Written by bestselling Beginning Joomla! author Dan Rahmel, Advanced Joomla! picks up right where Beginning Joomla! left off. Amongst other things, it shows you how to integrate advanced features into your Joomla! site, including social networking, blogging, and Google and Yahoo! web services; construct advanced Joomla! templates that use multiple stylesheets; use advanced administration techniques; and employ MySQL data reporting, remote deployment, and quality control using automated testing.
Advanced Joomla! assists content providers and web developers in all aspects of Joomla! content creation. For graphic artists and web designers, the professional template techniques and site organization information will prove invaluable. For developers who are weary of the often Byzantine documentation and hunger for clear organized information, Advanced Joomla! holds the key to unlocking the treasures of this advanced CMS system.
Youll learn how to create your own modules, develop your own themes, and produce your own filters. You'll learn the inner workings of each key part of Drupal, including user management, sessions, the node system, caching, and the various APIs available to you. Of course, your Drupal-powered site isnt effective until you can efficiently serve pages to your visitors. As such, the authors have included the information you need to optimize your Drupal installation to perform well under high-load situations. Also featured is information on Drupal security and best practices, as well as integration of Ajax and the internationalization of your Drupal web site. Simply put, if you are working with Drupal at all, then you need this book.This book is written by Drupal core developers. Drupal architecture and behavior are mapped out visually. Common pitfalls are identified and addressed. Chapters provide regular discussion and reference to why things work they way they do, not just how. Features a foreword by Dries Buytaert, Drupal founder.
If you’re new to Joomla!, you’ll learn how to quickly create usable, effective sites. If you’re an experienced Joomla! user, you’ll learn how to make your sites more flexible, feature-rich, visually attractive, and useful. And whether new or experienced, you’ll learn how Joomla! really works, so you can fully leverage its power whenever you’re ready. You’ll also get to know the Joomla! community by hearing from twelve community members through in-depth interviews, and you’ll learn how to participate in the Joomla! project in ways that make sense for you.
The Official Joomla! Book covers everything from installation to usability, templates to extensions. The authors explain each key concept conversationally, helping you learn to help yourself and confidently gain control over Joomla! and the sites you build with it. They also present chapter-length application case studies for business, non-profits, and education. You will learn how to
Plan sites effectively before you start building them Create production sites quickly while avoiding common mistakes Install and configure Joomla! for maximum efficiency Create and edit content for your Joomla! site Customize and work with Joomla! templates Work with extensions: components, modules, plugins, and languages Efficiently administer Joomla! sites Participate in the Joomla! community as a user and contributor
Ten different projects illustrate the concepts introduced in the book. You will learn how to create a P2P file-sharing application and a web-based bulletin board, and how to remotely edit web-based documents and create games. Author Magnus Lie Hetland is an authority on Python and previously authored Practical Python. He also authored the popular online guide, Instant Python Hacking, on which both books are based.
Using everyday objects and familiar language systems such as Braille and Morse code, author Charles Petzold weaves an illuminating narrative for anyone who’s ever wondered about the secret inner life of computers and other smart machines.
It’s a cleverly illustrated and eminently comprehensible story—and along the way, you’ll discover you’ve gained a real context for understanding today’s world of PCs, digital media, and the Internet. No matter what your level of technical savvy, CODE will charm you—and perhaps even awaken the technophile within.
Noted software expert Robert C. Martin presents a revolutionary paradigm with Clean Code: A Handbook of Agile Software Craftsmanship . Martin has teamed up with his colleagues from Object Mentor to distill their best agile practice of cleaning code “on the fly” into a book that will instill within you the values of a software craftsman and make you a better programmer–but only if you work at it.
What kind of work will you be doing? You’ll be reading code–lots of code. And you will be challenged to think about what’s right about that code, and what’s wrong with it. More importantly, you will be challenged to reassess your professional values and your commitment to your craft.
Clean Code is divided into three parts. The first describes the principles, patterns, and practices of writing clean code. The second part consists of several case studies of increasing complexity. Each case study is an exercise in cleaning up code–of transforming a code base that has some problems into one that is sound and efficient. The third part is the payoff: a single chapter containing a list of heuristics and “smells” gathered while creating the case studies. The result is a knowledge base that describes the way we think when we write, read, and clean code.
Readers will come away from this book understanding
How to tell the difference between good and bad code How to write good code and how to transform bad code into good code How to create good names, good functions, good objects, and good classes How to format code for maximum readability How to implement complete error handling without obscuring code logic How to unit test and practice test-driven development This book is a must for any developer, software engineer, project manager, team lead, or systems analyst with an interest in producing better code.
You'll not only receive extensive introductions to the core features of PHP, MySQL, and related tools, but you'll also learn how to effectively integrate them in order to build robust data-driven applications. Gilmore has seven years of experience working with these technologies, and he has packed this book with practical examples and insight into the real-world challenges faced by developers. Accordingly, you will repeatedly return to this book as both a valuable instructional tool and reference guide.
This comes on top of award winning coverage of core C# features, both old and new, that have made the previous editions of this book so popular. Readers will gain a solid foundation of object-oriented development techniques, attributes and reflection, generics and collections as well as numerous advanced topics not found in other texts (such as CIL opcodes and emitting dynamic assemblies).The mission of this book is to provide you with a comprehensive foundation in the C# programming language and the core aspects of the .NET platform plus overviews of technologies built on top of C# and .NET (ADO.NET and Entity Framework, Windows Communication Foundation (WCF), Windows Presentation Foundation (WPF), ASP.NET (WebForms, MVC, WebAPI).). Once you digest the information presented in these chapters, you’ll be in a perfect position to apply this knowledge to your specific programming assignments, and you’ll be well equipped to explore the .NET universe on your own terms.
What You Will Learn:Be the first to understand the .NET 4.6 platform and C# 6.
Discover the ins and outs of the leading .NET technology.
Learn from an award-winning author who has been teaching the .NET world since version 1.0.
Find complete coverage of XAML, .NET 4.6 and Visual Studio 2015 together with discussion of the new Windows Runtime.
In this revelatory book, Don Tapscott, the bestselling author of Wikinomics, and his son, blockchain expert Alex Tapscott, bring us a brilliantly researched, highly readable, and essential book about the technology driving the future of the economy.
Blockchain is the ingeniously simple, revolutionary protocol that allows transactions to be simultaneously anonymous and secure by maintaining a tamperproof public ledger of value. Though it’s best known as the technology that drives bitcoin and other digital currencies, it also has the potential to go far beyond currency, to record virtually everything of value to humankind, from birth and death certificates to insurance claims, land titles, and even votes.
Blockchain is also essential to understand if you’re an artist who wants to make a living off your art, a consumer who wants to know where that hamburger meat really came from, an immigrant who’s tired of paying big fees to send money home to your loved ones, or an entrepreneur looking for a new platform to build a business. And those examples are barely the tip of the iceberg.
As with major paradigm shifts that preceded it, blockchain technology will create winners and losers. This book shines a light on where it can lead us in the next decade and beyond.
". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine
". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal
". . .easily ranks as one of the most authoritative in its field." -PC Magazine
The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. The book shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.
With a new Introduction by the author, this premium edition will be a keepsake for all those committed to computer and cyber security.
Whether you use Joomla! to power a website, intranet, or blog, you'll need a good how-to reference on this complex, but not always intuitive, content management software. Joomla! Bible, Second Edition is that book. It not only brings you up to speed on the changes and extensions that are now part of Joomla! 3.0, it thoroughly covers functions and tasks, including installation, configuration, management, advanced modules, and extended coverage of two key extensions.
You'll learn how to obtain code and deploy it to a server; how to obtain, modify, and delete content; how to choose between the Joomla! Platform and the Joomla! CMS; and more. By the time you finish the Joomla! Bible, Second Edition, you'll be well prepared to build and maintain a Joomla!-based website.Walks you through obtaining the Joomla! 3.0 code and how to deploy it to a server, configure the site, create content, and manage content and user hierarchiesHelps you get the most out of core modules that provide advanced functionality, including the Polls Module, the Banner Manager, Content Syndication, Newsfeed Aggregation, and othersIncludes hands-on tutorials and real-world practical applications
Whether you're a content manager, website manager, developer, or do-it-yourselfer, make sure you keep Joomla! Bible, Second Edition on hand.
You will learn how to write a robust game loop, how to organize your entities using components, and take advantage of the CPUs cache to improve your performance. You'll dive deep into how scripting engines encode behavior, how quadtrees and other spatial partitions optimize your engine, and how other classic design patterns can be used in games.
The third edition of Understanding the Linux Kernel takes you on a guided tour of the most significant data structures, algorithms, and programming tricks used in the kernel. Probing beyond superficial features, the authors offer valuable insights to people who want to know how things really work inside their machine. Important Intel-specific features are discussed. Relevant segments of code are dissected line by line. But the book covers more than just the functioning of the code; it explains the theoretical underpinnings of why Linux does things the way it does.
This edition of the book covers Version 2.6, which has seen significant changes to nearly every kernel subsystem, particularly in the areas of memory management and block devices. The book focuses on the following topics:Memory management, including file buffering, process swapping, and Direct memory Access (DMA) The Virtual Filesystem layer and the Second and Third Extended FilesystemsProcess creation and schedulingSignals, interrupts, and the essential interfaces to device driversTimingSynchronization within the kernelInterprocess Communication (IPC) Program execution
Understanding the Linux Kernel will acquaint you with all the inner workings of Linux, but it's more than just an academic exercise. You'll learn what conditions bring out Linux's best performance, and you'll see how it meets the challenge of providing good system response during process scheduling, file access, and memory management in a wide variety of environments. This book will help you make the most of your Linux system.
Joomla! is a free, open source PHP & MySQL-based content management system that allows you to create interactive, community-based Web sites without having to write or program code in PHP or ASP.NET. This fun and friendly introduction to Joomla! shows you how to create a rich, interactive Web site that does not require any code.
No matter your skill level, this easy-to-understand resource demonstrates how to drop preconfigured modules that already contain PHP and MySQL code directly into your Joomla! site. Thanks to the Dummies fun and friendly approach, you'll quickly see how easy to create a rich, interactive Web site with Joomla!Demonstrates how to create a business site—complete with shopping cart—quickly and easily Walks you through developing Web sites with discussions, RSS feeds, picture submissions, and more Includes coverage of the newest version of Joomla!, explains its completely new administrative features, and reviews its ability to provide different levels of access to different users via much-requested access control lists
Find out why Joomla! is the easiest way to build an interactive, community-based Web site!
Based on his nine years of experience as a program manager for Internet Explorer, and lead program manager for Windows and MSN, Berkun explains to technical and non-technical readers alike what it takes to get through a large software or web development project. Making Things Happen doesn't cite specific methods, but focuses on philosophy and strategy. Unlike other project management books, Berkun offers personal essays in a comfortable style and easy tone that emulate the relationship of a wise project manager who gives good, entertaining and passionate advice to those who ask.
Topics in this new edition include:How to make things happenMaking good decisionsSpecifications and requirementsIdeas and what to do with themHow not to annoy peopleLeadership and trustThe truth about making datesWhat to do when things go wrongComplete with a new forward from the author and a discussion guide for forming reading groups/teams, Making Things Happen offers in-depth exercises to help you apply lessons from the book to your job. It is inspiring, funny, honest, and compelling, and definitely the one book that you and your team need to have within arm's reach throughout the life of your project.
Coming from the rare perspective of someone who fought difficult battles on Microsoft's biggest projects and taught project design and management for MSTE, Microsoft's internal best practices group, this is valuable advice indeed. It will serve you well with your current work, and on future projects to come.
Best-selling author Adam Freeman explains how to get the most from AngularJS. He begins by describing the MVC pattern and the many benefits that can be gained from separating your logic and presentation code. He then shows how you can use AngularJS's features within in your projects to produce professional-quality results. Starting from the nuts-and-bolts and building up to the most advanced and sophisticated features AngularJS is carefully unwrapped, going in-depth to give you the knowledge you need.
Each topic is covered clearly and concisely and is packed with the details you need to learn to be truly effective. The most important features are given a no-nonsense in-depth treatment and chapters include common problems and details of how to avoid them.
More companies are turning to the power and simplicity of Umbraco's web content management system to build robust, customized sites. Written by leaders in the Umbraco community, this invaluable guide takes you through every aspect of this open source tool. Code samples using XHTML, CSS, XSLT, and C# are integrated throughout the pages to illustrate key concepts that you can apply. As you work through the chapters, you'll progress from building a basic Umbraco site to a sophisticated one that meets the needs of your organization.
Umbraco User's Guide:Explains how to install Umbraco and walks you through its XML structureDiscusses how to create templates while building your understanding of layoutsOffers best practices for developing content, designing types, organizing templates, and using the rich text editorWalks you through XSLT and .NET controlsHelps you build sample applications and troubleshoot any issues that ariseCovers how to create your own classified ads site by combining document types, templates, styles, macros, and more
Whether you're an aspiring manager, a current manager, or just wondering what the heck a manager does all day, there is a story in this book that will speak to you.
Moscow-born Sergey Brin and Midwest-born Larry Page dropped out of graduate school at Stanford University to, as they said, “change the world” through a powerful search engine that would organize every bit of information on the Web for free. The Google Story takes you deep inside the company’s wild ride from an idea that struggled for funding in 1998 to a firm that today rakes in billions in profits. Based on scrupulous research and extraordinary access to Google, this fast-moving narrative reveals how an unorthodox management style and a culture of innovation enabled a search-engine giant to shake up Madison Avenue, clash with governments that accuse it of being a monopoly, deploy self-driving cars to forever change how we travel, and launch high-flying Internet balloons. Unafraid of controversy, Google is surging ahead with artificial intelligence that could cure diseases but also displace millions of people from their jobs, testing the founders’ guiding mantra: DON’T BE EVIL.
Praise for The Google Story
“[The authors] do a fine job of recounting Google’s rapid rise and explaining its search business.”—The New York Times
“An intriguing insider view of the Google culture.”—Harvard Business Review
“An interesting read on a powerhouse company . . . If you haven’t read anything about one of today’s most influential companies, you should. If you don’t read The Google Story, you’re missing a few extra treats.”—USA Today
“Fascinating . . . meticulous . . . never bogs down.”—Houston Chronicle
Joomla!™ Programming presents proven best practices for getting the job done right. Written by Mark Dexter and Joomla! design architect Louis Landry (who wrote much of the new Joomla! framework), the text is packed with detailed examples and sample code, in-depth reference-style explanations available nowhere else, and fascinating sidebars revealing why Joomla! works the way it does.
All example code, updates, and more information on Joomla! programming are available at the companion website, joomlaprogrammingbook.com.
In Clean Code, legendary software expert Robert C. Martin has teamed up with his colleagues from Object Mentor to distill their best agile practice of cleaning code “on the fly” into a book that will instill within you the values of a software craftsman and make you a better programmer--but only if you work at it. You will be challenged to think about what’s right about that code and what’s wrong with it. More important, you will be challenged to reassess your professional values and your commitment to your craft.
In The Clean Coder, Martin introduces the disciplines, techniques, tools, and practices of true software craftsmanship. This book is packed with practical advice--about everything from estimating and coding to refactoring and testing. It covers much more than technique: It is about attitude. Martin shows how to approach software development with honor, self-respect, and pride; work well and work clean; communicate and estimate faithfully; face difficult decisions with clarity and honesty; and understand that deep knowledge comes with a responsibility to act.
Readers of this collection will come away understandingHow to tell the difference between good and bad code How to write good code and how to transform bad code into good code How to create good names, good functions, good objects, and good classes How to format code for maximum readability How to implement complete error handling without obscuring code logic How to unit test and practice test-driven development What it means to behave as a true software craftsman How to deal with conflict, tight schedules, and unreasonable managers How to get into the flow of coding and get past writer’s block How to handle unrelenting pressure and avoid burnout How to combine enduring attitudes with new development paradigms How to manage your time and avoid blind alleys, marshes, bogs, and swamps How to foster environments where programmers and teams can thrive When to say “No”--and how to say it When to say “Yes”--and what yes really means
The book lays a heavy emphasis on open source tools and step-by-step examples and includes information about Android applications needed for forensic investigations. It is organized into seven chapters that cover the history of the Android platform and its internationalization; the Android Open Source Project (AOSP) and the Android Market; a brief tutorial on Linux and Android forensics; and how to create an Ubuntu-based virtual machine (VM). The book also considers a wide array of Android-supported hardware and device types, the various Android releases, the Android software development kit (SDK), the Davlik VM, key components of Android security, and other fundamental concepts related to Android forensics, such as the Android debug bridge and the USB debugging setting. In addition, it analyzes how data are stored on an Android device and describes strategies and specific utilities that a forensic analyst or security engineer can use to examine an acquired Android device.
Core Android developers and manufacturers, app developers, corporate security officers, and anyone with limited forensic experience will find this book extremely useful. It will also appeal to computer forensic and incident response professionals, including commercial/private sector contractors, consultants, and those in federal government.Named a 2011 Best Digital Forensics Book by InfoSec ReviewsAbility to forensically acquire Android devices using the techniques outlined in the bookDetailed information about Android applications needed for forensics investigationsImportant information about SQLite, a file based structured data storage relevant for both Android and many other platforms.
Each chapter is written with recruitment relevance in mind, and includes Interview questions and further techniques to help match candidates to jobs.
This is a hugely significant work for the IT recruitment industry, but do not be daunted (those of you who are squeamish about IT jargon and terminology). Those who have attended Ayub's training will immediately relate to the uniquely simple, passionate and even humorous ways in which he puts across very complex IT concepts and principals. And his now famous easy-to-understand teaching style continues into this ground breaking book. IT knowledge is delivered in a reassuring and relaxed way; and the stories, trivia, and anecdotes flow throughout.
This is an instruction manual like no other. With The Complete IT Recruitment Survival Guide you have a constant, easy-to-understand yet knowledgeable companion as you tackle the murky waters of the world of IT recruitment.
By applying universal rules of software architecture, you can dramatically improve developer productivity throughout the life of any software system. Now, building upon the success of his best-selling books Clean Code and The Clean Coder, legendary software craftsman Robert C. Martin (“Uncle Bob”) reveals those rules and helps you apply them.
Martin’s Clean Architecture doesn’t merely present options. Drawing on over a half-century of experience in software environments of every imaginable type, Martin tells you what choices to make and why they are critical to your success. As you’ve come to expect from Uncle Bob, this book is packed with direct, no-nonsense solutions for the real challenges you’ll face–the ones that will make or break your projects.Learn what software architects need to achieve–and core disciplines and practices for achieving it Master essential software design principles for addressing function, component separation, and data management See how programming paradigms impose discipline by restricting what developers can do Understand what’s critically important and what’s merely a “detail” Implement optimal, high-level structures for web, database, thick-client, console, and embedded applications Define appropriate boundaries and layers, and organize components and services See why designs and architectures go wrong, and how to prevent (or fix) these failures
Clean Architecture is essential reading for every current or aspiring software architect, systems analyst, system designer, and software manager–and for every programmer who must execute someone else’s designs.
Register your product for convenient access to downloads, updates, and/or corrections as they become available.
ASP.NET MVC 5 contains a number of advances over previous versions, including the ability to define routes using C# attributes and the ability to override filters. The user experience of building MVC applications has also been substantially improved. The new, more tightly integrated, Visual Studio 2013 IDE has been created specifically with MVC application development in mind and provides a full suite of tools to improve development times and assist in reporting, debugging and deploying your code.
The Discipline of Organizing synthesizes insights from library science, information science, computer science, cognitive science, systems analysis, business, and other disciplines to create an Organizing System for understanding organizing. This framework is robust and forward-looking, enabling effective sharing of insights and design patterns between disciplines that weren't possible before.
The 4th edition of this award-winning and widely adopted text adds content to bridge between the foundations of organizing systems and the new statistical and computational techniques of data science because at its core, data science is about how resources are described and organized. The 4th edition reframes descriptive statistics as organizing techniques, expands the treatment of classification to include computational methods, and incorporates many new examples of data-driven resource selection, organization, maintenance, and personalization.
The Core Concepts edition is an abridged version that is simpler to read because it does not tempt the reader with the deep scholarly web of endnotes contained in the Professional edition. Instead, it seeks to reinforce the concepts and design patterns with numerous "Stop and Think" exercises, and omits some of the theoretical nuance of the Professional edition to put more emphasis on concrete examples.
Cryptography is vital to keeping information safe, in an erawhen the formula to do so becomes more and more challenging.Written by a team of world-renowned cryptography experts, thisessential guide is the definitive introduction to all major areasof cryptography: message security, key negotiation, and keymanagement. You'll learn how to think like a cryptographer. You'lldiscover techniques for building cryptography into products fromthe start and you'll examine the many technical changes in thefield.
After a basic overview of cryptography and what it means today,this indispensable resource covers such topics as block ciphers,block modes, hash functions, encryption modes, messageauthentication codes, implementation issues, negotiation protocols,and more. Helpful examples and hands-on exercises enhance yourunderstanding of the multi-faceted field of cryptography.An author team of internationally recognized cryptographyexperts updates you on vital topics in the field ofcryptographyShows you how to build cryptography into products from thestartExamines updates and changes to cryptographyIncludes coverage on key servers, message security,authentication codes, new standards, block ciphers, messageauthentication codes, and more
Cryptography Engineering gets you up to speed in theever-evolving field of cryptography.
It offers a thorough explanation of how computer networks function, how they can be involved in crimes, and how they can be used as a source of evidence. In particular, it addresses the abuse of computer networks as well as privacy and security issues on computer networks.
This updated edition is organized into five parts. Part 1 is about digital forensics and covers topics ranging from the use of digital evidence in the courtroom to cybercrime law. Part 2 explores topics such as how digital investigations are conducted, handling a digital crime scene, and investigative reconstruction with digital evidence. Part 3 deals with apprehending offenders, whereas Part 4 focuses on the use of computers in digital investigation. The book concludes with Part 5, which includes the application of forensic science to networks.
New to this edition are updated information on dedicated to networked Windows, Unix, and Macintosh computers, as well as Personal Digital Assistants; coverage of developments in related technology and tools; updated language for search warrant and coverage of legal developments in the US impacting computer forensics; and discussion of legislation from other countries to provide international scope. There are detailed case examples that demonstrate key concepts and give students a practical/applied understanding of the topics, along with ancillary materials that include an Instructor's Manual and PowerPoint slides.
This book will prove valuable to computer forensic students and professionals, lawyers, law enforcement, and government agencies (IRS, FBI, CIA, CCIPS, etc.).Named The 2011 Best Digital Forensics Book by InfoSec ReviewsProvides a thorough explanation of how computers & networks function, how they can be involved in crimes, and how they can be used as evidence Features coverage of the abuse of computer networks and privacy and security issues on computer networks
From Michael J. Casey and Paul Vigna, the authors of The Age of Cryptocurrency, comes the definitive work on the Internet’s Next Big Thing: The Blockchain.
Big banks have grown bigger and more entrenched. Privacy exists only until the next hack. Credit card fraud is a fact of life. Many of the “legacy systems” once designed to make our lives easier and our economy more efficient are no longer up to the task. Yet there is a way past all this—a new kind of operating system with the potential to revolutionize vast swaths of our economy: the blockchain.
In The Truth Machine, Michael J. Casey and Paul Vigna demystify the blockchain and explain why it can restore personal control over our data, assets, and identities; grant billions of excluded people access to the global economy; and shift the balance of power to revive society’s faith in itself. They reveal the disruption it promises for industries including finance, tech, legal, and shipping.
Casey and Vigna expose the challenge of replacing trusted (and not-so-trusted) institutions on which we’ve relied for centuries with a radical model that bypasses them. The Truth Machine reveals the empowerment possible when self-interested middlemen give way to the transparency of the blockchain, while highlighting the job losses, assertion of special interests, and threat to social cohesion that will accompany this shift. With the same balanced perspective they brought to The Age of Cryptocurrency, Casey and Vigna show why we all must care about the path that blockchain technology takes—moving humanity forward, not backward.
You're not alone. For thousands of like-minded around the globe, the answer is Joomla!, an open-source content management system (CMS) used to manage all sorts of data over the Web.
While Joomla! is relatively easy to install, a fair amount of knowledge is required in order to configure the application to your specific needs. Foundation Joomla! is an entry developer and user's guide that gets you started with this popular CMS in little or no time.
Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class.
This book is an ideal resource for security consultants, beginning InfoSec professionals, and students.Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases.Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University.Utilizes the Kali Linux distribution and focuses on the seminal tools required to complete a penetration test.
The first edition of Ralph Kimball's The Data WarehouseToolkit introduced the industry to dimensional modeling,and now his books are considered the most authoritative guides inthis space. This new third edition is a complete library of updateddimensional modeling techniques, the most comprehensive collectionever. It covers new and enhanced star schema dimensional modelingpatterns, adds two new chapters on ETL techniques, includes new andexpanded business matrices for 12 case studies, and more.Authored by Ralph Kimball and Margy Ross, known worldwide aseducators, consultants, and influential thought leaders in datawarehousing and business intelligenceBegins with fundamental design recommendations and progressesthrough increasingly complex scenariosPresents unique modeling techniques for business applicationssuch as inventory management, procurement, invoicing, accounting,customer relationship management, big data analytics, and moreDraws real-world case studies from a variety of industries,including retail sales, financial services, telecommunications,education, health care, insurance, e-commerce, and more
Design dimensional databases that are easy to understand andprovide fast query response with The Data WarehouseToolkit: The Definitive Guide to Dimensional Modeling, 3rdEdition.
At any given moment, someone struggles with the same software design problems you have. And, chances are, someone else has already solved your problem. This edition of Head First Design Patterns—now updated for Java 8—shows you the tried-and-true, road-tested patterns used by developers to create functional, elegant, reusable, and flexible software. By the time you finish this book, you’ll be able to take advantage of the best design practices and experiences of those who have fought the beast of software design and triumphed.
What’s so special about this book?
We think your time is too valuable to spend struggling with new concepts. Using the latest research in cognitive science and learning theory to craft a multi-sensory learning experience, Head First Design Patterns uses a visually rich format designed for the way your brain works, not a text-heavy approach that puts you to sleep.
This book will help you:Become a contributor on a data science teamDeploy a structured lifecycle approach to data analytics problemsApply appropriate analytic techniques and tools to analyzing big dataLearn how to tell a compelling story with data to drive business actionPrepare for EMC Proven Professional Data Science Certification
Corresponding data sets are available at www.wiley.com/go/9781118876138.
Get started discovering, analyzing, visualizing, and presenting data in a meaningful way today!
Information Technology for Management by Turban, Volonino, and Wood engages students with up-to-date coverage of the most important IT trends today. Over the years, this leading IT textbook had distinguished itself with an emphasis on illustrating the use of cutting edge business technologies for achieving managerial goals and objectives.
The 10th Edition continues this tradition with coverage of emerging trends in Mobile Computing and Commerce, IT virtualization, Social Media, Cloud Computing and the Management and Analysis of Big Data along with advances in more established areas of Information Technology.
Now in its 6th edition, the best selling book on MVC is now updated for ASP.NET Core MVC. It contains detailed explanations of the new Core MVC functionality which enables developers to produce leaner, cloud optimized and mobile-ready applications for the .NET platform. This book puts ASP.NET Core MVC into context and dives deep into the tools and techniques required to build modern, cloud optimized extensible web applications. All the new MVC features are described in detail and the author explains how best to apply them to both new and existing projects.The ASP.NET Core MVC Framework is the latest evolution of Microsoft’s ASP.NET web platform, built on a completely new foundation. It represents a fundamental change to how Microsoft constructs and deploys web frameworks and is free of the legacy of earlier technologies such as Web Forms. ASP.NET Core MVC provides a "host agnostic" framework and a high-productivity programming model that promotes cleaner code architecture, test-driven development, and powerful extensibility.
Best-selling author Adam Freeman has thoroughly revised this market-leading book and explains how to get the most from ASP.NET Core MVC. He starts with the nuts-and-bolts and shows you everything through to advanced features, going in-depth to give you the knowledge you need.This book follows the same format and style as the popular previous editions but brings everything up to date for the new ASP.NET Core MVC release. It presents a fully worked case study of a functioning ASP.NET MVC application that readers can use as a template for their own projects.
What You Will Learn:Gain a solid architectural understanding of ASP.NET Core MVC
Explore the entire ASP.NET MVC Framework as a cohesive whole
See how MVC and test-driven development work in action
Learn what's new in ASP.NET Core MVC and how best to apply these new features to your own work
See how to create RESTful web services and Single Page Applications
Build on your existing knowledge of previous MVC releases to get up and running with the new programming model quickly and effectively
Who This Book Is For:
This book is for web developers with a basic knowledge of ASP.NET and C# who want to incorporate the latest improvements and functionality in the new ASP.NET Core MVC Framework.
Discover the timeless techniques and strategies that help you:
Design for minimum complexity and maximum creativity Reap the benefits of collaborative development Apply defensive programming techniques to reduce and flush out errors Exploit opportunities to refactor—or evolve—code, and do it safely Use construction practices that are right-weight for your project Debug problems quickly and effectively Resolve critical construction issues early and correctly Build quality into the beginning, middle, and end of your project
The book is organized into 7 chapters that cover hacking tools such as Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. PowerPoint slides are available for use in class.
This book is an ideal reference for security consultants, beginning InfoSec professionals, and students.Named a 2011 Best Hacking and Pen Testing Book by InfoSec ReviewsEach chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases.Writen by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University.Utilizes the Backtrack Linus distribution and focuses on the seminal tools required to complete a penetration test.
In The Clean Coder: A Code of Conduct for Professional Programmers, legendary software expert Robert C. Martin introduces the disciplines, techniques, tools, and practices of true software craftsmanship. This book is packed with practical advice–about everything from estimating and coding to refactoring and testing. It covers much more than technique: It is about attitude. Martin shows how to approach software development with honor, self-respect, and pride; work well and work clean; communicate and estimate faithfully; face difficult decisions with clarity and honesty; and understand that deep knowledge comes with a responsibility to act.
Readers will learnWhat it means to behave as a true software craftsman How to deal with conflict, tight schedules, and unreasonable managers How to get into the flow of coding, and get past writer’s block How to handle unrelenting pressure and avoid burnout How to combine enduring attitudes with new development paradigms How to manage your time, and avoid blind alleys, marshes, bogs, and swamps How to foster environments where programmers and teams can thrive When to say “No”–and how to say it When to say “Yes”–and what yes really means
Great software is something to marvel at: powerful, elegant, functional, a pleasure to work with as both a developer and as a user. Great software isn’t written by machines. It is written by professionals with an unshakable commitment to craftsmanship. The Clean Coder will help you become one of them–and earn the pride and fulfillment that they alone possess.
Until recently, ASP.NET MVC was regarded as an advanced technology only suitable for experienced developers with a strong knowledge of classic ASP.NET and C# coding behind them. This book overturns that prejudice and shows that the beautiful simplicity of ASP.NET MVC is just as suitable for novice developers venturing into real-world application design for the first time.
With the aid of a fully worked demo application this book explains and demonstrates for you the three pillars of MVC in action. You’ll see howthe Model, View and Controller patterns work together in a compliementary manner to provide MVC’s powerful results.
There’s never been a better time to learn how to use ASP.NETMVC 4. The technology will speed your development times, reduce the verbosity of your code and simplify your application designs all at once. Take the first step towards ASP.NET MVC mastery with Beginning ASP.NET MVC 4.
That said, because PHP is primarily a Web technology, it willhelp if you have at least some knowledge of other Web technologies,particularly HTML and CSS.
Many Web applications make use of a database to store data, andthis book contains three chapters on working with MySQL databases.Once again, if you’re already familiar with databases ingeneral — and MySQL in particular — you’ll beable to fly through these chapters. However, even if you’venever touched a database before in your life, you should still beable to pick up a working knowledge by reading through thesechapters.
The potential user base and the wide array of available high-performance devices makes Android an attractive target for aspiring game developers. Do you have an awesome idea for the next break-through mobile gaming title? Beginning Android Games will help you kick-start your project. This book will guide you through the process of making several example game apps using APIs available in new Android SDK and earlier SDK releases for Android smartphones and tablets:The fundamentals of game development and design suitable for Android smartphones and tablets The Android platform basics to apply those fundamentals in the context of making a game, including new File Manager system and better battery life management The design of 2D and 3D games and their successful implementation on the Android platform
This book lets developers see and use some Android SDK Jelly Bean; however, this book is structured so that app developers can use earlier Android SDK releases. This book is backward compatible like the Android SDK.
Google BigQuery Analytics is the perfect guide for business and data analysts who want the latest tips on running complex queries and writing code to communicate with the BigQuery API. The book uses real-world examples to demonstrate current best practices and techniques, and also explains and demonstrates streaming ingestion, transformation via Hadoop in Google Compute engine, AppEngine datastore integration, and using GViz with Tableau to generate charts of query results. In addition to the mechanics of BigQuery, the book also covers the architecture of the underlying Dremel query engine, providing a thorough understanding that leads to better query results.Features a companion website that includes all code and data sets from the bookUses real-world examples to explain everything analysts need to know to effectively use BigQueryIncludes web application examples coded in Python
Practical Node.js is your step-by-step guide to learning how to build a wide range of scalable real-world web applications using a professional development toolkit. Node.js is an innovative and highly efficient platform for creating web services. But Node.js doesn't live in a vacuum! In a modern web development, many different components need to be put together — routing, database driver, ORM, session management, OAuth, HTML template engine, CSS compiler and many more.
If you already know the basics of Node.js, now is the time to discover how to bring it to production level by leveraging its vast ecosystem of packages. As a web developer, you'll work with a varied collection of standards and frameworks - Practical Node.js shows you how all those pieces fit together.
Practical Node.js takes you from installing all the necessary modules to writing full-stack web applications by harnessing the power of the Express.js and Hapi frameworks, the MongoDB database with Mongoskin and Mongoose, Jade and Handlebars template engines, Stylus and LESS CSS languages, OAuth and Everyauth libraries, and the Socket.IO and Derby libraries, and everything in between. The book also covers how to deploy to Heroku and AWS, daemonize apps, and write REST APIs. You'll build full-stack real-world Node.js apps from scratch, and also discover how to write your own Node.js modules and publish them on NPM. You already know what Node.js is; now learn what you can do with it and how far you can take it!
The book explains the concepts with the help of practical real-world scenarios and examples. You'll also work with hands-on exercises at the end of each chapter to get a feel of the subject. Thus this book would be a valuable resource to any individual planning to prepare for the CEH certification course.
What You Will LearnGain the basics of hacking (apps, wireless devices, and mobile platforms)Discover useful aspects of databases and operating systems from a hacking perspectiveDevelop sharper programming and networking skills for the examExplore the penetration testing life cycle Bypass security appliances like IDS, IPS, and honeypotsGrasp the key concepts of cryptographyDiscover the career paths available after certificationRevise key interview questions for a certified ethical hackerWho This Book Is For
Beginners in the field of ethical hacking and information security, particularly those who are interested in the CEH course and certification.