2.1 ? Use bean validation API 2.0 to validate data ? Develop business logic with EJB 3.2 ? Incorporate the REST architecture and RESTful API design patterns ? Perform serialization and deserialization on JSON documents using JSON-B ? Utilize JMS for messaging and queuing models and securing applications ? Test applications using JUnit and Mockito and deploy them using Docker In Detail Middleware is the infrastructure in software based applications that enables businesses to solve problems, operate more efficiently, and make money. As the use of middleware extends beyond a single application, the importance of having it written by experts increases substantially. This book will help you become an expert in developing middleware for a variety of applications. The book starts off by exploring the latest Java EE 8 APIs with newer features and managing dependencies with CDI 2.0. You will learn to implement object-to-relational mapping using JPA 2.1 and validate data using bean validation. You will also work with different types of EJB to develop business logic, and with design RESTful APIs by utilizing different HTTP methods and activating JAX-RS features in enterprise applications. You will learn to secure your middleware with Java Security 1.0 and implement various authentication techniques, such as OAuth authentication. In the concluding chapters, you will use various test technologies, such as JUnit and Mockito, to test applications, and Docker to deploy your enterprise applications. By the end of the book, you will be proficient in developing robust, effective, and distributed middleware for your business. Style and approach Learn how to design and implement professional enterprise middleware solutions using the latest techniques and features provided by the Java EE 8 platform.
Managing Mission - Critical Domains and DNS
Managing Mission - Critical Domains and DNS
Mark E. Jeftovic
¥81.74
This book will give you an all encompassing view of the domain name ecosystem combined with a comprehensive set of operations strategies. About This Book ? Manage infrastructure, risk, and management of DNS name servers. Get hands-on with factors like types of name servers, DNS queries and and so on. ? Practical guide for system administrators to manage mission-critical servers ? Based on real-world experience - Written by an industry veteran who has made every possible mistake within this field. Who This Book Is For Ideal for sysadmins, webmasters, IT consultants, and developers-anyone responsible for maintaining your organization's core DNS What You Will Learn ? Anatomy of a domain - how a domain is the sum of both its DNS zone and its registration data, and why that matters. ? The domain name ecosystem - the role of registries, registrars and oversight bodies and their effect on your names. ? How DNS queries work - queries and responses are examined including debugging techniques to zero in on problems. ? Nameserver considerations - alternative nameserver daemons, numbering considerations, and deployment architectures. ? DNS use cases - the right way for basic operations such as domain transfers, large scale migrations, GeoDNS, Anycast DNS. ? Securing your domains - All aspects of security from registrar vendor selection, to DNSSEC and DDOS mitigation strategies. In Detail Managing your organization's naming architecture and mitigating risks within complex naming environments is very important. This book will go beyond looking at “how to run a name server” or “how to DNSSEC sign a domain”, Managing Mission Critical Domains & DNS looks across the entire spectrum of naming; from external factors that exert influence on your domains to all the internal factors to consider when operating your DNS. The readers are taken on a comprehensive guided tour through the world of naming: from understanding the role of registrars and how they interact with registries, to what exactly is it that ICANN does anyway? Once the prerequisite knowledge of the domain name ecosystem is acquired, the readers are taken through all aspects of DNS operations. Whether your organization operates its own nameservers or utilizes an outsourced vendor, or both, we examine the complex web of interlocking factors that must be taken into account but are too frequently overlooked. By the end of this book, our readers will have an end to end to understanding of all the aspects covered in DNS name servers. Style and approach The book is divided into two parts, the first part looks at the wider domain name ecosystem: registries, registrars and oversight policies. The second and larger part goes into operations. Every aspect of naming is considered from the viewpoint of how this affects ones domains, what are the ramifications of different operating methods as portfolios scale.
Python GUI Programming with Tkinter
Python GUI Programming with Tkinter
Alan D. Moore
¥81.74
Find out how to create visually stunning and feature-rich applications by empowering Python's built-in Tkinter GUI toolkit About This Book ? Explore Tkinter's powerful features to easily design and customize your GUI application ? Learn the basics of 2D and 3D animation in GUI applications. ? Learn to integrate stunning Data Visualizations using Tkinter Canvas and Matplotlib. Who This Book Is For This book will appeal to developers and programmers who would like to build GUI-based applications. Knowledge of Python is a prerequisite. What You Will Learn ? Implement the tools provided by Tkinter to design beautiful GUIs ? Discover cross-platform development through minor customizations in your existing application ? Visualize graphs in real time as data comes in using Tkinter's animation capabilities ? Use PostgreSQL authentication to ensure data security for your application ? Write unit tests to avoid regressions when updating code In Detail Tkinter is a lightweight, portable, and easy-to-use graphical toolkit available in the Python Standard Library, widely used to build Python GUIs due to its simplicity and availability. This book teaches you to design and build graphical user interfaces that are functional, appealing, and user-friendly using the powerful combination of Python and Tkinter. After being introduced to Tkinter, you will be guided step-by-step through the application development process. Over the course of the book, your application will evolve from a simple data-entry form to a complex data management and visualization tool while maintaining a clean and robust design. In addition to building the GUI, you'll learn how to connect to external databases and network resources, test your code to avoid errors, and maximize performance using asynchronous programming. You'll make the most of Tkinter's cross-platform availability by learning how to maintain compatibility, mimic platform-native look and feel, and build executables for deployment across popular computing platforms. By the end of this book, you will have the skills and confidence to design and build powerful high-end GUI applications to solve real-world problems. Style and approach This is a comprehensive guide that explores the essential Tkinter features and modules and implements them in building real-world cross-platform GUI applications
C++ Reactive Programming
C++ Reactive Programming
Praseed Pai,Peter Abraham
¥81.74
Learn how to implement the reactive programming paradigm with C++ and build asynchronous and concurrent applications About This Book ? Efficiently exploit concurrency and parallelism in your programs ? Use the Functional Reactive programming model to structure programs ? Understand reactive GUI programming to make your own applications using Qt Who This Book Is For If you’re a C++ developer interested in using reactive programming to build asynchronous and concurrent applications, you’ll find this book extremely useful. This book doesn’t assume any previous knowledge of reactive programming. What You Will Learn ? Understand language-level concurrency in C++ ? Explore advanced C++ programming for the FRP ? Uncover the RxCpp library and its programming model ? Mix the FP and OOP constructs in C++ 17 to write well-structured programs ? Master reactive microservices in C++ ? Create custom operators for RxCpp ? Learn advanced stream processing and error handling In Detail Reactive programming is an effective way to build highly responsive applications with an easy-to-maintain code base. This book covers the essential functional reactive concepts that will help you build highly concurrent, event-driven, and asynchronous applications in a simpler and less error-prone way. C++ Reactive Programming begins with a discussion on how event processing was undertaken by different programming systems earlier. After a brisk introduction to modern C++ (C++17), you’ll be taken through language-level concurrency and the lock-free programming model to set the stage for our foray into the Functional Programming model. Following this, you’ll be introduced to RxCpp and its programming model. You’ll be able to gain deep insights into the RxCpp library, which facilitates reactive programming. You’ll learn how to deal with reactive programming using Qt/C++ (for the desktop) and C++ microservices for the Web. By the end of the book, you will be well versed with advanced reactive programming concepts in modern C++ (C++17). Style and approach The book includes real-world problems that you will solve with the reactive programming model. It highlights the way event processing has evolved in the programming world.
Hands-On Microservices with C#
Hands-On Microservices with C#
Matt R. Cole
¥81.74
Build enterprise-grade microservice ecosystems with intensive case studies using C# About This Book ? Learn to build message-based microservices ? Packed with case studies to explain the intricacies of large-scale microservices ? Build scalable, modular, and robust architectures with C# Who This Book Is For C# developers, software architects, and professionals who want to master the art of designing the microservice architecture that is scalable based on environment. Developers should have a basic understanding of.NET application development using C# and Visual Studio What You Will Learn ? Explore different open source tools within the context of designing microservices ? Learn to provide insulation to exception-prone function calls ? Build common messages used between microservices for communication ? Learn to create a microservice using our base class and interface ? Design a quantitative financial machine microservice ? Learn to design a microservice that is capable of using Blockchain technology In Detail C# is a powerful language when it comes to building applications and software architecture using rich libraries and tools such as .NET. This book will harness the strength of C# in developing microservices architectures and applications. This book shows developers how to develop an enterprise-grade, event-driven, asynchronous, message-based microservice framework using C#, .NET, and various open source tools. We will discuss how to send and receive messages, how to design many types of microservice that are truly usable in a corporate environment. We will also dissect each case and explain the code, best practices, pros and cons, and more. Through our journey, we will use many open source tools, and create file monitors, a machine learning microservice, a quantitative financial microservice that can handle bonds and credit default swaps, a deployment microservice to show you how to better manage your deployments, and memory, health status, and other microservices. By the end of this book, you will have a complete microservice ecosystem you can place into production or customize in no time. Style and approach A step-by-step guide that enables readers to create a complete microservice ecosystem they can place into production or customize in no time.
Hands-On Cloud Development with WildFly
Hands-On Cloud Development with WildFly
Tomasz Adamski
¥81.74
Create microservices using Java EE technologies using WildFly Swarm,deploy them in the OpenShift cloud, make them resilient to network failures using Hystrix, configure continuous integration using Jenkins, and security using Keycloak. About This Book ? Create functional microservices with WildFly Swarm ? Use OpenShift to deploy your microservices in the cloud ? Make your application production-ready using Jenkins, Hystrix, and Keycloak Who This Book Is For If you're an experienced developer familiar with Java EE technologies and would like to learn how you can use those technologies in the cloud with WildFly and OpenShift, then this book is for you. What You Will Learn ? Utilize Java EE technology to develop modern cloud-enabled applications ? Easily create microservices with WildFly Swarm using proven Java EE technologies ? See the benefits of OpenShift – easy deployment of your services, out of the box scalability and healing, and integration with Continuous Integration tools ? Integrate the sample application with Jenkins’ Continuous Integration server ? Utilize Netflix OSS to connect your services and provide resilience to your application ? Provide security to your application using Keycloak In Detail The book starts by introducing you to WildFly Swarm—a tool that allows you to create runnable microservices from Java EE components. You’ll learn the basics of Swarm operation—creating a microservice containing only the parts of enterprise runtime needed in a specific case. Later, you’ll learn how to configure and test those services. In order to deploy our services in the cloud, we’ll use OpenShift. You’ll get to know basic information on its architecture, features, and relationship to Docker and Kubernetes. Later, you’ll learn how to deploy and configure your services to run in the OpenShift cloud. In the last part of the book, you’ll see how to make your application production-ready. You’ll find out how to configure continuous integration for your services using Jenkins, make your application resistant to network failures using Hystrix, and how to secure them using Keycloak. By the end of the book, you’ll have a fully functional example application and will have practical knowledge of Java EE cloud development that can be used as a reference in your other projects. Style and approach This example-based tutorial guides you step by step through creating an application based on well-known Java EE technologies (JAX-RS, CDI, JPA, and JSF) and modern architectural patterns.
Hands-On Full-Stack Development with Swift
Hands-On Full-Stack Development with Swift
Ankur Patel
¥81.74
Build full-stack shopping list applications from scratch for web and mobile platforms using Xcode, Vapor, and Swift About This Book ? Build, package, and deploy an end-to-end app solution for mobile and web with Swift 4 ? Increase developer productivity by creating reusable client and server components ? Develop backend services for your apps and websites using Vapor framework Who This Book Is For This book is for developers who are looking to build full-stack web and native mobile applications using Swift. An understanding of HTML, CSS, and JavaScript would be beneficial when building server-rendered pages with Vapor. What You Will Learn ? Get accustomed to server-side programming as well as the Vapor framework ? Learn how to build a RESTful API ? Make network requests from your app and handle error states when a network request fails ? Deploy your app to Heroku using the CLI command ? Write a test for the Vapor backend ? Create a tvOS version of your shopping list app and explore code-sharing with an iOS platform ? Add registration and authentication so that users can have their own shopping lists In Detail Making Swift an open-source language enabled it to share code between a native app and a server. Building a scalable and secure server backend opens up new possibilities, such as building an entire application written in one language—Swift. This book gives you a detailed walk-through of tasks such as developing a native shopping list app with Swift and creating a full-stack backend using Vapor (which serves as an API server for the mobile app). You'll also discover how to build a web server to support dynamic web pages in browsers, thereby creating a rich application experience. You’ll begin by planning and then building a native iOS app using Swift. Then, you'll get to grips with building web pages and creating web views of your native app using Vapor. To put things into perspective, you'll learn how to build an entire full-stack web application and an API server for your native mobile app, followed by learning how to deploy the app to the cloud, and add registration and authentication to it. Once you get acquainted with creating applications, you'll build a tvOS version of the shopping list app and explore how easy is it to create an app for a different platform with maximum code shareability. Towards the end, you’ll also learn how to create an entire app for different platforms in Swift, thus enhancing your productivity. Style and approach A step-by-step tutorial-based approach that teaches you full-stack Swift through the development of a single application on several platforms.
Microservice Patterns and Best Practices
Microservice Patterns and Best Practices
Vinicius Feitosa Pacheco
¥81.74
Explore the concepts and tools you need to discover the world of microservices with various design patterns About This Book ? Get to grips with the microservice architecture and build enterprise-ready microservice applications ? Learn design patterns and the best practices while building a microservice application ? Obtain hands-on techniques and tools to create high-performing microservices resilient to possible fails Who This Book Is For This book is for architects and senior developers who would like implement microservice design patterns in their enterprise application development. The book assumes some prior programming knowledge. What You Will Learn ? How to break monolithic application into microservices ? Implement caching strategies, CQRS and event sourcing, and circuit breaker patterns ? Incorporate different microservice design patterns, such as shared data, aggregator, proxy, and chained ? Utilize consolidate testing patterns such as integration, signature, and monkey tests ? Secure microservices with JWT, API gateway, and single sign on ? Deploy microservices with continuous integration or delivery, Blue-Green deployment In Detail Microservices are a hot trend in the development world right now. Many enterprises have adopted this approach to achieve agility and the continuous delivery of applications to gain a competitive advantage. This book will take you through different design patterns at different stages of the microservice application development along with their best practices. Microservice Patterns and Best Practices starts with the learning of microservices key concepts and showing how to make the right choices while designing microservices. You will then move onto internal microservices application patterns, such as caching strategy, asynchronism, CQRS and event sourcing, circuit breaker, and bulkheads. As you progress, you'll learn the design patterns of microservices. The book will guide you on where to use the perfect design pattern at the application development stage and how to break monolithic application into microservices. You will also be taken through the best practices and patterns involved while testing, securing, and deploying your microservice application. At the end of the book, you will easily be able to create interoperable microservices, which are testable and prepared for optimum performance. Style and approach Comprehensive guide that uses architectural patterns with the best choices involved in application development
Mastering Linux Security and Hardening
Mastering Linux Security and Hardening
Donald A. Tevault
¥81.74
A comprehensive guide to mastering the art of preventing your Linux system from getting compromised. About This Book ? Leverage this guide to confidently deliver a system that reduces the risk of being hacked ? Perform a number of advanced Linux security techniques such as network service detection, user authentication, controlling special permissions, encrypting file systems, and much more ? Master the art of securing a Linux environment with this end-to-end practical guide Who This Book Is For If you are a systems administrator or a network engineer interested in making your Linux environment more secure, then this book is for you. Security consultants wanting to enhance their Linux security skills will also benefit from this book. Prior knowledge of Linux is mandatory. What You Will Learn ? Use various techniques to prevent intruders from accessing sensitive data ? Prevent intruders from planting malware, and detect whether malware has been planted ? Prevent insiders from accessing data that they aren’t authorized to access ? Do quick checks to see whether a computer is running network services that it doesn’t need to run ? Learn security techniques that are common to all Linux distros, and some that are distro-specific In Detail This book has extensive coverage of techniques that will help prevent attackers from breaching your system, by building a much more secure Linux environment. You will learn various security techniques such as SSH hardening, network service detection, setting up firewalls, encrypting file systems, protecting user accounts, authentication processes, and so on. Moving forward, you will also develop hands-on skills with advanced Linux permissions, access control, special modes, and more. Lastly, this book will also cover best practices and troubleshooting techniques to get your work done efficiently. By the end of this book, you will be confident in delivering a system that will be much harder to compromise. Style and approach An advanced-level guide filled with real-world examples that will help you secure your Linux system
Hands-On Microservices with Kotlin
Hands-On Microservices with Kotlin
Juan Antonio Medina Iglesias
¥81.74
Build smart, efficient, and fast enterprise-grade web implementation of the microservices architecture that can be easily scaled. About This Book ? Write easy-to-maintain lean and clean code with Kotlin for developing better microservices ? Scale your Microserivces in your own cloud with Docker and Docker Swarm ? Explore Spring 5 functional reactive web programming with Spring WebFlux Who This Book Is For If you are a Kotlin developer with a basic knowledge of microservice architectures and now want to effectively implement these services on enterprise-level web applications, then this book is for you What You Will Learn ? Understand microservice architectures and principles ? Build microservices in Kotlin using Spring Boot 2.0 and Spring Framework 5.0 ? Create reactive microservices that perform non-blocking operations with Spring WebFlux ? Use Spring Data to get data reactively from MongoDB ? Test effectively with JUnit and Kotlin ? Create cloud-native microservices with Spring Cloud ? Build and publish Docker images of your microservices ? Scaling microservices with Docker Swarm ? Monitor microservices with JMX ? Deploy microservices in OpenShift Online In Detail With Google's inclusion of first-class support for Kotlin in their Android ecosystem, Kotlin's future as a mainstream language is assured. Microservices help design scalable, easy-to-maintain web applications; Kotlin allows us to take advantage of modern idioms to simplify our development and create high-quality services. With 100% interoperability with the JVM, Kotlin makes working with existing Java code easier. Well-known Java systems such as Spring, Jackson, and Reactor have included Kotlin modules to exploit its language features. This book guides the reader in designing and implementing services, and producing production-ready, testable, lean code that's shorter and simpler than a traditional Java implementation. Reap the benefits of using the reactive paradigm and take advantage of non-blocking techniques to take your services to the next level in terms of industry standards. You will consume NoSQL databases reactively to allow you to create high-throughput microservices. Create cloud-native microservices that can run on a wide range of cloud providers, and monitor them. You will create Docker containers for your microservices and scale them. Finally, you will deploy your microservices in OpenShift Online. Style and approach This book guides the reader in designing and implementing services, achieving production- ready, testable, easy-to-maintain, lean code that's shorter and simpler than a traditional Java implementation.
Internet of Things for Architects
Internet of Things for Architects
Perry Lea
¥81.74
Learn to design, implement and secure your IoT infrastructure About This Book ? Build a complete IoT system that is the best fit for your organization ? Learn about different concepts, technologies, and tradeoffs in the IoT architectural stack ? Understand the theory, concepts, and implementation of each element that comprises IoT design—from sensors to the cloud ? Implement best practices to ensure the reliability, scalability, robust communication systems, security, and data analysis in your IoT infrastructure Who This Book Is For This book is for architects, system designers, technologists, and technology managers who want to understand the IoT ecosphere, various technologies, and tradeoffs and develop a 50,000-foot view of IoT architecture. What You Will Learn ? Understand the role and scope of architecting a successful IoT deployment, from sensors to the cloud ? Scan the landscape of IoT technologies that span everything from sensors to the cloud and everything in between ? See the trade-offs in choices of protocols and communications in IoT deployments ? Build a repertoire of skills and the vernacular necessary to work in the IoT space ? Broaden your skills in multiple engineering domains necessary for the IoT architect In Detail The Internet of Things (IoT) is the fastest growing technology market. Industries are embracing IoT technologies to improve operational expenses, product life, and people's well-being. An architectural guide is necessary if you want to traverse the spectrum of technologies needed to build a successful IoT system, whether that's a single device or millions of devices. This book encompasses the entire spectrum of IoT solutions, from sensors to the cloud. We start by examining modern sensor systems and focus on their power and functionality. After that, we dive deep into communication theory, paying close attention to near-range PAN, including the new Bluetooth? 5.0 specification and mesh networks. Then, we explore IP-based communication in LAN and WAN, including 802.11ah, 5G LTE cellular, SigFox, and LoRaWAN. Next, we cover edge routing and gateways and their role in fog computing, as well as the messaging protocols of MQTT and CoAP. With the data now in internet form, you'll get an understanding of cloud and fog architectures, including the OpenFog standards. We wrap up the analytics portion of the book with the application of statistical analysis, complex event processing, and deep learning models. Finally, we conclude by providing a holistic view of the IoT security stack and the anatomical details of IoT exploits while countering them with software defined perimeters and blockchains. Style and approach This hands-on guide combines theory and application to the Internet of Things. This book covers the entire architectural stack of components and engineering domains from sensors to power analysis, communication systems, information theory, networking and routing, data security, protocols, software stacks, cloud mechanics, and data analytics with deep learning.
Learn Microsoft Azure
Learn Microsoft Azure
Mohamed Wali
¥81.74
Explore various Azure services to build solutions that leverage effective design patterns Key Features *Create, deploy, and host cloud applications on Azure *Understand various Azure services that help you host serverless applications *Explore practical examples to help you secure and troubleshoot your cloud environment Book Description Azure is one of the leading public cloud service providers. Thanks to a number of Azure service updates, it continues to make advances in the realm of cloud computing. Learn Microsoft Azure starts with the fundamentals of cloud computing. You will learn to configure and set up the Azure infrastructure. As you make your way through the book, you'll explore Azure services, along with working on virtual memory systems (VMS) and deployment models. You will understand various services in the Azure ecosystem, such as Azure IoT and Azure Analytics, among others. An easy-to-follow introduction to various cloud design patterns will also add to your efficiency in designing cloud solutions. In the concluding chapters, you'll secure your virtual networks using Network security groups and configure Azure Active Directory (Azure AD) to set a custom domain name and company profile. By the end of this book, you will have learned to secure and troubleshoot your Azure cloud environment and be fully aware of best practices for Azure cloud administration. What you will learn *Understand the cloud services offered by Azure *Design storage and networks in Azure for your Azure VM *Work with web apps and Azure SQL databases *Build your identity management solutions on Azure using Azure AD *Monitor, protect, and automate your Azure services using Operation Management Suite (OMS) *Implement OMS for Azure services Who this book is for Learn Microsoft Azure is for administrators, cloud engineers, and developers who want to get started with using Azure as their cloud platform and build cloud-based applications for their enterprises.
Mastering Ceph
Mastering Ceph
Nick Fisk
¥81.74
Discover the unified, distributed storage system and improve the performance of applications Key Features * Explore the latest features of Ceph's Mimic release * Get to grips with advanced disaster and recovery practices for your storage * Harness the power of Reliable Autonomic Distributed Object Store (RADOS) to help you optimize storage systems Book Description Ceph is an open source distributed storage system that is scalable to Exabyte deployments. This second edition of Mastering Ceph takes you a step closer to becoming an expert on Ceph. You’ll get started by understanding the design goals and planning steps that should be undertaken to ensure successful deployments. In the next sections, you’ll be guided through setting up and deploying the Ceph cluster with the help of orchestration tools. This will allow you to witness Ceph’s scalability, erasure coding (data protective) mechanism, and automated data backup features on multiple servers. You’ll then discover more about the key areas of Ceph including BlueStore, erasure coding and cache tiering with the help of examples. Next, you’ll also learn some of the ways to export Ceph into non-native environments and understand some of the pitfalls that you may encounter. The book features a section on tuning that will take you through the process of optimizing both Ceph and its supporting infrastructure. You’ll also learn to develop applications, which use Librados and distributed computations with shared object classes. Toward the concluding chapters, you’ll learn to troubleshoot issues and handle various scenarios where Ceph is not likely to recover on its own. By the end of this book, you’ll be able to master storage management with Ceph and generate solutions for managing your infrastructure. What you will learn * Plan, design and deploy a Ceph cluster * Get well-versed with different features and storage methods * Carry out regular maintenance and daily operations with ease * Tune Ceph for improved ROI and performance * Recover Ceph from a range of issues * Upgrade clusters to BlueStore Who this book is for If you are a storage professional, system administrator, or cloud engineer looking for guidance on building powerful storage solutions for your cloud and on-premise infrastructure, this book is for you.
Hands-On Machine Learning for Cybersecurity
Hands-On Machine Learning for Cybersecurity
Soma Halder
¥81.74
Get into the world of smart data security using machine learning algorithms and Python libraries Key Features *Learn machine learning algorithms and cybersecurity fundamentals *Automate your daily workflow by applying use cases to many facets of security *Implement smart machine learning solutions to detect various cybersecurity problems Book Description Cyber threats today are one of the costliest losses that an organization can face. In this book, we use the most efficient tool to solve the big problems that exist in the cybersecurity domain. The book begins by giving you the basics of ML in cybersecurity using Python and its libraries. You will explore various ML domains (such as time series analysis and ensemble modeling) to get your foundations right. You will implement various examples such as building system to identify malicious URLs, and building a program to detect fraudulent emails and spam. Later, you will learn how to make effective use of K-means algorithm to develop a solution to detect and alert you to any malicious activity in the network. Also learn how to implement biometrics and fingerprint to validate whether the user is a legitimate user or not. Finally, you will see how we change the game with TensorFlow and learn how deep learning is effective for creating models and training systems What you will learn *Use machine learning algorithms with complex datasets to implement cybersecurity concepts *Implement machine learning algorithms such as clustering, k-means, and Naive Bayes to solve real-world problems *Learn to speed up a system using Python libraries with NumPy, Scikit-learn, and CUDA *Understand how to combat malware, detect spam, and fight financial fraud to mitigate cyber crimes *Use TensorFlow in the cybersecurity domain and implement real-world examples *Learn how machine learning and Python can be used in complex cyber issues Who this book is for This book is for the data scientists, machine learning developers, security researchers, and anyone keen to apply machine learning to up-skill computer security. Having some working knowledge of Python and being familiar with the basics of machine learning and cybersecurity fundamentals will help to get the most out of the book
Linux Administration Cookbook
Linux Administration Cookbook
Adam K. Dean
¥81.74
Over 100 recipes to get up and running with the modern Linux administration ecosystem Key Features *Understand and implement the core system administration tasks in Linux *Discover tools and techniques to troubleshoot your Linux system *Maintain a healthy system with good security and backup practices Book Description Linux is one of the most widely used operating systems among system administrators,and even modern application and server development is heavily reliant on the Linux platform. The Linux Administration Cookbook is your go-to guide to get started on your Linux journey. It will help you understand what that strange little server is doing in the corner of your office, what the mysterious virtual machine languishing in Azure is crunching through, what that circuit-board-like thing is doing under your office TV, and why the LEDs on it are blinking rapidly. This book will get you started with administering Linux, giving you the knowledge and tools you need to troubleshoot day-to-day problems, ranging from a Raspberry Pi to a server in Azure, while giving you a good understanding of the fundamentals of how GNU/Linux works. Through the course of the book, you’ll install and configure a system, while the author regales you with errors and anecdotes from his vast experience as a data center hardware engineer, systems administrator, and DevOps consultant. By the end of the book, you will have gained practical knowledge of Linux, which will serve as a bedrock for learning Linux administration and aid you in your Linux journey. What you will learn *Install and manage a Linux server, both locally and in the cloud *Understand how to perform administration across all Linux distros *Work through evolving concepts such as IaaS versus PaaS, containers, and automation *Explore security and configuration best practices *Troubleshoot your system if something goes wrong *Discover and mitigate hardware issues, such as faulty memory and failing drives Who this book is for If you are a system engineer or system administrator with basic experience of working with Linux, this book is for you.
Hands-On Cybersecurity for Finance
Hands-On Cybersecurity for Finance
Dr. Erdal Ozkaya
¥81.74
A comprehensive guide that will give you hands-on experience to study and overcome financial cyber threats Key Features * Protect your financial environment with cybersecurity practices and methodologies * Identify vulnerabilities such as data manipulation and fraudulent transactions * Provide end-to-end protection within organizations Book Description Organizations have always been a target of cybercrime. Hands-On Cybersecurity for Finance teaches you how to successfully defend your system against common cyber threats, making sure your financial services are a step ahead in terms of security. The book begins by providing an overall description of cybersecurity, guiding you through some of the most important services and technologies currently at risk from cyber threats. Once you have familiarized yourself with the topic, you will explore specific technologies and threats based on case studies and real-life scenarios. As you progress through the chapters, you will discover vulnerabilities and bugs (including the human risk factor), gaining an expert-level view of the most recent threats. You'll then explore information on how you can achieve data and infrastructure protection. In the concluding chapters, you will cover recent and significant updates to procedures and configurations, accompanied by important details related to cybersecurity research and development in IT-based financial services. By the end of the book, you will have gained a basic understanding of the future of information security and will be able to protect financial services and their related infrastructures. What you will learn * Understand the cyber threats faced by organizations * Discover how to identify attackers * Perform vulnerability assessment, software testing, and pentesting * Defend your financial cyberspace using mitigation techniques and remediation plans * Implement encryption and decryption * Understand how Artificial Intelligence (AI) affects cybersecurity Who this book is for Hands-On Cybersecurity for Finance is for you if you are a security architect, cyber risk manager, or pentester looking to secure your organization. Basic understanding of cybersecurity tools and practices will help you get the most out of this book.
Hands-On Cloud-Native Microservices with Jakarta EE
Hands-On Cloud-Native Microservices with Jakarta EE
Luigi Fugaro
¥81.74
Discover how cloud-native microservice architecture helps you to build dynamically scalable applications by using the most widely used and adopted runtime environments Key Features * Build robust cloud-native applications using a variety of tools * Understand how to configure both Amazon Web Services (AWS) and Docker clouds for high availability * Explore common design patterns used in building and deploying microservices architecture. Book Description Businesses today are evolving rapidly, and developers now face the challenge of building applications that are resilient, flexible, and native to the cloud. To achieve this, you'll need to be aware of the environment, tools, and resources that you're coding against. The book will begin by introducing you to cloud-native architecture and simplifying the major concepts. You'll learn to build microservices in Jakarta EE using MicroProfile with Thorntail and Narayana LRA. You'll then delve into cloud-native application x-rays, understanding the MicroProfile specification and the implementation/testing of microservices. As you progress further, you'll focus on continuous integration and continuous delivery, in addition to learning how to dockerize your services. You'll also cover concepts and techniques relating to security, monitoring, and troubleshooting problems that might occur with applications after you've written them. By the end of this book, you will be equipped with the skills you need to build highly resilient applications using cloud-native microservice architecture. What you will learn * Integrate reactive principles in MicroProfile microservices architecture * Explore the 12-factors-app paradigm and its implications * Get the best out of Java versions 8 and 9 to implement a microservice based on Thorntail * Understand what OpenShift is and why it is so important for an elastic architecture * Build a Linux container image using Docker and scale the application using Kubernetes * Implement various patterns such as, Circuit Breaker and bulkheads * Get to grips with the DevOps methodology using continuous integration (CI) and continuous deployment (CD) Who this book is for This book is for developers with basic knowledge of Java EE and HTTP-based application principles who want to learn how to build, test and scale Java EE microservices. No prior experience of writing microservices in Java EE is required.
Kali Linux - An Ethical Hacker's Cookbook
Kali Linux - An Ethical Hacker's Cookbook
Himanshu Sharma
¥81.74
Discover end-to-end penetration testing solutions to enhance your ethical hacking skills Key Features * Practical recipes to conduct effective penetration testing using the latest version of Kali Linux * Leverage tools like Metasploit, Wireshark, Nmap, and more to detect vulnerabilities with ease * Confidently perform networking and application attacks using task-oriented recipes Book Description Many organizations have been affected by recent cyber events. At the current rate of hacking, it has become more important than ever to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2018.4 / 2019), in addition to covering the core functionalities. The book will get you off to a strong start by introducing you to the installation and configuration of Kali Linux, which will help you to perform your tests. You will also learn how to plan attack strategies and perform web application exploitation using tools such as Burp and JexBoss. As you progress, you will get to grips with performing network exploitation using Metasploit, Sparta, and Wireshark. The book will also help you delve into the technique of carrying out wireless and password attacks using tools such as Patator, John the Ripper, and airoscript-ng. Later chapters will draw focus to the wide range of tools that help in forensics investigations and incident response mechanisms. As you wrap up the concluding chapters, you will learn to create an optimum quality pentest report. By the end of this book, you will be equipped with the knowledge you need to conduct advanced penetration testing, thanks to the book’s crisp and task-oriented recipes. What you will learn * Learn how to install, set up and customize Kali for pentesting on multiple platforms * Pentest routers and embedded devices * Get insights into fiddling around with software-defined radio * Pwn and escalate through a corporate network * Write good quality security reports * Explore digital forensics and memory analysis with Kali Linux Who this book is for If you are an IT security professional, pentester, or security analyst who wants to conduct advanced penetration testing techniques, then this book is for you. Basic knowledge of Kali Linux is assumed.