万本电子书0元读

万本电子书0元读

Spring MVC: Beginner's Guide - Second Edition
Spring MVC: Beginner's Guide - Second Edition
Amuthan Ganeshan
¥80.65
Unleash the power of the latest Spring MVC 4.x to develop a complete application About This Book Work through carefully crafted exercises with detailed explanations for each step will help you understand the concepts with ease You will gain a clear understanding of the end-to-end request/response life cycle, and each logical component’s responsibility This book is packed with tips and tricks that demonstrate industry best practices on developing a Spring-MVC-based application Who This Book Is For The book is for Java developers who want to exploit Spring MVC and its features to build web applications. Some familiarity with basic servlet programming concepts would be a plus, but is not a prerequisite. What You Will Learn Familiarize yourself with the anatomy of the Spring 4.X development environment Understand web application architecture and the Spring MVC request flow Integrate bean validation and custom validation Use error handling and exception resolving Get to grips with REST-based web service development and Ajax Test your web application In Detail Spring MVC helps you build flexible and loosely coupled web applications. The Spring MVC Framework is architected and designed in such a way that every piece of logic and functionality is highly configurable. Also, Spring can integrate effortlessly with other popular web frameworks such as Struts, WebWork, Java Server Faces, and Tapestry. The book progressively teaches you to configure the Spring development environment, architecture, controllers, libraries, and more before moving on to developing a full web application. It begins with an introduction to the Spring development environment and architecture so you're familiar with the know-hows. From here, we move on to controllers, views, validations, Spring Tag libraries, and more. Finally, we integrate it all together to develop a web application. You'll also get to grips with testing applications for reliability. Style and approach This book takes a pragmatic step-by-step approach to web application development using Spring MVC, with informative screenshots and concise explanation.
Maya Programming with Python Cookbook
Maya Programming with Python Cookbook
Adrian Herbez
¥80.65
Master complex workflows and conquer the world with Python and Maya About This Book Improve your modelling skills and reduce your *ing problems using Python in Maya Learn to communicate with web applications using Python for easier team development A quick and practical answer to every problem you can have whilst *ing in Maya with Python Who This Book Is For This book is for Python developers who have just started *ing with Maya. What You Will Learn Find out how to use Python *ing to automate tedious tasks Create functional user interfaces to make *s easy to share with others Add new functionality to Maya via the power of *ing Import and export arbitrary data into and out of Maya Improve your workflow, and that of your team Create custom create custom controls to make rigs that are easy to work with Implement a system to render 3D assets for isometric games Use * jobs to trigger actions automatically in response to user interaction Open a command port to allow other applications to communicate with Maya In Detail Maya is a 3D graphics and animation software, used to develop interactive 3D applications and games with stupendous visual effects. The Maya Programming with Python Cookbook is all about creating fast, powerful automation systems with minimum coding using Maya Python. With the help of insightful and essential recipes, this book will help you improve your modelling skills. Expand your development options and overcome *ing problems encountered whilst developing code in Maya. Right from the beginning, get solutions to complex development concerns faced when implementing as parts of build. Style and approach This book is comprised of a set of practical recipes, grouped under specific topics, which can be referred to independently or in sequence. These recipes provide quick solutions to common problems, and cover most of the real-world scenarios that developers are likely to face when working with Maya.
Mastering Sass
Mastering Sass
Luke Watts
¥80.65
Create interactive and responsive cross-browser apps with SASS and Compass About This Book Create data-intensive, highly scalable apps using Sass and COMPASS Master the concepts of Sass and COMPASS and unleash your potential to develop enterprise-grade apps This book is an experts’ guide on leveraging Sass and COMPASS features Who This Book Is For This book is aimed at those who know CSS3 and HTML5 quite well and who've built a few small-to-medium-sized websites from scratch using Sass and Compass. What You Will Learn Master Sass and Compass features Familiarize yourself with CSS and HTML concepts that are vital for a good Sass workflow. Build real-world websites focusing on layouts and content aspects Work on a grid system using Compass and Susy Automate your workflow with Gulp Write functions and mixins to leverage the control flow In Detail CSS and Sass add elegance and excellence to the basic language, and consist of a CSS-compatible syntax that allows you to use variables, nested rules, mixins, inline imports, and much more. This book will start with an overview of the features in Sass and Compass, most of which you'll already be familiar; however, this will ensure you know what’s expected as the book goes deeper into Sass and Compass. Next you will learn CSS and HTML concepts that are vital to a good Sass workflow. After all, Sass exists to simplify writing CSS, but it won’t teach you how to make clean, scalable, reusable CSS. For that, you need to understand some basic concepts of OOCSS, SMACCS, and Atomic Design. Once you’ve brushed up on the important concepts, it’s time to write some Sass. Mainly you’ll write a few functions and mixins that really leverage control flow using @if / @else loops and you’ll learn how to figure out when and why things are going wrong before they bring you to a stop. Moving further, you’ll learn how to use @debug, @warn and @error to properly handle errors. You’ll also learn about Gulp and how to use it to automate your workflow and reduce your repetitive tasks. And finally you’ll learn about sourcemaps. With sourcemaps, you’ll be able to write, debug, and view your Sass and Compass all from within the browser. It’ll even LiveReload too! As a bonus, you’ll take a look at that funky Flexbox, currently all the rage! You’ll learn how powerful and flexible it really is, and how you can use it with Compass. Best of all, it falls back very gracefully indeed! In fact, you’ll be able to apply it to any existing project without having to change a line of the original CSS. Style and approach This book will provide readers with practical, actionable expertise to enhance their knowledge
Learning ArcGIS Runtime SDK for .NET
Learning ArcGIS Runtime SDK for .NET
Ron Vincent
¥80.65
Learn how to build native, cross-platform mapping apps with this comprehensive and practical guide, using the MVVM pattern About This Book Enhance the user experience with the power of ArcGIS runtime SDK for .NET. This clear, well segregated book has all the information you need on ArcGIS Runtime SDK. Just name it—this book has it! This highly practical book empowers you to build your own custom application! Get to know the inner details of ArcGIS Runtime SDK from our experts, in this book written by Ron Vincent, with 24 years' experience in the GIS industry and many in GIS training. Who This Book Is For This book caters to long-term users of Esri’s technologies that are new to mobile development or are transitioning from older Esri technologies such as ArcGIS Engine. It is also for users who are unfamiliar with Esri or GIS and are in need of a mapping solution for either their desktop or a mobile platform, or both. The book requires knowledge of .NET. What You Will Learn Understand and implement the MVVM pattern using MVVM Light Create and add layers from offline and online resources such as ArcGIS Online or ArcGIS for Server Create a 2D or 3D map and decide what kind of symbology to use Symbolize the layers based on the geometry Search and find objects in the layers Geocode an address and create a route using an address Edit layer objects from online content and offline content Test the application using test-driven development and then build and release the application for the intended audience In Detail ArcGIS is a geographic information system (GIS) that enables you to work with maps and geographic information. It can be used to create and utilize maps, compile geographic data, analyze mapped information, share and discover geographic information and manage geographic information in a database. This book starts by showing you where ArcGIS Runtime fits within Esri’s overall platform strategy. You'll create an initial map using the SDK, then use it to get an understanding of the MVVM model. You'll find out about the different kinds of layers and start adding layers, and you'll learn to transform maps into a 3D scene. The next chapters will help you comprehend and extract information contained in the maps using co-ordinates and layer objects. Towards the end, you will learn to set the symbology, decide whether to use 2D or 3D, see how to implement 2D or 3D, and learn to search and find objects. You'll also get to grips with many other standard features of the Application Programming Interface (API), including create applications and finally testing, licensing, and deploying them. Once completed, you will be able to meet most of the common requirements of any mapping application for desktop or mobile platforms. Style and approach This comprehensive book takes a completely practical approach, where every chapter explains the important concepts and demonstrates a practical application of them in a hands-on manner.
CISSP in 21 Days - Second Edition
CISSP in 21 Days - Second Edition
M. L. Srinivasan
¥80.65
Boost your confidence and get the competitive edge you need to crack the exam in just 21 days! About This Book Day-by-day plan to study and assimilate core concepts from CISSP CBK Revise and take a mock test at the end of every four chapters A systematic study and revision of myriad concepts to help you crack the CISSP examination Who This Book Is For If you are a Networking professional aspiring to take the CISSP examination and obtain the coveted CISSP certification (considered to be the Gold Standard in Information Security personal certification), then this is the book you want. This book assumes that you already have sufficient knowledge in all 10 domains of the CISSP CBK by way of work experience and knowledge gained from other study books. What You Will Learn Review Exam Cram and Practice review questions to reinforce the required concepts Follow the day–by-day plan to revise important concepts a month before the CISSPexam Boost your time management for the exam by attempting the mock question paper Develop a structured study plan for all 10 CISSPdomains Build your understanding of myriad concepts in the Information Security domain Practice the full-blown mock test to evaluate your knowledge and exam preparation In Detail Certified Information Systems Security Professional (CISSP) is an internationally recognized and coveted qualification. Success in this respected exam opens the door to your dream job as a security expert with an eye-catching salary. But passing the final exam is challenging. Every year a lot of candidates do not prepare sufficiently for the examination, and fail at the final stage. This happens when they cover everything but do not revise properly and hence lack confidence. This simple yet informative book will take you through the final weeks before the exam with a day-by-day plan covering all of the exam topics. It will build your confidence and enable you to crack the Gold Standard exam, knowing that you have done all you can to prepare for the big day. This book provides concise explanations of important concepts in all 10 domains of the CISSP Common Body of Knowledge (CBK). Starting with Confidentiality, Integrity, and Availability, you will focus on classifying information and supporting assets. You will understand data handling requirements for sensitive information before gradually moving on to using secure design principles while implementing and managing engineering processes. You will understand the application of cryptography in communication security and prevent or mitigate strategies for network attacks. You will also learn security control requirements and how to assess their effectiveness. Finally, you will explore advanced topics such as automated and manual test result analysis and reporting methods. A complete mock test is included at the end to evaluate whether you're ready for the exam. This book is not a replacement for full study guides; instead, it builds on and reemphasizes concepts learned from them. Style and approach There are many overlapping concepts that are applicable to more than one security domain in the CISSP exam. Hence, the eight security domains are aligned in a logical order so as to cover the concepts in the most appropriate sequence in this guide. Each chapter provides an illustration in the form of a flow diagram at the start to supply an overall view of the concepts covered in that chapter. This will facilitate a bird's-eye view of the chapter contents and the core security concepts covered. You can refer to this book throughout while preparing for the test or most importantly systematically revise the eight domains on a day-by-day basis up to one month before the exam. Hence the chapters are divided into 21 convenient days.
Learning Embedded Android N Programming
Learning Embedded Android N Programming
Ivan Morgillo,Stefano Viola,
¥80.65
Create the perfectly customized system by unleashing the power of Android OS on your embedded device About This Book Understand the system architecture and how the source code is organized Explore the power of Android and customize the build system Build a fully customized Android version as per your requirements Who This Book Is For If you are a Java programmer who wants to customize, build, and deploy your own Android version using embedded programming, then this book is for you. What You Will Learn Master Android architecture and system design Obtain source code and understand the modular organization Customize and build your first system image for the Android emulator Level up and build your own Android system for a real-world device Use Android as a home automation and entertainment system Tailor your system with optimizations and add-ons Reach for the stars: look at the Internet of Things, entertainment, and domotics In Detail Take a deep dive into the Android build system and its customization with Learning Embedded Android Programming, written to help you master the steep learning curve of working with embedded Android. Start by exploring the basics of Android OS, discover Google’s “repo” system, and discover how to retrieve AOSP source code. You'll then find out to set up the build environment and the first AOSP system. Next, learn how to customize the boot sequence with a new animation, and use an Android “kitchen” to “cook” your custom ROM. By the end of the book, you'll be able to build customized Android open source projects by developing your own set of features. Style and approach This step-by-step guide is packed with various real-world examples to help you create a fully customized Android system with the most useful features available.
Mastering FreeSWITCH
Mastering FreeSWITCH
Anthony Minessale II,Giovanni Maruzzelli
¥80.65
Master the art of advanced VoIP and WebRTC communication with the most dynamic application server, FreeSWITCH About This Book Forget the hassle - make FreeSWITCH work for you Discover how FreeSWITCH integrates with a range of tools and APIs From high availability to IVR development use this book to become more confident with this useful communication software Who This Book Is For SysAdmins, VoIP engineers – whoever you are, whatever you’re trying to do, this book will help you get more from FreeSWITCH. What You Will Learn Get to grips with the core concepts of FreeSWITCH Learn FreeSWITCH high availability Work with SIP profiles, gateways, ITSPs, and Codecs optimization Implement effective security on your projects Master audio manipulation and recording Discover how FreeSWITCH works alongside WebRTC Build your own complex IVR and PBX applications Connect directly to PSTN/TDM Create your own FreeSWITCH module Trace SIP packets with the help of best open source tools Implement Homer Sipcapture to troubleshoot and debug all your platform traffic In Detail FreeSWITCH is one of the best tools around if you’re looking for a modern method of managing communication protocols through a range of different media. From real-time browser communication with the WebRTC API to implementing VoIP (voice over internet protocol), with FreeSWITCH you’re in full control of your projects. This book shows you how to unlock its full potential – more than just a tutorial, it’s packed with plenty of tips and tricks to make it work for you. Written by members of the team who actually helped build FreeSWITCH, it will guide you through some of the newest features of version 1.6 including video transcoding and conferencing. Find out how FreeSWITCH interacts with other tools and APIs, learn how to tackle common (and not so common) challenges ranging from high availability to IVR development and programming advanced PBXs. Great communication functionality begins with FreeSWITCH – find out how and get your project up and running today. Style and approach Find out how it works, then put your knowledge into practice - that's how this advanced FreeSWITCH guide has been designed to help you learn. You'll soon master FreeSWITCH and be confident using it in your projects.
Mastering Social Media Mining with Python
Mastering Social Media Mining with Python
Marco Bonzanini
¥80.65
Acquire and analyze data from all corners of the social web with Python About This Book Make sense of highly unstructured social media data with the help of the insightful use cases provided in this guide Use this easy-to-follow, step-by-step guide to apply analytics to complicated and messy social data This is your one-stop solution to fetching, storing, analyzing, and visualizing social media data Who This Book Is For This book is for intermediate Python developers who want to engage with the use of public APIs to collect data from social media platforms and perform statistical analysis in order to produce useful insights from data. The book assumes a basic understanding of the Python Standard Library and provides practical examples to guide you toward the creation of your data analysis project based on social data. What You Will Learn Interact with a social media platform via their public API with Python Store social data in a convenient format for data analysis Slice and dice social data using Python tools for data science Apply text analytics techniques to understand what people are talking about on social media Apply advanced statistical and analytical techniques to produce useful insights from data Build beautiful visualizations with web technologies to explore data and present data products In Detail Your social media is filled with a wealth of hidden data – unlock it with the power of Python. Transform your understanding of your clients and customers when you use Python to solve the problems of understanding consumer behavior and turning raw data into actionable customer insights. This book will help you acquire and analyze data from leading social media sites. It will show you how to employ scientific Python tools to mine popular social websites such as Facebook, Twitter, Quora, and more. Explore the Python libraries used for social media mining, and get the tips, tricks, and insider insight you need to make the most of them. Discover how to develop data mining tools that use a social media API, and how to create your own data analysis projects using Python for clear insight from your social data. Style and approach This practical, hands-on guide will help you learn everything you need to perform data mining for social media. Throughout the book, we take an example-oriented approach to use Python for data analysis and provide useful tips and tricks that you can use in day-to-day tasks.
R for Data Science Cookbook
R for Data Science Cookbook
Yu-Wei, Chiu (David Chiu)
¥80.65
Over 100 hands-on recipes to effectively solve real-world data problems using the most popular R packages and techniques About This Book Gain insight into how data scientists collect, process, analyze, and visualize data using some of the most popular R packages Understand how to apply useful data analysis techniques in R for real-world applications An easy-to-follow guide to make the life of data scientist easier with the problems faced while performing data analysis Who This Book Is For This book is for those who are already familiar with the basic operation of R, but want to learn how to efficiently and effectively analyze real-world data problems using practical R packages. What You Will Learn Get to know the functional characteristics of R language Extract, transform, and load data from heterogeneous sources Understand how easily R can confront probability and statistics problems Get simple R instructions to quickly organize and manipulate large datasets Create professional data visualizations and interactive reports Predict user purchase behavior by adopting a classification approach Implement data mining techniques to discover items that are frequently purchased together Group similar text documents by using various clustering methods In Detail This cookbook offers a range of data analysis samples in simple and straightforward R code, providing step-by-step resources and time-saving methods to help you solve data problems efficiently. The first section deals with how to create R functions to avoid the unnecessary duplication of code. You will learn how to prepare, process, and perform sophisticated ETL for heterogeneous data sources with R packages. An example of data manipulation is provided, illustrating how to use the “dplyr” and “data.table” packages to efficiently process larger data structures. We also focus on “ggplot2” and show you how to create advanced figures for data exploration. In addition, you will learn how to build an interactive report using the “ggvis” package. Later chapters offer insight into time series analysis on financial data, while there is detailed information on the hot topic of machine learning, including data classification, regression, clustering, association rule mining, and dimension reduction. By the end of this book, you will understand how to resolve issues and will be able to comfortably offer solutions to problems encountered while performing data analysis. Style and approach This easy-to-follow guide is full of hands-on examples of data analysis with R. Each topic is fully explained beginning with the core concept, followed by step-by-step practical examples, and concluding with detailed explanations of each concept used.
Kali Linux 2 – Assuring Security by Penetration Testing - Third Edition
Kali Linux 2 – Assuring Security by Penetration Testing - Third Edition
Gerard Johansen,Lee Allen,Tedi Heriyanto
¥80.65
Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition! About This Book Get a rock-solid insight into penetration testing techniques and test your corporate network against threats like never before Formulate your pentesting strategies by relying on the most up-to-date and feature-rich Kali version in town—Kali Linux 2 (aka Sana). Experience this journey with new cutting-edge wireless penetration tools and a variety of new features to make your pentesting experience smoother Who This Book Is For If you are an IT security professional or a student with basic knowledge of Unix/Linux operating systems, including an awareness of information security factors, and you want to use Kali Linux for penetration testing, this book is for you. What You Will Learn Find out to download and install your own copy of Kali Linux Properly scope and conduct the initial stages of a penetration test Conduct reconnaissance and enumeration of target networks Exploit and gain a foothold on a target system or network Obtain and crack passwords Use the Kali Linux NetHunter install to conduct wireless penetration testing Create proper penetration testing reports In Detail Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in a successful penetration testing project engagement. Kali Linux – Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating cutting-edge hacker tools and techniques with a coherent, step-by-step approach. This book offers you all of the essential lab preparation and testing procedures that reflect real-world attack scenarios from a business perspective, in today's digital age. Style and approach This practical guide will showcase penetration testing through cutting-edge tools and techniques using a coherent, step-by-step approach.
Buildbox 2.x Game Development
Buildbox 2.x Game Development
Ty Audronis
¥80.65
Build rich, high production value mobile games and distribute them across different platforms with Buildbox About This Book Create captivating 2D & 2.5D (isometric) video games for all platforms Leverage Buildbox to monetize and prepare your games for distribution This step-by-step tutorial will get you generating complex and media rich games with no coding experience Who This Book Is For This book caters to those who have an interest or desire to create their own mobile games either as a hobbyist or who are looking to enhance their skills as a professional games developer. No coding experience is required. What You Will Learn Create the illusion of a 3D background in your game using parallax Add advanced controls and obstacles to our first world Develop assets (graphic and audio) for the Buildbox engine Design games based on the capabilities and limitations of Buildbox and their target platforms Compile and distribute video games on various channels such as Steam, iOS store, Android stores, and the Mac App Store Optimize your games to get the absolute best quality within platform restrictions Conquer common issues experienced with Buildbox development In Detail Buildbox is an “any skill level” development platform to develop video games with no coding experience. It also exports these games to be compiled for any platform (from Windows to Mac to iOS to Android and Blackberry) all using the same graphic user interface. Using an example as a tutorial, we will relate the driving principles and you’ll see how you can implement these principles to develop any games on the platform. We begin by setting expectations and providing a brief overview of the software. But it’s not long before you “dive in” to creating your first video game. You will actually have a playable level (“world”) by the end of the second chapter. Later on, you’ll learn everything from basic graphics creation to advanced world design while you refine your first game, called “Ramblin’ Rover.” All along the way, you will see how certain functions could be used in tandem to create other types of games; hoping to spark imagination. We will follow the principles and process of monetization through ads and in-game rewards. Lastly, we will go through the process of exporting, compiling, and preparing your storefront to sell the games you will eventually create. Style and approach This book follows a tutorial-based approach that teaches through examples, while also providing the necessary principles to enable you to abstract these principles into any game you want to make.
Hadoop Blueprints
Hadoop Blueprints
Anurag Shrivastava,Tanmay Deshpande
¥80.65
Use Hadoop to solve business problems by learning from a rich set of real-life case studies About This Book Solve real-world business problems using Hadoop and other Big Data technologies Build efficient data lakes in Hadoop, and develop systems for various business cases like improving marketing campaigns, fraud detection, and more Power packed with six case studies to get you going with Hadoop for Business Intelligence Who This Book Is For If you are interested in building efficient business solutions using Hadoop, this is the book for you This book assumes that you have basic knowledge of Hadoop, Java, and any *ing language. What You Will Learn Learn about the evolution of Hadoop as the big data platform Understand the basics of Hadoop architecture Build a 360 degree view of your customer using Sqoop and Hive Build and run classification models on Hadoop using BigML Use Spark and Hadoop to build a fraud detection system Develop a churn detection system using Java and MapReduce Build an IoT-based data collection and visualization system Get to grips with building a Hadoop-based Data Lake for large enterprises Learn about the coexistence of NoSQL and In-Memory databases in the Hadoop ecosystem In Detail If you have a basic understanding of Hadoop and want to put your knowledge to use to build fantastic Big Data solutions for business, then this book is for you. Build six real-life, end-to-end solutions using the tools in the Hadoop ecosystem, and take your knowledge of Hadoop to the next level. Start off by understanding various business problems which can be solved using Hadoop. You will also get acquainted with the common architectural patterns which are used to build Hadoop-based solutions. Build a 360-degree view of the customer by working with different types of data, and build an efficient fraud detection system for a financial institution. You will also develop a system in Hadoop to improve the effectiveness of marketing campaigns. Build a churn detection system for a telecom company, develop an Internet of Things (IoT) system to monitor the environment in a factory, and build a data lake – all making use of the concepts and techniques mentioned in this book. The book covers other technologies and frameworks like Apache Spark, Hive, Sqoop, and more, and how they can be used in conjunction with Hadoop. You will be able to try out the solutions explained in the book and use the knowledge gained to extend them further in your own problem space. Style and approach This is an example-driven book where each chapter covers a single business problem and describes its solution by explaining the structure of a dataset and tools required to process it. Every project is demonstrated with a step-by-step approach, and explained in a very easy-to-understand manner.
Practical XMPP
Practical XMPP
Lloyd Watkin,David Koelle
¥80.65
Unleash the power of XMPP in order to build exciting, real-time, federated applications based on open standards in a secure and highly scalable fashion About This Book Learn about the fundamentals of XMPP and be able to work with the core functionality both server-side and in the browser Build a simple 1-to-1 chat (the “Hello World” of XMPP), explore multi-user chat, publish subscribe systems, and work with a decentralized social network Author Lloyd Watkins is a member of the XMPP standards committee Who This Book Is For If you want to learn about the fundamentals of XMPP, be able to work with the core functionality both server-side and in the browser then this book is for you.No knowledge of XMPP is required, or of TCP/IP networking. It's important that you already know how to build applications of some form, and are looking get a better understanding of how to implement XMPP for one or more of its many uses. You should be interested in the decentralized web, know HTML, and likely know JavaScript and NodeJS. You will probably know JSON, and hopefully XML (this is the native output of XMPP). What You Will Learn Install and configure an XMPP server and use it to connect from a traditional desktop client and send a message Build a simple server-side application that will respond to messages from our logged in desktop client Install and run XMPP-FTW, connect to the server from the browser, and handle incoming/outgoing messages Connect to a multi-user chat room, send/receive stanzas, add a room password, join a protected room, set the room’s subject, and change a user's affiliation Get to grips with the publish-subscribe extension of XMPP and use it to build a pusher system that can make any website real-time Build a simple XMPP component and create an extension for XMPP-FTW that allows you to use your own custom format Build an XMPP version of the classic game “Pong” In Detail XMPP (eXtensible Messaging and Presence Protocol) is a messaging protocol that enables communication between two or more devices via the Internet. With this book, developers will learn about the fundamentals of XMPP, be able to work with the core functionality both server-side and in the browser, as well as starting to explore several of the protocol extensions. You will not only have a solid grasp of XMPP and how it works, but will also be able to use the protocol to build real-world applications that utilize the power of XMPP. By the end of this book, you will know more about networking applications in general, and have a good understanding of how to extend XMPP, as well as using it in sample applications. Style and approach Through a number of hands-on projects, this book shows you how to build usable applications that highlights a feature of XMPP.
Kali Linux Intrusion and Exploitation Cookbook
Kali Linux Intrusion and Exploitation Cookbook
Ishan Girdhar,Dhruv Shah
¥80.65
Over 70 recipes for system administrators or DevOps to master Kali Linux 2 and perform effective security assessments About This Book ?Set up a penetration testing lab to conduct a preliminary assessment of attack surfaces and run exploits ?Improve your testing efficiency with the use of automated vulnerability scanners ?Work through step-by-step recipes to detect a wide array of vulnerabilities, exploit them to analyze their consequences, and identify security anomalies Who This Book Is For This book is intended for those who want to know more about information security. In particular, it's ideal for system administrators and system architects who want to ensure that the infrastructure and systems they are creating and managing are secure. This book helps both beginners and intermediates by allowing them to use it as a reference book and to gain in-depth knowledge. What You Will Learn ?Understand the importance of security assessments over merely setting up and managing systems/processes ?Familiarize yourself with tools such as OPENVAS to locate system and network vulnerabilities ?Discover multiple solutions to escalate privileges on a compromised machine ?Identify security anomalies in order to make your infrastructure secure and further strengthen it ?Acquire the skills to prevent infrastructure and application vulnerabilities ?Exploit vulnerabilities that require a complex setup with the help of Metasploit In Detail With the increasing threats of breaches and attacks on critical infrastructure, system administrators and architects can use Kali Linux 2.0 to
AWS Administration Cookbook
AWS Administration Cookbook
Lucas Chan
¥80.65
Amazon Web Services (AWS) is a bundled remote computing service that provides cloud computing infrastructure over the Internet with storage, bandwidth, and customized support for application programming interfaces (API). Implementing these services to efficiently administer your cloud environments is a core task. This book will help you build and administer your cloud environment with AWS. We'll begin with the AWS fundamentals, and you'll build the foundation for the recipes you'll work on throughout the book. Next, you will find out how to manage multiple accounts and set up consolidated billing. You will then learn to set up reliable and fast hosting for static websites, share data between running instances, and back up your data for compliance. Moving on, you will find out how to use the compute service to enable consistent and fast instance provisioning, and will see how to provision storage volumes and autoscale an application server. Next, you'll discover how to effectively use the networking and database service of AWS. You will also learn about the different management tools of AWS along with securing your AWS cloud. Finally, you will learn to estimate the costs for your cloud. By the end of the book, you will be able to easily administer your AWS cloud. What you will learn ?Discover the best practices to achieve an automated repeatable infrastructure in AWS ?Bring down your IT costs by managing AWS successfully and deliver high availability, fault tolerance, and scalability ?Make any website faster with static and dynamic caching ?Create monitoring and alerting dashboards using CloudWatch ?Migrate a database to AWS ?Set up consolidated billing to achieve simple and effective cost management with accounts ?Host a domain and find out how you can automate health checks About the Author Lucas Chan has been working in tech since 1995 in a variety of development, systems admin, and DevOps roles. He is currently a senior consultant and engineer at Versent and technical director at Stax. He's been running production workloads on AWS for over 10 years. He's also a member of the APAC AWS warriors program and holds all five of the available AWS certifications. Rowan Udell has been working in development and operations for 15 years. He has held a variety of positions, such as SRE, frontend developer, backend developer, consultant, technical lead, and team leader. His travels have seen him work in start-ups and enterprises in the finance, education, and web industries in Australia and Canada. He currently works as a senior consultant with Versent, an AWS Advanced Partner in Sydney. He specializes in serverless applications and architectures on AWS, and contributes actively in the Serverless Framework community.
Learning Apache Cassandra - Second Edition
Learning Apache Cassandra - Second Edition
Sandeep Yarabarla
¥80.65
Cassandra is a distributed database that stands out thanks to its robust feature set and intuitive interface, while providing high availability and scalability of a distributed data store. This book will introduce you to the rich feature set offered by Cassandra, and empower you to create and manage a highly scalable, performant and fault-tolerant database layer. The book starts by explaining the new features implemented in Cassandra 3.x and get you set up with Cassandra. Then you'll walk through data modeling in Cassandra and the rich feature set available to design a flexible schema. Next you'll learn to create tables with composite partition keys, collections and user-defined types and get to know different methods to avoid denormalization of data. You will then proceed to create user-defined functions and aggregates in Cassandra. Then, you will set up a multi node cluster and see how the dynamics of Cassandra change with it. Finally, you will implement some application-level optimizations using a Java client. By the end of this book, you'll be fully equipped to build powerful, scalable Cassandra database layers for your applications. What you will learn ?Install Cassandra ?Create keyspaces and tables with multiple clustering columns to organize related data ?Use secondary indexes and materialized views to avoid denormalization of data
Game Development Patterns and Best Practices
Game Development Patterns and Best Practices
John P. Doran
¥80.65
Utilize proven solutions to solve common problems in game development About This Book ?Untangle your game development workflow, make cleaner code, and create structurally solid games ?Implement key programming patterns that will enable you to make efficient AI and remove duplication ?Optimize your game using memory management techniques Who This Book Is For If you are a game developer who wants to solve commonly-encountered issues or have some way to communicate to other developers in a standardized format, then this book is for you. Knowledge of basic game programming principles and C++ programming is assumed. What You Will Learn ?Learn what design patterns are and why you would want to use them ?Reduce the maintenance burden with well-tested, cleaner code ?Employ the singleton pattern effectively to reduce your compiler workload ?Use the factory pattern to help you create different objects with the same creation logic and reduce coding time ?Improve game performance with Object Pools ?Allow game play to interact with physics or graphics in an abstract way ?Refractor your code to remove common code smells In Detail You've learned how to program, and you've probably created some simple games at some point, but now you want to build larger projects and find out how to resolve your problems. So instead of a coder, you might now want to think like a game developer or software engineer. To organize your code well, you need certain tools to do so, and that's what this book is all about. You will learn techniques to
Building Blockchain Projects
Building Blockchain Projects
Narayan Prusty
¥80.65
Key Features ?Create powerful, end-to-end applications for Blockchain using Ethereum ?Write your first program using the Solidity programming language ?Change the way you think and design your applications by using the all new database-Blockchain Book De*ion Blockchain is a decentralized ledger that maintains a continuously growing list of data records that are secured from tampering and revision. Every user is allowed to connect to the network, send new transactions to it, verify transactions, and create new blocks, making it permission-less. This book will teach you what Blockchain is, how it maintains data integrity, and how to create real-world Blockchain projects using Ethereum. With interesting real-world projects, you will learn how to write smart contracts which run exactly as programmed without any chance of fraud, censorship, or third-party interference, and build end-to-end applications for Blockchain. You will learn about concepts such as cryptography in cryptocurrencies, ether security, mining , smart contracts, solidity, and more. You will also learn about web sockets, various API services for Ethereum, and much more. The blockchain is the main technical innovation of bitcoin, where it serves as the public ledger for bitcoin transactions. What you will learn ?Walk through the basics of the Blockchain technology ?Implement Blockchain's technology and its features, and see what can be achieved using them ?Build DApps using Solidity and Web3.js ?Understand the geth command and cryptography ?Create Ethereum wallets ?Explore consortium blockchain
ServiceNow IT Operations Management
ServiceNow IT Operations Management
Ajaykumar Guggilla
¥80.65
Align your business requirements with IT by implementing ServiceNow IT Operations with ease. About This Book ?Written to the latest specification, it will cover basic to advanced concepts and architecture. ?Take a service-centric approach to operations management and consolidate all your resource data into a single system IT record. ?Beat the key challenge of managing multiple business operations (even running globally) over a complex IT infrastructure and see immediate results. Who This Book Is For The book is aimed at System administrators, IT operations and IT managers who plan to implement ServiceNow IT Operations Management for their organization. They have no knowledge of ServiceNow ITOM. What You Will Learn ?Step by step guide in setting up each features with in ServiceNow ITOM ?Install and configure the required application or plugin ?Integrate with other provider services as deemed appropriate ?Explore Orchestration capabilities and how to analyze the data ?Learn about the ServiceNow graphical interface ?Integrate with other applications within ServiceNow ?Aims to cover the fundamentals concepts to advanced concepts ?Best practices and advanced features In Detail ServiceNow ITOM enables infrastructure and processes to be managed in a highly automated manner. It contains various segments that ensure its applications and enterprise infrastructures are optimized for high performance and helps in creating a lean and agile organization through service-level visibility and automation. This book will be a
VMware Horizon View High Availability
VMware Horizon View High Availability
Andrew Alloway
¥80.65
Design, develop and deploy a highly available vSphere environment for VMware Horizon View About This Book Enhance your capability of meeting various Service Level Agreements in VMware Horizon View Get acquainted through all the necessary considerations for building a View environment Cover VMware High Availability hurdle by hurdle along with the checklists for verification of the environment being ready for production Who This Book Is For If you manage, plan or deploy VMware Horizon View or are looking for tips for best practices and configuration details this book is for you. This book is intended for administrators who design and deploy VMware Horizon View or administrators who are looking for ways to improve their existing View environment. What You Will Learn Install and configure a VMware Horizon View Connection Server and redundant pair Discover the networking requirements for View and learn how to build redundancy into your network Analyze each of the View user pool types and how each one can be made highly available and survivable. Get to know about storage protocols such as NFS, iSCSI and Fibre Channel Deploy Virtual SAN, and find out how to effectively couple Virtual SAN with View Learn about View monitoring tools to allow fast responses to various crises Plan, analyze and upgrade VMware Horizon View Analyze network services required for VMware Horizon View and build them in a redundant manner In Detail The increasing movement to virtualize workloads and workstations has put VMware Horizon View into a central mission critical role in many environments. Administrators may be overwhelmed with planning for outages and dealing with failure scenarios. It’s easy to miss small details that will result in outages down the road. Following VMware Horizon View best practices and planning ahead with network infrastructure will allow you to avoid these common pit falls. This book will walk you through the setup and configuration of View in a highly available configuration. It will provide you with the skills to analyze and deploy configurations that can stand up to rigorous failure standards. The book starts with deploying and basic configuration of VMware Horizon View in a redundant setup, then moves on to cover high availability for networking, fibre channel, NFS, and iSCSI. We finish this book with monitoring and upgrade planning. At the end we also learn about maintaining the uptime and minimizing the downtime that can be caused due to various factors. Each topic comes with a list of best practices and failure scenarios to test. Administrators will learn the intricacies of protecting a View environment. Style and approach This book provides configuration and installation steps for administration and installation of a Horizon View server. It includes high-level overviews of any protocols, services used by Horizon View, and best practices and high availability checklists for each chapter.
Building an FPS Game with Unity
Building an FPS Game with Unity
John P. Doran
¥80.65
Create a high-quality first person shooter game using the Unity game engine and the popular UFPS and Probuilder frameworksAbout This BookLearn how to use Unity in conjunction with UFPS and ProBuilder to create a high-quality game quicklyCreate both interior and exterior environmentsA step-by step guide to building a project with clear examples and instructions to create a number of interesting scenarios Who This Book Is For This book is for those who want to create an FPS game in Unity and gain knowledge on how to customize it to be their very own. If you are familiar with the basics of Unity, you will have an easier time, but it should make it possible for someone with no prior experience to learn Unity at an accelerated pace.What You Will LearnUse UFPS to build custom weapons with custom meshes and behaviorsExplore level design as you prototype levels, making use of Prototype to build levels out quicklyBuild environments that are realistic as possible while keeping peak performance and repetitiveness downReview tips and tricks on how to create environments using both terrain for outdoor areas and a modular workflow for interiorsDevelop a number of different encounters that your players can fight against, from a simple turret enemy to complex AI characters from Shooter AIDiscover how to create unique objects such as exploding barrels and objects you can interact withCreate a custom GUI to help your game stand out from the crowdPackage your game for release, create an installer, and get your game out into the world In Detail Unity, available in free and pro versions, is one of the most popular third-party game engines available. It is a cross-platform game engine, making it easy to write your game once and then port it to PC, consoles, and even the web, making it a great choice for both indie and AAA developers. Building an FPS Game in Unity takes readers on an exploration of how to use Unity to create a 3D first person shooter (FPS) title, leveraging the powerful UFPS framework by VisionPunk and Prototype/ProBuilder 2.0 by ProCore3D. After some setting up, you will start by learning how to create custom weapons, prototype levels, create exterior and interior environments, and breathe life into our levels. We will then add polish to the levels. Finally, we will create a custom GUI and menus for our title to create a complete package.Style and approach An easy-to-follow guide with each project containing step-by-step explanations, diagrams, screenshots, and downloadable material. Concepts in Unity and C# are explained as they are used and for the more inquisitive, there are more details on the concepts used with additional external resources to learn from.