The third edition of Understanding the Linux Kernel takes you on a guided tour of the most significant data structures, algorithms, and programming tricks used in the kernel. Probing beyond superficial features, the authors offer valuable insights to people who want to know how things really work inside their machine. Important Intel-specific features are discussed. Relevant segments of code are dissected line by line. But the book covers more than just the functioning of the code; it explains the theoretical underpinnings of why Linux does things the way it does.
This edition of the book covers Version 2.6, which has seen significant changes to nearly every kernel subsystem, particularly in the areas of memory management and block devices. The book focuses on the following topics:Memory management, including file buffering, process swapping, and Direct memory Access (DMA) The Virtual Filesystem layer and the Second and Third Extended FilesystemsProcess creation and schedulingSignals, interrupts, and the essential interfaces to device driversTimingSynchronization within the kernelInterprocess Communication (IPC) Program execution
Understanding the Linux Kernel will acquaint you with all the inner workings of Linux, but it's more than just an academic exercise. You'll learn what conditions bring out Linux's best performance, and you'll see how it meets the challenge of providing good system response during process scheduling, file access, and memory management in a wide variety of environments. This book will help you make the most of your Linux system.
Best-selling author Adam Freeman explains how to get the most from AngularJS. He begins by describing the MVC pattern and the many benefits that can be gained from separating your logic and presentation code. He then shows how you can use AngularJS's features within in your projects to produce professional-quality results. Starting from the nuts-and-bolts and building up to the most advanced and sophisticated features AngularJS is carefully unwrapped, going in-depth to give you the knowledge you need.
Each topic is covered clearly and concisely and is packed with the details you need to learn to be truly effective. The most important features are given a no-nonsense in-depth treatment and chapters include common problems and details of how to avoid them.
Whether you're an aspiring manager, a current manager, or just wondering what the heck a manager does all day, there is a story in this book that will speak to you.
It’s called the blockchain.
The first generation of the digital revolution brought us the Internet of information. The second generation—powered by blockchain technology—is bringing us the Internet of value: a new, distributed platform that can help us reshape the world of business and transform the old order of human affairs for the better.
Blockchain is the ingeniously simple, revolutionary protocol that allows transactions to be simultaneously anonymous and secure by maintaining a tamperproof public ledger of value. Though it’s the technology that drives bitcoin and other digital currencies, the underlying framework has the potential to go far beyond these and record virtually everything of value to humankind, from birth and death certificates to insurance claims and even votes.
Why should you care? Maybe you’re a music lover who wants artists to make a living off their art. Or a consumer who wants to know where that hamburger meat really came from. Perhaps you’re an immigrant who’s sick of paying big fees to send money home to loved ones. Or an entrepreneur looking for a new platform to build a business.
And those examples are barely the tip of the iceberg. This technology is public, encrypted, and readily available for anyone to use. It’s already seeing widespread adoption in a number of areas. For example, forty-two (and counting) of the world’s biggest financial institutions, including Goldman Sachs, JPMorgan Chase, and Credit Suisse, have formed a consortium to investigate the blockchain for speedier and more secure transactions.
As with major paradigm shifts that preceded it, the blockchain will create winners and losers. And while opportunities abound, the risks of disruption and dislocation must not be ignored.
Don Tapscott, the bestselling author of Wikinomics, and his son, blockchain expert Alex Tapscott, bring us a brilliantly researched, highly readable, and utterly foundational book about the future of the modern economy. Blockchain Revolution is the business leaders’ playbook for the next decade and beyond.
Each chapter is written with recruitment relevance in mind, and includes Interview questions and further techniques to help match candidates to jobs.
This is a hugely significant work for the IT recruitment industry, but do not be daunted (those of you who are squeamish about IT jargon and terminology). Those who have attended Ayub's training will immediately relate to the uniquely simple, passionate and even humorous ways in which he puts across very complex IT concepts and principals. And his now famous easy-to-understand teaching style continues into this ground breaking book. IT knowledge is delivered in a reassuring and relaxed way; and the stories, trivia, and anecdotes flow throughout.
This is an instruction manual like no other. With The Complete IT Recruitment Survival Guide you have a constant, easy-to-understand yet knowledgeable companion as you tackle the murky waters of the world of IT recruitment.
It will show you how to use drag-and-drop visual programming for designing and building fully functional mobile apps for Android using MIT (Massachusetts Institute of Technology) App Inventor 2.
Absolute App Inventor 2 book will take you beyond basic tutorials and will cover concepts that will help you to become a better mobile App Inventor.If you are new to programming or App Inventor, then this book will show you how to properly start-off designing and developing mobile apps and will then gradually take you through understanding more advanced concepts. If you have already used App Inventor, use this book to learn about optimization, DRY principle, design patterns and concepts that will teach you how to design & develop apps that will run more efficiently and to learn about concepts that have not been covered in other App Inventor books.
The book covers good programming designs using DRY (Don’t Repeat Yourself) Principle by using App Inventor Procedures. The book also covers how to use proper abstraction and produce much cleaner code through use of App Inventor Advanced “Any Component”.
This book invites you to accompany new CIO Jim Barton to better understand the role of IT in your organization. You'll see Jim struggle through a challenging first year, handling (and fumbling) situations that, although fictional, are based on true events.
You can read this book from beginning to end, or treat is as a series of cases. You can also skip around to address your most pressing needs. For example, need to learn about crisis management and security? Read chapters 10-12. You can formulate your own responses to a CIO's obstacles by reading the authors' regular "Reflection" questions.
You'll turn to this book many times as you face IT-related issues in your own career.
Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many technical changes in the field.
After a basic overview of cryptography and what it means today, this indispensable resource covers such topics as block ciphers, block modes, hash functions, encryption modes, message authentication codes, implementation issues, negotiation protocols, and more. Helpful examples and hands-on exercises enhance your understanding of the multi-faceted field of cryptography.An author team of internationally recognized cryptography experts updates you on vital topics in the field of cryptography Shows you how to build cryptography into products from the start Examines updates and changes to cryptography Includes coverage on key servers, message security, authentication codes, new standards, block ciphers, message authentication codes, and more
Cryptography Engineering gets you up to speed in the ever-evolving field of cryptography.
Practical Node.js is your step-by-step guide to learning how to build a wide range of scalable real-world web applications using a professional development toolkit. Node.js is an innovative and highly efficient platform for creating web services. But Node.js doesn't live in a vacuum! In a modern web development, many different components need to be put together — routing, database driver, ORM, session management, OAuth, HTML template engine, CSS compiler and many more.
If you already know the basics of Node.js, now is the time to discover how to bring it to production level by leveraging its vast ecosystem of packages. As a web developer, you'll work with a varied collection of standards and frameworks - Practical Node.js shows you how all those pieces fit together.
Practical Node.js takes you from installing all the necessary modules to writing full-stack web applications by harnessing the power of the Express.js and Hapi frameworks, the MongoDB database with Mongoskin and Mongoose, Jade and Handlebars template engines, Stylus and LESS CSS languages, OAuth and Everyauth libraries, and the Socket.IO and Derby libraries, and everything in between. The book also covers how to deploy to Heroku and AWS, daemonize apps, and write REST APIs. You'll build full-stack real-world Node.js apps from scratch, and also discover how to write your own Node.js modules and publish them on NPM. You already know what Node.js is; now learn what you can do with it and how far you can take it!
THE GOOGLE STORY is the definitive account of the populist media company powered by the world’s most advanced technology that in a few short years has revolutionized access to information about everything for everybody everywhere.
In 1998, Moscow-born Sergey Brin and Midwest-born Larry Page dropped out of graduate school at Stanford University to, in their own words, “change the world” through a search engine that would organize every bit of information on the Web for free.
While the company has done exactly that in more than one hundred languages, Google’s quest continues as it seeks to add millions of library books, television broadcasts, and more to its searchable database.
Readers will learn about the amazing business acumen and computer wizardry that started the company on its astonishing course; the secret network of computers delivering lightning-fast search results; the unorthodox approach that has enabled it to challenge Microsoft’s dominance and shake up Wall Street. Even as it rides high, Google wrestles with difficult choices that will enable it to continue expanding while sustaining the guiding vision of its founders’ mantra: DO NO EVIL."
From the Hardcover edition.
Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class.
This book is an ideal resource for security consultants, beginning InfoSec professionals, and students.Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases.Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University.Utilizes the Kali Linux distribution and focuses on the seminal tools required to complete a penetration test.
But how does one exactly do data science? Do you have to hire one of these priests of the dark arts, the "data scientist," to extract this gold from your data? Nope.
Data science is little more than using straight-forward steps to process raw data into actionable insight. And in Data Smart, author and data scientist John Foreman will show you how that's done within the familiar environment of a spreadsheet.
Why a spreadsheet? It's comfortable! You get to look at the data every step of the way, building confidence as you learn the tricks of the trade. Plus, spreadsheets are a vendor-neutral place to learn data science without the hype.
But don't let the Excel sheets fool you. This is a book for those serious about learning the analytic techniques, the math and the magic, behind big data.
Each chapter will cover a different technique in a spreadsheet so you can follow along:Mathematical optimization, including non-linear programming and genetic algorithms Clustering via k-means, spherical k-means, and graph modularity Data mining in graphs, such as outlier detection Supervised AI through logistic regression, ensemble models, and bag-of-words models Forecasting, seasonal adjustments, and prediction intervals through monte carlo simulation Moving from spreadsheets into the R programming language
You get your hands dirty as you work alongside John through each technique. But never fear, the topics are readily applicable and the author laces humor throughout. You'll even learn what a dead squirrel has to do with optimization modeling, which you no doubt are dying to know.
The potential user base and the wide array of available high-performance devices makes Android an attractive target for aspiring game developers. Do you have an awesome idea for the next break-through mobile gaming title? Beginning Android Games will help you kick-start your project. This book will guide you through the process of making several example game apps using APIs available in new Android SDK and earlier SDK releases for Android smartphones and tablets:The fundamentals of game development and design suitable for Android smartphones and tablets The Android platform basics to apply those fundamentals in the context of making a game, including new File Manager system and better battery life management The design of 2D and 3D games and their successful implementation on the Android platform
This book lets developers see and use some Android SDK Jelly Bean; however, this book is structured so that app developers can use earlier Android SDK releases. This book is backward compatible like the Android SDK.
Google BigQuery Analytics is the perfect guide for business and data analysts who want the latest tips on running complex queries and writing code to communicate with the BigQuery API. The book uses real-world examples to demonstrate current best practices and techniques, and also explains and demonstrates streaming ingestion, transformation via Hadoop in Google Compute engine, AppEngine datastore integration, and using GViz with Tableau to generate charts of query results. In addition to the mechanics of BigQuery, the book also covers the architecture of the underlying Dremel query engine, providing a thorough understanding that leads to better query results.Features a companion website that includes all code and data sets from the book Uses real-world examples to explain everything analysts need to know to effectively use BigQuery Includes web application examples coded in Python
Compare distributed apps (dapps) to web apps
Write Ethereum smart contracts in Solidity
Deploy your own dapp, coin, and blockchain
Work with basic and intermediate smart contracts
Who This Book Is For
Experts will find the advanced sample projects in this book rewarding because of the power of Solidity
The book lays a heavy emphasis on open source tools and step-by-step examples and includes information about Android applications needed for forensic investigations. It is organized into seven chapters that cover the history of the Android platform and its internationalization; the Android Open Source Project (AOSP) and the Android Market; a brief tutorial on Linux and Android forensics; and how to create an Ubuntu-based virtual machine (VM). The book also considers a wide array of Android-supported hardware and device types, the various Android releases, the Android software development kit (SDK), the Davlik VM, key components of Android security, and other fundamental concepts related to Android forensics, such as the Android debug bridge and the USB debugging setting. In addition, it analyzes how data are stored on an Android device and describes strategies and specific utilities that a forensic analyst or security engineer can use to examine an acquired Android device.
Core Android developers and manufacturers, app developers, corporate security officers, and anyone with limited forensic experience will find this book extremely useful. It will also appeal to computer forensic and incident response professionals, including commercial/private sector contractors, consultants, and those in federal government.Named a 2011 Best Digital Forensics Book by InfoSec ReviewsAbility to forensically acquire Android devices using the techniques outlined in the bookDetailed information about Android applications needed for forensics investigationsImportant information about SQLite, a file based structured data storage relevant for both Android and many other platforms.
Android game app development continues to be one of the hottest areas where indies and existing game app developers seem to be most active. Android is the second best mobile apps eco and arguably even a hotter game apps eco than iOS. 3D makes your games come alive; so in this book you'll find that we go in depth on creating 3D games for the Android platform with OpenGL ES 2.0 using an original case study game called Drone Grid.
Moreover, this book offers an extensive case study with code that will be modular and re-useable helping you create your own games using advanced vertex and fragment shaders. Drone Grid is a game app case study that is somewhat similar to the best selling Geometry Wars game series utilizing a gravity grid and colorful abstract graphics and particles.
After reading and using this book, you'll be able to build your first 3D Android game app for smartphones and tablets. You may even be able to upload and sell from popular Android app stores like Google Play and Amazon Appstore.
The first edition of Ralph Kimball's The Data Warehouse Toolkit introduced the industry to dimensional modeling, and now his books are considered the most authoritative guides in this space. This new third edition is a complete library of updated dimensional modeling techniques, the most comprehensive collection ever. It covers new and enhanced star schema dimensional modeling patterns, adds two new chapters on ETL techniques, includes new and expanded business matrices for 12 case studies, and more.Authored by Ralph Kimball and Margy Ross, known worldwide as educators, consultants, and influential thought leaders in data warehousing and business intelligence Begins with fundamental design recommendations and progresses through increasingly complex scenarios Presents unique modeling techniques for business applications such as inventory management, procurement, invoicing, accounting, customer relationship management, big data analytics, and more Draws real-world case studies from a variety of industries, including retail sales, financial services, telecommunications, education, health care, insurance, e-commerce, and more
Design dimensional databases that are easy to understand and provide fast query response with The Data Warehouse Toolkit: The Definitive Guide to Dimensional Modeling, 3rd Edition.
Ten different projects illustrate the concepts introduced in the book. You will learn how to create a P2P file-sharing application and a web-based bulletin board, and how to remotely edit web-based documents and create games. Author Magnus Lie Hetland is an authority on Python and previously authored Practical Python. He also authored the popular online guide, Instant Python Hacking, on which both books are based.
Author Susan Snedaker shares her expertise with you, including the most current options for disaster recovery and communication, BCDR for mobile devices, and the latest infrastructure considerations including cloud, virtualization, clustering, and more. Snedaker also provides you with new case studies in several business areas, along with a review of high availability and information security in healthcare IT.
Don’t be caught off guard—Business Continuity and Disaster Recovery for IT Professionals, 2nd Edition , is required reading for anyone in the IT field charged with keeping information secure and systems up and running.Complete coverage of the 3 categories of disaster: natural hazards, human-caused hazards, and accidental / technical hazardsExtensive disaster planning and readiness checklists for IT infrastructure, enterprise applications, servers and desktopsClear guidance on developing alternate work and computing sites and emergency facilities Actionable advice on emergency readiness and response Up-to-date information on the legal implications of data loss following a security breach or disaster
It offers a thorough explanation of how computer networks function, how they can be involved in crimes, and how they can be used as a source of evidence. In particular, it addresses the abuse of computer networks as well as privacy and security issues on computer networks.
This updated edition is organized into five parts. Part 1 is about digital forensics and covers topics ranging from the use of digital evidence in the courtroom to cybercrime law. Part 2 explores topics such as how digital investigations are conducted, handling a digital crime scene, and investigative reconstruction with digital evidence. Part 3 deals with apprehending offenders, whereas Part 4 focuses on the use of computers in digital investigation. The book concludes with Part 5, which includes the application of forensic science to networks.
New to this edition are updated information on dedicated to networked Windows, Unix, and Macintosh computers, as well as Personal Digital Assistants; coverage of developments in related technology and tools; updated language for search warrant and coverage of legal developments in the US impacting computer forensics; and discussion of legislation from other countries to provide international scope. There are detailed case examples that demonstrate key concepts and give students a practical/applied understanding of the topics, along with ancillary materials that include an Instructor's Manual and PowerPoint slides.
This book will prove valuable to computer forensic students and professionals, lawyers, law enforcement, and government agencies (IRS, FBI, CIA, CCIPS, etc.).Named The 2011 Best Digital Forensics Book by InfoSec ReviewsProvides a thorough explanation of how computers & networks function, how they can be involved in crimes, and how they can be used as evidence Features coverage of the abuse of computer networks and privacy and security issues on computer networks
You will learn how to use React completely, and learn best practices for creating interfaces in a composable way. You will also cover additional tools and libraries in the React ecosystem (such as React Router and Flux architecture). Each topic is covered clearly and concisely and is packed with the details you need to learn to be truly effective. The most important features are given no-nonsense, in-depth treatment, and every chapter details common problems and how to avoid them.
The next section is devoted to design patterns. These describe common problems and their solutions. The section describes the design principles that make patterns powerful. It covers many of the classic design patterns and includes chapters on enterprise and database patterns.
The last segment of the book covers the tools and practices that can help turn great code into a successful project. The section shows how to manage multiple developers and releases with git, how to build and install using Phing and PEAR. It also explores strategies for automated testing and build.
In addition to discussing the latest developments in build, test, and continuous integration, this section keeps pace with best practice in version control by focusing on Git, increasingly the developer's system of choice.
Taken together these three elements: object fundamentals, design principles, and best practice will help the reader develop elegant and rock solid systems.
PHP Objects and Patterns: Describes and demonstrates PHP's built-in object-oriented features Breaks down the principles of object-oriented design, explaining key design patterns using practical examples. Discusses the tools and practices necessary for developing, testing and deploying exemplary applications.
Odoo is a full-featured open source ERP with a focus on extensibility. The flexibility and sustainability of open source is also a key selling point of Odoo. It is built on a powerful framework for rapid application development, both for back-end applications and front-end websites.
The book starts by covering Odoo installation and administration, and provides a gentle introduction to application development. It then dives deep into several of the areas that an experienced developer will need to use. You'll learn implement business logic, adapt the UI, and extend existing features.Style and Approach
These practical and easy-to-follow recipes are presented step-by-step, with dozens of hands-on recipes to boost your Odoo skills. This book can also be used as a reference guide for your daily work.
This book bridges the gap that exists between purely technical books about the blockchain and purely business-focused books. It does so by explaining both the technical concepts that make up the blockchain and their role in business-relevant applications.
What You'll LearnWhat the blockchain is
Why it is needed and what problem it solves
Why there is so much excitement about the blockchain and its potential
Major components and their purpose
How various components of the blockchain work and interact
Limitations, why they exist, and what has been done to overcome them
Major application scenarios
Who This Book Is For
Everyone who wants to get a general idea of what blockchain technology is, how it works, and how it will potentially change the financial system as we know it
You will find The Essential Guide to HTML5 and CSS3 Web Design invaluable at any stage of your career, with its mixture of practical tutorials and reference material. Beginners will quickly pick up the basics, while more experienced web designers and developers will keep returning to the book again and again to read up on techniques they may not have used for a while, or to look up properties, attributes and other details. This book is destined to become a close friend, adopting a permanent place on your desk.
The Essential Guide to HTML5 and CSS3 Web Design starts off with a brief introduction to the web and web design, before diving straight in to HTML5 and CSS3 basics, reusing code, and other best practices you can adopt. The book then focuses on the most important areas of a successful web site: typography, images, navigation, tables, layouts, forms and feedback (including ready-made PHP scripts) and browser quirks, hacks and bugs.
The Essential Guide to HTML5 and CSS3 Web Design is completely up-to-date, covering support of the newest standards in all the latest browsers, including IE 9 and Firefox 4. The last chapter of the book provides several case studies to dissect and learn from, including all the most popular web site archetypes—a blog, a store front, a corporate home page, and an online gallery. You'll also appreciate several detailed reference appendices covering CSS, HTML, color references, entities, and more—any details you need to look up will be close at hand.
After completing the projects you will understand the core-concepts and implementation details of a typical 2D game engine and you will be familiar with a design and prototyping methodology you can use to create game levels and mechanics that are fun and engaging for players. You will gain insights into the many ways software design and creative design must work together to deliver the best game experiences, and you will have access to a versatile 2D game engine that you can expand upon or utilize directly to build your own 2D games that can be played online from anywhere.
• Assists the reader in understanding the core-concepts behind a 2D game engine
• Guides the reader in building a functional game engine based on these concepts
• Leads the reader in exploring the interplay between technical design and game experience design
• Teaches the reader how to build their own 2D games that can be played across internet via popular browsers
Until recently, ASP.NET MVC was regarded as an advanced technology only suitable for experienced developers with a strong knowledge of classic ASP.NET and C# coding behind them. This book overturns that prejudice and shows that the beautiful simplicity of ASP.NET MVC is just as suitable for novice developers venturing into real-world application design for the first time.
With the aid of a fully worked demo application this book explains and demonstrates for you the three pillars of MVC in action. You’ll see howthe Model, View and Controller patterns work together in a compliementary manner to provide MVC’s powerful results.
There’s never been a better time to learn how to use ASP.NETMVC 4. The technology will speed your development times, reduce the verbosity of your code and simplify your application designs all at once. Take the first step towards ASP.NET MVC mastery with Beginning ASP.NET MVC 4.
本書適合已經開始接觸 Ubuntu 指令，但是，找不到該學那些指令或想學習常用指令的操作方式的讀者。
- 本書內含 35 個實用情境、40 多種指令應用及近 70 個實用操作範例，即看、即查、即用。
- 本書經過仔細分類和撰寫，可幫助快速學會使用 Ubuntu 常用指令和技巧。
- 本書所介紹的指令除 Ubuntu 外，可適用於多數的 Linux 發行版。
- 本書所有範例均於 Ubuntu 14.04 版完成實例測試與驗證。
Beginning Java Game Development with LibGDX teaches by example with many game case study projects that you will build throughout the book. This ensures that you will see all of the APIs that are encountered in the book in action and learn to incorporate them into your own projects. The book also focuses on teaching core Java programming concepts and applying them to game development.
What You Will LearnHow to use the LibGDX framework to create a host of 2D arcade game case studies
How to compile your game to run on multiple platforms, such as iOS, Android, Windows, and MacOS
How to incorporate different control schemes, such as touchscreen, gamepad, and keyboard
Who This Book Is ForReaders should have an introductory level knowledge of basic Java programming. In particular, you should be familiar with: variables, conditional statements, loops, and be able to write methods and classes to accomplish simple tasks. This background is equivalent to having taken a first-semester college course in Java programming.
Organizations need to be committed to defending their own assets and their customers’ information. Designing and Building a Security Operations Center will show you how to develop the organization, infrastructure, and capabilities to protect your company and your customers effectively, efficiently, and discreetly.
Written by a subject expert who has consulted on SOC implementation in both the public and private sector, Designing and Building a Security Operations Center is the go-to blueprint for cyber-defense.Explains how to develop and build a Security Operations CenterShows how to gather invaluable intelligence to protect your organizationHelps you evaluate the pros and cons behind each decision during the SOC-building process
Information Technology for Management by Turban, Volonino, and Wood engages students with up-to-date coverage of the most important IT trends today. Over the years, this leading IT textbook had distinguished itself with an emphasis on illustrating the use of cutting edge business technologies for achieving managerial goals and objectives.
The 10th Edition continues this tradition with coverage of emerging trends in Mobile Computing and Commerce, IT virtualization, Social Media, Cloud Computing and the Management and Analysis of Big Data along with advances in more established areas of Information Technology.
Numerous illustrated examples and tables are included to demonstrate concepts, frameworks and real-life scenarios. The book offers step-by-step guidance through each of CCSP’s domains, including best practices and techniques used by the world's most experienced practitioners. Developed by (ISC)², endorsed by the Cloud Security Alliance® (CSA) and compiled and reviewed by cloud security experts across the world, this book brings together a global, thorough perspective. The Official (ISC)² Guide to the CCSP CBK should be utilized as your fundamental study tool in preparation for the CCSP exam and provides a comprehensive reference that will serve you for years to come.
Now in its 6th edition, the best selling book on MVC is now updated for ASP.NET Core MVC. It contains detailed explanations of the new Core MVC functionality which enables developers to produce leaner, cloud optimized and mobile-ready applications for the .NET platform. This book puts ASP.NET Core MVC into context and dives deep into the tools and techniques required to build modern, cloud optimized extensible web applications. All the new MVC features are described in detail and the author explains how best to apply them to both new and existing projects.The ASP.NET Core MVC Framework is the latest evolution of Microsoft’s ASP.NET web platform, built on a completely new foundation. It represents a fundamental change to how Microsoft constructs and deploys web frameworks and is free of the legacy of earlier technologies such as Web Forms. ASP.NET Core MVC provides a "host agnostic" framework and a high-productivity programming model that promotes cleaner code architecture, test-driven development, and powerful extensibility.
Best-selling author Adam Freeman has thoroughly revised this market-leading book and explains how to get the most from ASP.NET Core MVC. He starts with the nuts-and-bolts and shows you everything through to advanced features, going in-depth to give you the knowledge you need.This book follows the same format and style as the popular previous editions but brings everything up to date for the new ASP.NET Core MVC release. It presents a fully worked case study of a functioning ASP.NET MVC application that readers can use as a template for their own projects.
What You Will Learn:Gain a solid architectural understanding of ASP.NET Core MVC
Explore the entire ASP.NET MVC Framework as a cohesive whole
See how MVC and test-driven development work in action
Learn what's new in ASP.NET Core MVC and how best to apply these new features to your own work
See how to create RESTful web services and Single Page Applications
Build on your existing knowledge of previous MVC releases to get up and running with the new programming model quickly and effectively
Who This Book Is For:
This book is for web developers with a basic knowledge of ASP.NET and C# who want to incorporate the latest improvements and functionality in the new ASP.NET Core MVC Framework.
Creating a special area that allows the player to pick their character of choice instead of being forced to play a particular character.
Clever uses of events to create items that allow the player to return to town instantly and summon vehicles to their side.
What You'll Learn:
Create playable characters that have different attributes and play styles.
Design dungeon levels with specific goals in mind.
Create treasure chests with random contents or contents based on the player’s character.
Create doors that require keys or puzzles to unlock.
Create a variety of enemy encounters.
Who This Book is For:
Make a 2D RPG in a Weekend is for anyone who has ever wanted to create a game from scratch. All you need is this book and a copy of RPG Maker MV.
In addition to 600 practice test questions, this edition includes a new chapter on the five process domains. It supplies an overview of each knowledge area, a list of exam topics, and 40 multiple-choice questions for each of the ten knowledge areas presented in A Guide to the Project Management Body of Knowledge Fifth Edition (PMBOK® Guide).
As in previous editions, this edition provides a clearly written rationale for each correct answer, along with a supporting reference list. To help broaden your understanding of the concepts in the answer, this edition features an expanded rationale that discusses why a particular answer is correct, some study tips to consider, and in many cases, an explanation as to why the other answers are incorrect.
For each answer, the authors supply references to the appropriate pages in the PMBOK® Guide and the specific ECO domain and task. You will also find references to one or more of the five process groups: Initiating, Planning, Executing, Monitoring and Controlling, or Closing at the end of each rationale.
The book features a 200-question online practice test that simulates the actual PMP® exam. It also includes the authors’ proprietary proficiency rating that will help you assess your strengths and weaknesses in each process domain so you can identify the areas where you require further study. Watch co-author Ginger Levin, PMP talk about this new edition:
The new Second Edition of this book provides you with completely up-to-date real-world examples and all the key technologies used in digital forensics, as well as new coverage of network intrusion response, how hard drives are organized, and electronic discovery. You'll also learn how to incorporate quality assurance into an investigation, how to prioritize evidence items to examine (triage), case processing, and what goes into making an expert witness.
The Second Edition also features expanded resources and references, including online resources that keep you current, sample legal documents, and suggested further reading.Learn what Digital Forensics entailsBuild a toolkit and prepare an investigative planUnderstand the common artifacts to look for in an examSecond Edition features all-new coverage of hard drives, triage, network intrusion response, and electronic discovery; as well as updated case studies, expert interviews, and expanded resources and references
Data is probably your company’s most important asset, so your data warehouse should serve your needs. The fully updated Second Edition of Data Warehousing For Dummies helps you understand, develop, implement, and use data warehouses, and offers a sneak peek into their future. You’ll learn to:Analyze top-down and bottom-up data warehouse designs Understand the structure and technologies of data warehouses, operational data stores, and data marts Choose your project team and apply best development practices to your data warehousing projects Implement a data warehouse, step by step, and involve end-users in the process Review and upgrade existing data storage to make it serve your needs Comprehend OLAP, column-wise databases, hardware assisted databases, and middleware Use data mining intelligently and find what you need Make informed choices about consultants and data warehousing products
Data Warehousing For Dummies, 2nd Edition also shows you how to involve users in the testing process and gain valuable feedback, what it takes to successfully manage a data warehouse project, and how to tell if your project is on track. You’ll find it’s the most useful source of data on the topic!
Whether you are a student, an indie developer, or a season game dev professional, you'll find helpful C# examples of how to build intelligent enemies, create event systems and GUIs, develop save-game states, and lots more.
You'll understand and apply powerful programming concepts such as singleton classes, component based design, resolution independence, delegates, and event driven programming.
By the end of the book, you will have a complete first person shooter game up and running with Unity. Plus you'll be equipped with the know-how and techniques needed to deploy your own professional-grade C# games.
If you already know a bit of C# and you want to improve your Unity skills, this is just the right book for you.
You will learn how to build themes from scratch, how to monetize the themes you create, and how to capitalize on this by creating advanced themes for your clients or selling premium themes. This book builds on your current knowledge of PHP and web development to create a WordPress theme from scratch. It uses a real-world theme example that you can build, to demonstrate each feature in a practical way. It shows you how to take control of WordPress with custom posts types and taxonomies, and covers anatomy and hierarchy, use of the loop, hooks, short codes, plug-ins and much more.
WordPress is one of the most successful open-source blogging and content management systems available, and theme development has become a major part of the WordPress ecosystem. Start working with WordPress themes like a pro today with Pro WordPress Theme Development.
When Berry and Linoff wrote the first edition of Data Mining Techniques in the late 1990s, data mining was just starting to move out of the lab and into the office and has since grown to become an indispensable tool of modern business. This new edition—more than 50% new and revised— is a significant update from the previous one, and shows you how to harness the newest data mining methods and techniques to solve common business problems. The duo of unparalleled authors share invaluable advice for improving response rates to direct marketing campaigns, identifying new customer segments, and estimating credit risk. In addition, they cover more advanced topics such as preparing data for analysis and creating the necessary infrastructure for data mining at your company.Features significant updates since the previous edition and updates you on best practices for using data mining methods and techniques for solving common business problems Covers a new data mining technique in every chapter along with clear, concise explanations on how to apply each technique immediately Touches on core data mining techniques, including decision trees, neural networks, collaborative filtering, association rules, link analysis, survival analysis, and more Provides best practices for performing data mining using simple tools such as Excel
Data Mining Techniques, Third Edition covers a new data mining technique with each successive chapter and then demonstrates how you can apply that technique for improved marketing, sales, and customer support to get immediate results.
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology. Dorothy Denning discusses advanced persistent threats, Martin Hellman describes how he helped invent public key encryption, Bill Cheswick talks about firewalls, Dr. Charlie Miller talks about hacking cars, and other cybersecurity experts from around the world detail the threats, their defenses, and the tools and techniques they use to thwart the most advanced criminals history has ever seen. Light on jargon and heavy on intrigue, this book is designed to be an introduction to the field; final chapters include a guide for parents of young hackers, as well as the Code of Ethical Hacking to help you start your own journey to the top.
Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure.Go deep into the world of white hat hacking to grasp just how critical cybersecurity is Read the stories of some of the world's most renowned computer security experts Learn how hackers do what they do—no technical expertise necessary Delve into social engineering, cryptography, penetration testing, network attacks, and more
As a field, cybersecurity is large and multi-faceted—yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look.
Written by world-renowned forensic practitioners, this book uses the most current examination and analysis techniques in the field. It consists of 9 chapters that cover a range of topics such as the open source examination platform; disk and file system analysis; Windows systems and artifacts; Linux systems and artifacts; Mac OS X systems and artifacts; Internet artifacts; and automating analysis and extending capabilities. The book lends itself to use by students and those entering the field who do not have means to purchase new tools for different investigations.
This book will appeal to forensic practitioners from areas including incident response teams and computer forensic investigators; forensic technicians from legal, audit, and consulting firms; and law enforcement agencies.Written by world-renowned forensic practitioners Details core concepts and techniques of forensic file system analysisCovers analysis of artifacts from the Windows, Mac, and Linux operating systems
The world's leading software testing experts lend you their wisdom and years of experience to help you avoid the most common mistakes in testing software. Each lesson is an assertion related to software testing, followed by an explanation or example that shows you the how, when, and why of the testing lesson. More than just tips, tricks, and pitfalls to avoid, Lessons Learned in Software Testing speeds you through the critical testing phase of the software development project without the extensive trial and error it normally takes to do so. The ultimate resource for software testers and developers at every level of expertise, this guidebook features:
* Over 200 lessons gleaned from over 30 years of combined testing experience
* Tips, tricks, and common pitfalls to avoid by simply reading the book rather than finding out the hard way
* Lessons for all key topic areas, including test design, test management, testing strategies, and bug reporting
* Explanations and examples of each testing trouble spot help illustrate each lesson's assertion
Millions of people use the Access database applications, and hundreds of thousands of developers work with Access daily. Access 2010 brings better integration with SQL Server and enhanced XML support; this Wrox guide shows developers how to take advantage of these and other improvements.
With in-depth coverage of VBA, macros, and other programming methods for building Access applications, this book also provides real-world code examples to demonstrate each topic.
Access 2010 Programmer's Referenceis a comprehensive guide to the best-of-breed techniques for programming Access applications.
Coverage Includes:Introduction to Microsoft Access 2010 New Features Upgrading and Converting to Access 2010 Macros in Access 2010 Using the VBA Editor VBA Basics Using VBA in Access Creating Classes in VBA Extending VBA with APIs Working with the Windows Registry Using DAO to Access Data Using ADO to Access Data Using SQL with VBA Using VBA to Enhance Forms Enhancing Reports with VBA Customizing the Ribbon Customizing the Office Backstage Working with Office 2010 Working with SharePoint Working with .NET Building Client-Server Applications with Access The Access 2010 Templates Access Runtime Deployment Database Security Access 2010 Security Features
Research shows that visual information is more quickly and easily understood, and much more likely to be remembered. This innovative book presents the design process and the best software tools for creating infographics that communicate. Including a special section on how to construct the increasingly popular infographic resume, the book offers graphic designers, marketers, and business professionals vital information on the most effective ways to present data.Explains why infographics and data visualizations work Shares the tools and techniques for creating great infographics Covers online infographics used for marketing, including social media and search engine optimization (SEO) Shows how to market your skills with a visual, infographic resume Explores the many internal business uses of infographics, including board meeting presentations, annual reports, consumer research statistics, marketing strategies, business plans, and visual explanations of products and services to your customers
With Cool Infographics, you'll learn to create infographics to successfully reach your target audience and tell clear stories with your data.
This comes on top of award winning coverage of core C# features, both old and new, that have made the previous editions of this book so popular (you'll find everything from generics to pLINQ covered here).
The mission of this text is to provide you with a rock-solid foundation in the C# programming language and the core aspects of the .NET platform (assemblies, remoting, Windows Forms, Web Forms, ADO.NET, XML web services, etc.). Once you digest the information presented in these 25 chapters, you’ll be in a perfect position to apply this knowledge to your specific programming assignments, and you’ll be well equipped to explore the .NET universe on your own terms.