In this revelatory book, Don Tapscott, the bestselling author of Wikinomics, and his son, blockchain expert Alex Tapscott, bring us a brilliantly researched, highly readable, and essential book about the technology driving the future of the economy.
Blockchain is the ingeniously simple, revolutionary protocol that allows transactions to be simultaneously anonymous and secure by maintaining a tamperproof public ledger of value. Though it’s best known as the technology that drives bitcoin and other digital currencies, it also has the potential to go far beyond currency, to record virtually everything of value to humankind, from birth and death certificates to insurance claims, land titles, and even votes.
Blockchain is also essential to understand if you’re an artist who wants to make a living off your art, a consumer who wants to know where that hamburger meat really came from, an immigrant who’s tired of paying big fees to send money home to your loved ones, or an entrepreneur looking for a new platform to build a business. And those examples are barely the tip of the iceberg.
As with major paradigm shifts that preceded it, blockchain technology will create winners and losers. This book shines a light on where it can lead us in the next decade and beyond.
This comes on top of award winning coverage of core C# features, both old and new, that have made the previous editions of this book so popular. Readers will gain a solid foundation of object-oriented development techniques, attributes and reflection, generics and collections as well as numerous advanced topics not found in other texts (such as CIL opcodes and emitting dynamic assemblies).The mission of this book is to provide you with a comprehensive foundation in the C# programming language and the core aspects of the .NET platform plus overviews of technologies built on top of C# and .NET (ADO.NET and Entity Framework, Windows Communication Foundation (WCF), Windows Presentation Foundation (WPF), ASP.NET (WebForms, MVC, WebAPI).). Once you digest the information presented in these chapters, you’ll be in a perfect position to apply this knowledge to your specific programming assignments, and you’ll be well equipped to explore the .NET universe on your own terms.
What You Will Learn:Be the first to understand the .NET 4.6 platform and C# 6.
Discover the ins and outs of the leading .NET technology.
Learn from an award-winning author who has been teaching the .NET world since version 1.0.
Find complete coverage of XAML, .NET 4.6 and Visual Studio 2015 together with discussion of the new Windows Runtime.
". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine
". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal
". . .easily ranks as one of the most authoritative in its field." -PC Magazine
The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. The book shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.
With a new Introduction by the author, this premium edition will be a keepsake for all those committed to computer and cyber security.
Based on his nine years of experience as a program manager for Internet Explorer, and lead program manager for Windows and MSN, Berkun explains to technical and non-technical readers alike what it takes to get through a large software or web development project. Making Things Happen doesn't cite specific methods, but focuses on philosophy and strategy. Unlike other project management books, Berkun offers personal essays in a comfortable style and easy tone that emulate the relationship of a wise project manager who gives good, entertaining and passionate advice to those who ask.
Topics in this new edition include:How to make things happenMaking good decisionsSpecifications and requirementsIdeas and what to do with themHow not to annoy peopleLeadership and trustThe truth about making datesWhat to do when things go wrongComplete with a new forward from the author and a discussion guide for forming reading groups/teams, Making Things Happen offers in-depth exercises to help you apply lessons from the book to your job. It is inspiring, funny, honest, and compelling, and definitely the one book that you and your team need to have within arm's reach throughout the life of your project.
Coming from the rare perspective of someone who fought difficult battles on Microsoft's biggest projects and taught project design and management for MSTE, Microsoft's internal best practices group, this is valuable advice indeed. It will serve you well with your current work, and on future projects to come.
Whether you're an aspiring manager, a current manager, or just wondering what the heck a manager does all day, there is a story in this book that will speak to you.
The third edition of Understanding the Linux Kernel takes you on a guided tour of the most significant data structures, algorithms, and programming tricks used in the kernel. Probing beyond superficial features, the authors offer valuable insights to people who want to know how things really work inside their machine. Important Intel-specific features are discussed. Relevant segments of code are dissected line by line. But the book covers more than just the functioning of the code; it explains the theoretical underpinnings of why Linux does things the way it does.
This edition of the book covers Version 2.6, which has seen significant changes to nearly every kernel subsystem, particularly in the areas of memory management and block devices. The book focuses on the following topics:Memory management, including file buffering, process swapping, and Direct memory Access (DMA) The Virtual Filesystem layer and the Second and Third Extended FilesystemsProcess creation and schedulingSignals, interrupts, and the essential interfaces to device driversTimingSynchronization within the kernelInterprocess Communication (IPC) Program execution
Understanding the Linux Kernel will acquaint you with all the inner workings of Linux, but it's more than just an academic exercise. You'll learn what conditions bring out Linux's best performance, and you'll see how it meets the challenge of providing good system response during process scheduling, file access, and memory management in a wide variety of environments. This book will help you make the most of your Linux system.
Moscow-born Sergey Brin and Midwest-born Larry Page dropped out of graduate school at Stanford University to, as they said, “change the world” through a powerful search engine that would organize every bit of information on the Web for free. The Google Story takes you deep inside the company’s wild ride from an idea that struggled for funding in 1998 to a firm that today rakes in billions in profits. Based on scrupulous research and extraordinary access to Google, this fast-moving narrative reveals how an unorthodox management style and a culture of innovation enabled a search-engine giant to shake up Madison Avenue, clash with governments that accuse it of being a monopoly, deploy self-driving cars to forever change how we travel, and launch high-flying Internet balloons. Unafraid of controversy, Google is surging ahead with artificial intelligence that could cure diseases but also displace millions of people from their jobs, testing the founders’ guiding mantra: DON’T BE EVIL.
Praise for The Google Story
“[The authors] do a fine job of recounting Google’s rapid rise and explaining its search business.”—The New York Times
“An intriguing insider view of the Google culture.”—Harvard Business Review
“An interesting read on a powerhouse company . . . If you haven’t read anything about one of today’s most influential companies, you should. If you don’t read The Google Story, you’re missing a few extra treats.”—USA Today
“Fascinating . . . meticulous . . . never bogs down.”—Houston Chronicle
Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class.
This book is an ideal resource for security consultants, beginning InfoSec professionals, and students.Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases.Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University.Utilizes the Kali Linux distribution and focuses on the seminal tools required to complete a penetration test.
Best-selling author Adam Freeman explains how to get the most from AngularJS. He begins by describing the MVC pattern and the many benefits that can be gained from separating your logic and presentation code. He then shows how you can use AngularJS's features within in your projects to produce professional-quality results. Starting from the nuts-and-bolts and building up to the most advanced and sophisticated features AngularJS is carefully unwrapped, going in-depth to give you the knowledge you need.
Each topic is covered clearly and concisely and is packed with the details you need to learn to be truly effective. The most important features are given a no-nonsense in-depth treatment and chapters include common problems and details of how to avoid them.
Each chapter is written with recruitment relevance in mind, and includes Interview questions and further techniques to help match candidates to jobs.
This is a hugely significant work for the IT recruitment industry, but do not be daunted (those of you who are squeamish about IT jargon and terminology). Those who have attended Ayub's training will immediately relate to the uniquely simple, passionate and even humorous ways in which he puts across very complex IT concepts and principals. And his now famous easy-to-understand teaching style continues into this ground breaking book. IT knowledge is delivered in a reassuring and relaxed way; and the stories, trivia, and anecdotes flow throughout.
This is an instruction manual like no other. With The Complete IT Recruitment Survival Guide you have a constant, easy-to-understand yet knowledgeable companion as you tackle the murky waters of the world of IT recruitment.
ASP.NET MVC 5 contains a number of advances over previous versions, including the ability to define routes using C# attributes and the ability to override filters. The user experience of building MVC applications has also been substantially improved. The new, more tightly integrated, Visual Studio 2013 IDE has been created specifically with MVC application development in mind and provides a full suite of tools to improve development times and assist in reporting, debugging and deploying your code.
The Discipline of Organizing synthesizes insights from library science, information science, computer science, cognitive science, systems analysis, business, and other disciplines to create an Organizing System for understanding organizing. This framework is robust and forward-looking, enabling effective sharing of insights and design patterns between disciplines that weren't possible before.
The 4th edition of this award-winning and widely adopted text adds content to bridge between the foundations of organizing systems and the new statistical and computational techniques of data science because at its core, data science is about how resources are described and organized. The 4th edition reframes descriptive statistics as organizing techniques, expands the treatment of classification to include computational methods, and incorporates many new examples of data-driven resource selection, organization, maintenance, and personalization.
The Core Concepts edition is an abridged version that is simpler to read because it does not tempt the reader with the deep scholarly web of endnotes contained in the Professional edition. Instead, it seeks to reinforce the concepts and design patterns with numerous "Stop and Think" exercises, and omits some of the theoretical nuance of the Professional edition to put more emphasis on concrete examples.
From Michael J. Casey and Paul Vigna, the authors of The Age of Cryptocurrency, comes the definitive work on the Internet’s Next Big Thing: The Blockchain.
Big banks have grown bigger and more entrenched. Privacy exists only until the next hack. Credit card fraud is a fact of life. Many of the “legacy systems” once designed to make our lives easier and our economy more efficient are no longer up to the task. Yet there is a way past all this—a new kind of operating system with the potential to revolutionize vast swaths of our economy: the blockchain.
In The Truth Machine, Michael J. Casey and Paul Vigna demystify the blockchain and explain why it can restore personal control over our data, assets, and identities; grant billions of excluded people access to the global economy; and shift the balance of power to revive society’s faith in itself. They reveal the disruption it promises for industries including finance, tech, legal, and shipping.
Casey and Vigna expose the challenge of replacing trusted (and not-so-trusted) institutions on which we’ve relied for centuries with a radical model that bypasses them. The Truth Machine reveals the empowerment possible when self-interested middlemen give way to the transparency of the blockchain, while highlighting the job losses, assertion of special interests, and threat to social cohesion that will accompany this shift. With the same balanced perspective they brought to The Age of Cryptocurrency, Casey and Vigna show why we all must care about the path that blockchain technology takes—moving humanity forward, not backward.
Cryptography is vital to keeping information safe, in an erawhen the formula to do so becomes more and more challenging.Written by a team of world-renowned cryptography experts, thisessential guide is the definitive introduction to all major areasof cryptography: message security, key negotiation, and keymanagement. You'll learn how to think like a cryptographer. You'lldiscover techniques for building cryptography into products fromthe start and you'll examine the many technical changes in thefield.
After a basic overview of cryptography and what it means today,this indispensable resource covers such topics as block ciphers,block modes, hash functions, encryption modes, messageauthentication codes, implementation issues, negotiation protocols,and more. Helpful examples and hands-on exercises enhance yourunderstanding of the multi-faceted field of cryptography.An author team of internationally recognized cryptographyexperts updates you on vital topics in the field ofcryptographyShows you how to build cryptography into products from thestartExamines updates and changes to cryptographyIncludes coverage on key servers, message security,authentication codes, new standards, block ciphers, messageauthentication codes, and more
Cryptography Engineering gets you up to speed in theever-evolving field of cryptography.
But how does one exactly do data science? Do you have to hireone of these priests of the dark arts, the "data scientist," toextract this gold from your data? Nope.
Data science is little more than using straight-forward steps toprocess raw data into actionable insight. And in DataSmart, author and data scientist John Foreman will show you howthat's done within the familiar environment of aspreadsheet.
Why a spreadsheet? It's comfortable! You get to look at the dataevery step of the way, building confidence as you learn the tricksof the trade. Plus, spreadsheets are a vendor-neutral place tolearn data science without the hype.
But don't let the Excel sheets fool you. This is a book forthose serious about learning the analytic techniques, the math andthe magic, behind big data.
Each chapter will cover a different technique in aspreadsheet so you can follow along:Mathematical optimization, including non-linear programming andgenetic algorithmsClustering via k-means, spherical k-means, and graphmodularityData mining in graphs, such as outlier detectionSupervised AI through logistic regression, ensemble models, andbag-of-words modelsForecasting, seasonal adjustments, and prediction intervalsthrough monte carlo simulationMoving from spreadsheets into the R programming language
You get your hands dirty as you work alongside John through eachtechnique. But never fear, the topics are readily applicable andthe author laces humor throughout. You'll even learnwhat a dead squirrel has to do with optimization modeling, whichyou no doubt are dying to know.
It offers a thorough explanation of how computer networks function, how they can be involved in crimes, and how they can be used as a source of evidence. In particular, it addresses the abuse of computer networks as well as privacy and security issues on computer networks.
This updated edition is organized into five parts. Part 1 is about digital forensics and covers topics ranging from the use of digital evidence in the courtroom to cybercrime law. Part 2 explores topics such as how digital investigations are conducted, handling a digital crime scene, and investigative reconstruction with digital evidence. Part 3 deals with apprehending offenders, whereas Part 4 focuses on the use of computers in digital investigation. The book concludes with Part 5, which includes the application of forensic science to networks.
New to this edition are updated information on dedicated to networked Windows, Unix, and Macintosh computers, as well as Personal Digital Assistants; coverage of developments in related technology and tools; updated language for search warrant and coverage of legal developments in the US impacting computer forensics; and discussion of legislation from other countries to provide international scope. There are detailed case examples that demonstrate key concepts and give students a practical/applied understanding of the topics, along with ancillary materials that include an Instructor's Manual and PowerPoint slides.
This book will prove valuable to computer forensic students and professionals, lawyers, law enforcement, and government agencies (IRS, FBI, CIA, CCIPS, etc.).Named The 2011 Best Digital Forensics Book by InfoSec ReviewsProvides a thorough explanation of how computers & networks function, how they can be involved in crimes, and how they can be used as evidence Features coverage of the abuse of computer networks and privacy and security issues on computer networks
The book lays a heavy emphasis on open source tools and step-by-step examples and includes information about Android applications needed for forensic investigations. It is organized into seven chapters that cover the history of the Android platform and its internationalization; the Android Open Source Project (AOSP) and the Android Market; a brief tutorial on Linux and Android forensics; and how to create an Ubuntu-based virtual machine (VM). The book also considers a wide array of Android-supported hardware and device types, the various Android releases, the Android software development kit (SDK), the Davlik VM, key components of Android security, and other fundamental concepts related to Android forensics, such as the Android debug bridge and the USB debugging setting. In addition, it analyzes how data are stored on an Android device and describes strategies and specific utilities that a forensic analyst or security engineer can use to examine an acquired Android device.
Core Android developers and manufacturers, app developers, corporate security officers, and anyone with limited forensic experience will find this book extremely useful. It will also appeal to computer forensic and incident response professionals, including commercial/private sector contractors, consultants, and those in federal government.Named a 2011 Best Digital Forensics Book by InfoSec ReviewsAbility to forensically acquire Android devices using the techniques outlined in the bookDetailed information about Android applications needed for forensics investigationsImportant information about SQLite, a file based structured data storage relevant for both Android and many other platforms.
The first edition of Ralph Kimball's The Data WarehouseToolkit introduced the industry to dimensional modeling,and now his books are considered the most authoritative guides inthis space. This new third edition is a complete library of updateddimensional modeling techniques, the most comprehensive collectionever. It covers new and enhanced star schema dimensional modelingpatterns, adds two new chapters on ETL techniques, includes new andexpanded business matrices for 12 case studies, and more.Authored by Ralph Kimball and Margy Ross, known worldwide aseducators, consultants, and influential thought leaders in datawarehousing and business intelligenceBegins with fundamental design recommendations and progressesthrough increasingly complex scenariosPresents unique modeling techniques for business applicationssuch as inventory management, procurement, invoicing, accounting,customer relationship management, big data analytics, and moreDraws real-world case studies from a variety of industries,including retail sales, financial services, telecommunications,education, health care, insurance, e-commerce, and more
Design dimensional databases that are easy to understand andprovide fast query response with The Data WarehouseToolkit: The Definitive Guide to Dimensional Modeling, 3rdEdition.
This book will help you:Become a contributor on a data science teamDeploy a structured lifecycle approach to data analytics problemsApply appropriate analytic techniques and tools to analyzing big dataLearn how to tell a compelling story with data to drive business actionPrepare for EMC Proven Professional Data Science Certification
Corresponding data sets are available at www.wiley.com/go/9781118876138.
Get started discovering, analyzing, visualizing, and presenting data in a meaningful way today!
Now in its 6th edition, the best selling book on MVC is now updated for ASP.NET Core MVC. It contains detailed explanations of the new Core MVC functionality which enables developers to produce leaner, cloud optimized and mobile-ready applications for the .NET platform. This book puts ASP.NET Core MVC into context and dives deep into the tools and techniques required to build modern, cloud optimized extensible web applications. All the new MVC features are described in detail and the author explains how best to apply them to both new and existing projects.The ASP.NET Core MVC Framework is the latest evolution of Microsoft’s ASP.NET web platform, built on a completely new foundation. It represents a fundamental change to how Microsoft constructs and deploys web frameworks and is free of the legacy of earlier technologies such as Web Forms. ASP.NET Core MVC provides a "host agnostic" framework and a high-productivity programming model that promotes cleaner code architecture, test-driven development, and powerful extensibility.
Best-selling author Adam Freeman has thoroughly revised this market-leading book and explains how to get the most from ASP.NET Core MVC. He starts with the nuts-and-bolts and shows you everything through to advanced features, going in-depth to give you the knowledge you need.This book follows the same format and style as the popular previous editions but brings everything up to date for the new ASP.NET Core MVC release. It presents a fully worked case study of a functioning ASP.NET MVC application that readers can use as a template for their own projects.
What You Will Learn:Gain a solid architectural understanding of ASP.NET Core MVC
Explore the entire ASP.NET MVC Framework as a cohesive whole
See how MVC and test-driven development work in action
Learn what's new in ASP.NET Core MVC and how best to apply these new features to your own work
See how to create RESTful web services and Single Page Applications
Build on your existing knowledge of previous MVC releases to get up and running with the new programming model quickly and effectively
Who This Book Is For:
This book is for web developers with a basic knowledge of ASP.NET and C# who want to incorporate the latest improvements and functionality in the new ASP.NET Core MVC Framework.
Until recently, ASP.NET MVC was regarded as an advanced technology only suitable for experienced developers with a strong knowledge of classic ASP.NET and C# coding behind them. This book overturns that prejudice and shows that the beautiful simplicity of ASP.NET MVC is just as suitable for novice developers venturing into real-world application design for the first time.
With the aid of a fully worked demo application this book explains and demonstrates for you the three pillars of MVC in action. You’ll see howthe Model, View and Controller patterns work together in a compliementary manner to provide MVC’s powerful results.
There’s never been a better time to learn how to use ASP.NETMVC 4. The technology will speed your development times, reduce the verbosity of your code and simplify your application designs all at once. Take the first step towards ASP.NET MVC mastery with Beginning ASP.NET MVC 4.
The potential user base and the wide array of available high-performance devices makes Android an attractive target for aspiring game developers. Do you have an awesome idea for the next break-through mobile gaming title? Beginning Android Games will help you kick-start your project. This book will guide you through the process of making several example game apps using APIs available in new Android SDK and earlier SDK releases for Android smartphones and tablets:The fundamentals of game development and design suitable for Android smartphones and tablets The Android platform basics to apply those fundamentals in the context of making a game, including new File Manager system and better battery life management The design of 2D and 3D games and their successful implementation on the Android platform
This book lets developers see and use some Android SDK Jelly Bean; however, this book is structured so that app developers can use earlier Android SDK releases. This book is backward compatible like the Android SDK.
Information Technology for Management by Turban, Volonino, and Wood engages students with up-to-date coverage of the most important IT trends today. Over the years, this leading IT textbook had distinguished itself with an emphasis on illustrating the use of cutting edge business technologies for achieving managerial goals and objectives.
The 10th Edition continues this tradition with coverage of emerging trends in Mobile Computing and Commerce, IT virtualization, Social Media, Cloud Computing and the Management and Analysis of Big Data along with advances in more established areas of Information Technology.
Google BigQuery Analytics is the perfect guide for business and data analysts who want the latest tips on running complex queries and writing code to communicate with the BigQuery API. The book uses real-world examples to demonstrate current best practices and techniques, and also explains and demonstrates streaming ingestion, transformation via Hadoop in Google Compute engine, AppEngine datastore integration, and using GViz with Tableau to generate charts of query results. In addition to the mechanics of BigQuery, the book also covers the architecture of the underlying Dremel query engine, providing a thorough understanding that leads to better query results.Features a companion website that includes all code and data sets from the bookUses real-world examples to explain everything analysts need to know to effectively use BigQueryIncludes web application examples coded in Python
Practical Node.js is your step-by-step guide to learning how to build a wide range of scalable real-world web applications using a professional development toolkit. Node.js is an innovative and highly efficient platform for creating web services. But Node.js doesn't live in a vacuum! In a modern web development, many different components need to be put together — routing, database driver, ORM, session management, OAuth, HTML template engine, CSS compiler and many more.
If you already know the basics of Node.js, now is the time to discover how to bring it to production level by leveraging its vast ecosystem of packages. As a web developer, you'll work with a varied collection of standards and frameworks - Practical Node.js shows you how all those pieces fit together.
Practical Node.js takes you from installing all the necessary modules to writing full-stack web applications by harnessing the power of the Express.js and Hapi frameworks, the MongoDB database with Mongoskin and Mongoose, Jade and Handlebars template engines, Stylus and LESS CSS languages, OAuth and Everyauth libraries, and the Socket.IO and Derby libraries, and everything in between. The book also covers how to deploy to Heroku and AWS, daemonize apps, and write REST APIs. You'll build full-stack real-world Node.js apps from scratch, and also discover how to write your own Node.js modules and publish them on NPM. You already know what Node.js is; now learn what you can do with it and how far you can take it!
The book is organized into 7 chapters that cover hacking tools such as Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. PowerPoint slides are available for use in class.
This book is an ideal reference for security consultants, beginning InfoSec professionals, and students.Named a 2011 Best Hacking and Pen Testing Book by InfoSec ReviewsEach chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases.Writen by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University.Utilizes the Backtrack Linus distribution and focuses on the seminal tools required to complete a penetration test.
The book explains the concepts with the help of practical real-world scenarios and examples. You'll also work with hands-on exercises at the end of each chapter to get a feel of the subject. Thus this book would be a valuable resource to any individual planning to prepare for the CEH certification course.
What You Will LearnGain the basics of hacking (apps, wireless devices, and mobile platforms)Discover useful aspects of databases and operating systems from a hacking perspectiveDevelop sharper programming and networking skills for the examExplore the penetration testing life cycle Bypass security appliances like IDS, IPS, and honeypotsGrasp the key concepts of cryptographyDiscover the career paths available after certificationRevise key interview questions for a certified ethical hackerWho This Book Is For
Beginners in the field of ethical hacking and information security, particularly those who are interested in the CEH course and certification.
Research shows that visual information is more quickly andeasily understood, and much more likely to be remembered. Thisinnovative book presents the design process and the best softwaretools for creating infographics that communicate. Including aspecial section on how to construct the increasingly popularinfographic resume, the book offers graphic designers, marketers,and business professionals vital information on the most effectiveways to present data.Explains why infographics and data visualizations workShares the tools and techniques for creating greatinfographicsCovers online infographics used for marketing, including socialmedia and search engine optimization (SEO)Shows how to market your skills with a visual, infographicresumeExplores the many internal business uses of infographics,including board meeting presentations, annual reports, consumerresearch statistics, marketing strategies, business plans, andvisual explanations of products and services to your customers
With Cool Infographics, you'll learn to createinfographics to successfully reach your target audience and tellclear stories with your data.
The world of data warehousing has changed remarkably since the first edition of The Data Warehouse Lifecycle Toolkit was published in 1998. In that time, the data warehouse industry has reached full maturity and acceptance, hardware and software have made staggering advances, and the techniques promoted in the premiere edition of this book have been adopted by nearly all data warehouse vendors and practitioners. In addition, the term "business intelligence" emerged to reflect the mission of the data warehouse: wrangling the data out of source systems, cleaning it, and delivering it to add value to the business.
Ralph Kimball and his colleagues have refined the original set of Lifecycle methods and techniques based on their consulting and training experience. The authors understand first-hand that a data warehousing/business intelligence (DW/BI) system needs to change as fast as its surrounding organization evolves. To that end, they walk you through the detailed steps of designing, developing, and deploying a DW/BI system. You'll learn to create adaptable systems that deliver data and analyses to business users so they can make better business decisions.
When Berry and Linoff wrote the first edition of Data MiningTechniques in the late 1990s, data mining was just starting tomove out of the lab and into the office and has since grown tobecome an indispensable tool of modern business. This newedition—more than 50% new and revised— is asignificant update from the previous one, and shows you how toharness the newest data mining methods and techniques to solvecommon business problems. The duo of unparalleled authors shareinvaluable advice for improving response rates to direct marketingcampaigns, identifying new customer segments, and estimating creditrisk. In addition, they cover more advanced topics such aspreparing data for analysis and creating the necessaryinfrastructure for data mining at your company.Features significant updates since the previous edition andupdates you on best practices for using data mining methods andtechniques for solving common business problemsCovers a new data mining technique in every chapter along withclear, concise explanations on how to apply each techniqueimmediatelyTouches on core data mining techniques, including decisiontrees, neural networks, collaborative filtering, association rules,link analysis, survival analysis, and moreProvides best practices for performing data mining using simpletools such as Excel
Data Mining Techniques, Third Edition covers a new datamining technique with each successive chapter and then demonstrateshow you can apply that technique for improved marketing, sales, andcustomer support to get immediate results.
Numerous illustrated examples and tables are included to demonstrate concepts, frameworks and real-life scenarios. The book offers step-by-step guidance through each of CCSP’s domains, including best practices and techniques used by the world's most experienced practitioners. Developed by (ISC)², endorsed by the Cloud Security Alliance® (CSA) and compiled and reviewed by cloud security experts across the world, this book brings together a global, thorough perspective. The Official (ISC)² Guide to the CCSP CBK should be utilized as your fundamental study tool in preparation for the CCSP exam and provides a comprehensive reference that will serve you for years to come.
Android game app development continues to be one of the hottest areas where indies and existing game app developers seem to be most active. Android is the second best mobile apps eco and arguably even a hotter game apps eco than iOS. 3D makes your games come alive; so in this book you'll find that we go in depth on creating 3D games for the Android platform with OpenGL ES 2.0 using an original case study game called Drone Grid.
Moreover, this book offers an extensive case study with code that will be modular and re-useable helping you create your own games using advanced vertex and fragment shaders. Drone Grid is a game app case study that is somewhat similar to the best selling Geometry Wars game series utilizing a gravity grid and colorful abstract graphics and particles.
After reading and using this book, you'll be able to build your first 3D Android game app for smartphones and tablets. You may even be able to upload and sell from popular Android app stores like Google Play and Amazon Appstore.
It will show you how to use drag-and-drop visual programming for designing and building fully functional mobile apps for Android using MIT (Massachusetts Institute of Technology) App Inventor 2.
Absolute App Inventor 2 book will take you beyond basic tutorials and will cover concepts that will help you to become a better mobile App Inventor.If you are new to programming or App Inventor, then this book will show you how to properly start-off designing and developing mobile apps and will then gradually take you through understanding more advanced concepts. If you have already used App Inventor, use this book to learn about optimization, DRY principle, design patterns and concepts that will teach you how to design & develop apps that will run more efficiently and to learn about concepts that have not been covered in other App Inventor books.
The book covers good programming designs using DRY (Don’t Repeat Yourself) Principle by using App Inventor Procedures. The book also covers how to use proper abstraction and produce much cleaner code through use of App Inventor Advanced “Any Component”.
After completing the projects you will understand the core-concepts and implementation details of a typical 2D game engine and you will be familiar with a design and prototyping methodology you can use to create game levels and mechanics that are fun and engaging for players. You will gain insights into the many ways software design and creative design must work together to deliver the best game experiences, and you will have access to a versatile 2D game engine that you can expand upon or utilize directly to build your own 2D games that can be played online from anywhere.
• Assists the reader in understanding the core-concepts behind a 2D game engine
• Guides the reader in building a functional game engine based on these concepts
• Leads the reader in exploring the interplay between technical design and game experience design
• Teaches the reader how to build their own 2D games that can be played across internet via popular browsers
In addition to 600 practice test questions, this edition includes a new chapter on the five process domains. It supplies an overview of each knowledge area, a list of exam topics, and 40 multiple-choice questions for each of the ten knowledge areas presented in A Guide to the Project Management Body of Knowledge Fifth Edition (PMBOK® Guide).
As in previous editions, this edition provides a clearly written rationale for each correct answer, along with a supporting reference list. To help broaden your understanding of the concepts in the answer, this edition features an expanded rationale that discusses why a particular answer is correct, some study tips to consider, and in many cases, an explanation as to why the other answers are incorrect.
For each answer, the authors supply references to the appropriate pages in the PMBOK® Guide and the specific ECO domain and task. You will also find references to one or more of the five process groups: Initiating, Planning, Executing, Monitoring and Controlling, or Closing at the end of each rationale.
The book features a 200-question online practice test that simulates the actual PMP® exam. It also includes the authors’ proprietary proficiency rating that will help you assess your strengths and weaknesses in each process domain so you can identify the areas where you require further study. Watch co-author Ginger Levin, PMP talk about this new edition:
The Kimball Group Reader, Remastered Collection is the essential reference for data warehouse and business intelligence design, packed with best practices, design tips, and valuable insight from industry pioneer Ralph Kimball and the Kimball Group. This Remastered Collection represents decades of expert advice and mentoring in data warehousing and business intelligence, and is the final work to be published by the Kimball Group. Organized for quick navigation and easy reference, this book contains nearly 20 years of experience on more than 300 topics, all fully up-to-date and expanded with 65 new articles. The discussion covers the complete data warehouse/business intelligence lifecycle, including project planning, requirements gathering, system architecture, dimensional modeling, ETL, and business intelligence analytics, with each group of articles prefaced by original commentaries explaining their role in the overall Kimball Group methodology.
Data warehousing/business intelligence industry's current multi-billion dollar value is due in no small part to the contributions of Ralph Kimball and the Kimball Group. Their publications are the standards on which the industry is built, and nearly all data warehouse hardware and software vendors have adopted their methods in one form or another. This book is a compendium of Kimball Group expertise, and an essential reference for anyone in the field.Learn data warehousing and business intelligence from the field's pioneersGet up to date on best practices and essential design tipsGain valuable knowledge on every stage of the project lifecycleDig into the Kimball Group methodology with hands-on guidance
Ralph Kimball and the Kimball Group have continued to refine their methods and techniques based on thousands of hours of consulting and training. This Remastered Collection of The Kimball Group Reader represents their final body of knowledge, and is nothing less than a vital reference for anyone involved in the field.
all the music, film and text ever produced will be available on-demand in our own homesyour "bodynet" will let you make phone calls, check email and pay bills as you walk down the streetadvances in telecommunication will radically alter the role of face-to-face contact in our livesglobal disparities in infrastructure will widen the gap between rich and poorsurgical mini-robots and online care will change the practice of medicine as we know it.
Detailed, accessible and visionary, What Will Be is essential for Information Age revolutionaries and technological neophytes alike.
To accomplish this, the team of security professionals from VeriSign’s iDefense® Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the book: Covers attacker methods and motivations, exploitation trends, malicious code techniques, and the latest threat vectors Addresses more than 75 key security concepts in a series of concise, well-illustrated summaries designed for most levels of technical understanding Supplies actionable advice for the mitigation of threats Breaks down the code used to write exploits into understandable diagrams
This book is not about the latest attack trends or botnets. It’s about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages, readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon.
You will find The Essential Guide to HTML5 and CSS3 Web Design invaluable at any stage of your career, with its mixture of practical tutorials and reference material. Beginners will quickly pick up the basics, while more experienced web designers and developers will keep returning to the book again and again to read up on techniques they may not have used for a while, or to look up properties, attributes and other details. This book is destined to become a close friend, adopting a permanent place on your desk.
The Essential Guide to HTML5 and CSS3 Web Design starts off with a brief introduction to the web and web design, before diving straight in to HTML5 and CSS3 basics, reusing code, and other best practices you can adopt. The book then focuses on the most important areas of a successful web site: typography, images, navigation, tables, layouts, forms and feedback (including ready-made PHP scripts) and browser quirks, hacks and bugs.
The Essential Guide to HTML5 and CSS3 Web Design is completely up-to-date, covering support of the newest standards in all the latest browsers, including IE 9 and Firefox 4. The last chapter of the book provides several case studies to dissect and learn from, including all the most popular web site archetypes—a blog, a store front, a corporate home page, and an online gallery. You'll also appreciate several detailed reference appendices covering CSS, HTML, color references, entities, and more—any details you need to look up will be close at hand.
Author Susan Snedaker shares her expertise with you, including the most current options for disaster recovery and communication, BCDR for mobile devices, and the latest infrastructure considerations including cloud, virtualization, clustering, and more. Snedaker also provides you with new case studies in several business areas, along with a review of high availability and information security in healthcare IT.
Don’t be caught off guard—Business Continuity and Disaster Recovery for IT Professionals, 2nd Edition , is required reading for anyone in the IT field charged with keeping information secure and systems up and running.Complete coverage of the 3 categories of disaster: natural hazards, human-caused hazards, and accidental / technical hazardsExtensive disaster planning and readiness checklists for IT infrastructure, enterprise applications, servers and desktopsClear guidance on developing alternate work and computing sites and emergency facilities Actionable advice on emergency readiness and response Up-to-date information on the legal implications of data loss following a security breach or disaster
Database design is not an exact science. Many are surprised to find that problems with their databases are caused by poor design rather than by difficulties in using the database management software. Beginning Database Design, Second Edition helps you ask and answer important questions about your data so you can understand the problem you are trying to solve and create a pragmatic design capturing the essentials while leaving the door open for refinements and extension at a later stage. Solid database design principles and examples help demonstrate the consequences of simplifications and pragmatic decisions. The rationale is to try to keep a design simple, but allow room for development as situations change or resources permit.Provides solid design principles by which to avoid pitfalls and support changing needs Includes numerous examples of good and bad design decisions and their consequences Shows a modern method for documenting design using the Unified Modeling Language
The world's leading software testing experts lend you their wisdomand years of experience to help you avoid the most common mistakesin testing software. Each lesson is an assertion related tosoftware testing, followed by an explanation or example that showsyou the how, when, and why of the testing lesson. More than justtips, tricks, and pitfalls to avoid, Lessons Learned in SoftwareTesting speeds you through the critical testing phase of thesoftware development project without the extensive trial and errorit normally takes to do so. The ultimate resource for softwaretesters and developers at every level of expertise, this guidebookfeatures:
* Over 200 lessons gleaned from over 30 years of combined testingexperience
* Tips, tricks, and common pitfalls to avoid by simply reading thebook rather than finding out the hard way
* Lessons for all key topic areas, including test design, testmanagement, testing strategies, and bug reporting
* Explanations and examples of each testing trouble spot helpillustrate each lesson's assertion
Who this book is for
This book is organized into 11 chapters. After an introduction to the basics of digital forensics, the book proceeds with a discussion of key technical concepts. Succeeding chapters cover labs and tools; collecting evidence; Windows system artifacts; anti-forensics; Internet and email; network forensics; and mobile device forensics. The book concludes by outlining challenges and concerns associated with digital forensics. PowerPoint lecture slides are also available.
This book will be a valuable resource for entry-level digital forensics professionals as well as those in complimentary fields including law enforcement, legal, and general information security.Learn all about what Digital Forensics entailsBuild a toolkit and prepare an investigative planUnderstand the common artifacts to look for during an exam
Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.
You will learn how to build themes from scratch, how to monetize the themes you create, and how to capitalize on this by creating advanced themes for your clients or selling premium themes. This book builds on your current knowledge of PHP and web development to create a WordPress theme from scratch. It uses a real-world theme example that you can build, to demonstrate each feature in a practical way. It shows you how to take control of WordPress with custom posts types and taxonomies, and covers anatomy and hierarchy, use of the loop, hooks, short codes, plug-ins and much more.
WordPress is one of the most successful open-source blogging and content management systems available, and theme development has become a major part of the WordPress ecosystem. Start working with WordPress themes like a pro today with Pro WordPress Theme Development.
The ASP.NET Core MVC Framework is the latest evolution of Microsoft’s ASP.NET web platform, built on a completely new foundation. It represents a fundamental change to how Microsoft constructs and deploys web frameworks and is free of the legacy of earlier technologies such as Web Forms. ASP.NET Core MVC provides a "host agnostic" framework and a high-productivity programming model that promotes cleaner code architecture, test-driven development, and powerful extensibility.
Best-selling author Adam Freeman has thoroughly revised this market-leading book and explains how to get the most from ASP.NET Core MVC. He starts with the nuts-and-bolts and shows you everything through to advanced features, going in-depth to give you the knowledge you need. The book includes a fully worked case study of a functioning web application that readers can use as a template for their own projects.
What's New in This EditionFully updated for Visual Studio 2017, C# 7 and .NET Core 2
Coverage of new features such as view filters
Wider platform and tooling coverage than ever before, with more on Visual Studio Code and working with .NET Core on non-Windows platforms
Docker-based application deployment
What You Will LearnGain a solid architectural understanding of ASP.NET Core MVC
Explore the entire ASP.NET MVC Framework as a cohesive whole
See how MVC and test-driven development work in action
Learn what's new in ASP.NET Core MVC 2 and how best to apply these new features to your own work
See how to create RESTful web services and Single Page Applications
Build on your existing knowledge of previous MVC releases to get up and running with the new programming model quickly and effectively
Who This Book Is For
This book is for web developers with a basic knowledge of ASP.NET and C# who want to incorporate the latest improvements and functionality in the ASP.NET Core MVC 2 Framework.
All data, big or small, starts with algorithms. Algorithms are mathematical equations that determine what we see—based on our likes, dislikes, queries, views, interests, relationships, and more—online. They are, in a sense, the electronic gatekeepers to our digital, as well as our physical, world. This book demystifies the subject of algorithms so you can understand how important they are business and scientific decision making.
Algorithms for Dummies is a clear and concise primer for everyday people who are interested in algorithms and how they impact our digital lives. Based on the fact that we already live in a world where algorithms are behind most of the technology we use, this book offers eye-opening information on the pervasiveness and importance of this mathematical science—how it plays out in our everyday digestion of news and entertainment, as well as in its influence on our social interactions and consumerism. Readers even learn how to program an algorithm using Python!Become well-versed in the major areas comprising algorithmsExamine the incredible history behind algorithmsGet familiar with real-world applications of problem-solving proceduresExperience hands-on development of an algorithm from start to finish with Python
If you have a nagging curiosity about why an ad for that hammock you checked out on Amazon is appearing on your Facebook page, you'll find Algorithm for Dummies to be an enlightening introduction to this integral realm of math, science, and business.
The Second Edition of this fundamental textbook maintains thebook's tradition of clear, thought-provoking instruction. Readersare provided once again with an instructive mix of mathematics,physics, statistics, and information theory.
All the essential topics in information theory are covered indetail, including entropy, data compression, channel capacity, ratedistortion, network information theory, and hypothesis testing. Theauthors provide readers with a solid understanding of theunderlying theory and applications. Problem sets and a telegraphicsummary at the end of each chapter further assist readers. Thehistorical notes that follow each chapter recap the mainpoints.
The Second Edition features:
* Chapters reorganized to improve teaching
* 200 new problems
* New material on source coding, portfolio theory, and feedbackcapacity
* Updated references
Now current and enhanced, the Second Edition of Elements ofInformation Theory remains the ideal textbook for upper-levelundergraduate and graduate courses in electrical engineering,statistics, and telecommunications.
An Instructor's Manual presenting detailed solutions to all theproblems in the book is available from the Wiley editorialdepartment.
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology. Dorothy Denning discusses advanced persistent threats, Martin Hellman describes how he helped invent public key encryption, Bill Cheswick talks about firewalls, Dr. Charlie Miller talks about hacking cars, and other cybersecurity experts from around the world detail the threats, their defenses, and the tools and techniques they use to thwart the most advanced criminals history has ever seen. Light on jargon and heavy on intrigue, this book is designed to be an introduction to the field; final chapters include a guide for parents of young hackers, as well as the Code of Ethical Hacking to help you start your own journey to the top.
Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure.Go deep into the world of white hat hacking to grasp just how critical cybersecurity isRead the stories of some of the world's most renowned computer security expertsLearn how hackers do what they do—no technical expertise necessaryDelve into social engineering, cryptography, penetration testing, network attacks, and more
As a field, cybersecurity is large and multi-faceted—yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look.