Browse Results

Showing 12,076 through 12,100 of 53,623 results

Take Control of Apple Mail

by Joe Kissell

Master Mail in Mavericks and iOS 7! Email is essential for everything from work to shopping to keeping in touch with family. Could you get anything done without it? In this book, email expert Joe Kissell helps you make sure Apple Mail won't leave you in the lurch, providing essential setup, usage, and troubleshooting advice, whether you use Gmail, iCloud, Exchange, or IMAP -- or more than one -- in both OS X 10.9 Mavericks on your Mac and iOS 7 on your iPad, iPhone, or iPod touch.Along the way, Joe explains core concepts like special IMAP mailboxes and email archiving, reveals Mail's hidden interface elements, and offers tips on customizing Mail to your preferences (including the best power-user plugins for Mail on the Mac). You'll also learn how to find that message in the haystack, figure out how digital signatures and encryption work in Mail, and uncover solutions to numerous common problems. Perhaps most important, Joe shares his strategy for avoiding email overload; the article where he first introduced it won American Business Media's Neal Award for Best How-To Article.Using the fully linked table of contents, Quick Start page, or other hot links in the ebook, you'll quickly find the essential information that's most important to you, including: * Key changes in Mail for Mavericks * Interesting new features in Mail for iOS 7 * Setting Mail's Junk Mail filter correctly and other tips for defeating spam * Understanding special mailboxes like Sent, Drafts, and Junk * Addressing email to multiple recipients -- and to smart groups * Using notifications to manage incoming messages * Turning on the much-loved classic window arrangement * Customizing the Mail sidebar, toolbar, message header interface, and more * Using search tokens AND understanding Boolean searches * Joe's suggested smart mailboxes * Taking charge of email organization with rules and other measures * Keeping attachments problem-free * 12 things you should know about iOS Mail * Fixing problems: receiving, sending, logging in, bad mailboxes, and more * Mail plugins that will improve your Mail experience * How to decide if you should encrypt your email * Detailed, real-world steps for signing and encrypting email

Take Control of Your Digital Photos on a Mac

by Jeff Carlson

Build a digital workflow to import, tag, rate, and organize your photos!Why bother taking photos if you can't find them later? If you want to be able to lay your hands on any given photo in your ever-expanding library, digital photography expert Jeff Carlson has developed a simple system you can use to make your photo collection browsable, searchable, and generally navigable!Jeff leads off by helping you understand the strengths and weaknesses of the four most popular photo-management applications: iPhoto and Aperture from Apple, and Lightroom and Photoshop Elements from Adobe. Once you've picked the app that's right for you (and there's a chapter on migrating photos), you'll learn how to create a custom workflow for importing, evaluating, keywording, and tagging your photos so they are quickly sorted into logical groups. For each of these essential aspects of your workflow, Jeff provides step-by-step instructions for each of the four covered applications. And since it's all too easy to lose everything if you don't have backups, Jeff discusses the best way to back up and archive your photos to protect your irreplaceable photographic memories.In the process of creating your custom digital photo workflow, you'll find expert advice about each of these photo-management topics:Shooting smarter: Make sure your camera is set to the correct time (and time zone), choose a file format, and think about capturing geolocation data while you're out taking photos.Choosing the right app: Learn about the pros and cons of the most popular photo-management applications--iPhoto, Aperture, Lightroom, and Photoshop Elements--and find directions for how to migrate your photos from iPhoto to Aperture or Lightroom, or from Aperture to Lightroom.Importing photos: Make your Mac apply keywords and other tags in a batch during import, and make sure you're storing files in a place that makes sense going forward.Judging photos: Get time-tested tips for rating individual photos and learn how to deal with bad photos, whether you want to delete them, hide them, or leave them be.Assigning metadata: Once your camera and your computer have assigned as much metadata as possible automatically, you'll need to do the final bits yourself. Jeff describes how to think about this process, and he gives you specific steps for how to proceed efficiently.Putting photos in albums: With your metadata successfully applied, it's time to enjoy the fruits of your labor! Learn how to set up smart albums to collect and display your photos automatically.Planning for the future: Digital photos can't be damaged by water or tossed accidentally when cleaning house, but at the same time, a hard disk failure could destroy every photo you own. And what about preserving them for your kids? Jeff discusses how you can back up your precious photos and archive them for future generations.Bonus! Includes a 20% off coupon for SizzlPix!, high-def photographic prints infused onto an aluminum base. These hand-crafted prints are largely free of glare, are waterproof (some are installed in showers and pools), and have an ultra-hard coating that renders them virtually scratch-proof.

Mastering Unity Shaders and Effects

by Jamie Dean

Harness the power of Unity 5 tools to write shaders and create stunning effects for next generation games About This Book * Leverage the power of Unity 5 compatible shaders to create a variety of realistic surfaces * Create amazing visual effects for your Unity 5.x games by blending advanced post-processing techniques and lighting effects * Add that extra visual edge to your games by learning pro level techniques Who This Book Is For This book is for users who are familiar with creating Unity projects and are looking for the next step to create stunning high-end visuals in their game project using the latest tools and features. You are expected to understand the creation of basic Unity projects, game object types, and scene navigation. You will need some basic programming experience in C# or JavaScript. What You Will Learn * Build your own custom shaders to suit a variety of organic and inorganic surfaces * Create amazing visual effects using Unity 5's improved toolset * Compare the advantages of Metallic and Specular workflows in Unity's Physically Based Lighting System * Take your Unity 5 project to the next level with advanced real-time and baked lighting methods * Design powerful particle effects * Find out how shaders, materials, and scripts work together within the Unity framework * Develop high-end and optimized game visuals suitable for mobile devices and other platforms In Detail With the inclusion of Physically Based Shading and the Standard Shader, Unity has changed the game for independent and large scale developers alike. Never before has it been so easy to create startling high quality visuals in games and other interactive projects. This book will give you a solid understanding of the interaction of shaders, lighting and effects in Unity 5, and give you some great ideas for how you can maximize the visual impact of your own games for PC, mobile and other platforms. In the sequence of chapters you will find solutions to some of the major challenges to the creation of responsive and realistic looking games. As you work on example scenes, you will get to know the syntax of ShaderLab and CG languages, creating simple and complex shader solutions for a variety of different surface effects. You will see how Unity's responsive lighting solutions can be harnessed to build immersive and appealing game experiences. Style and approach This is the most up-to-date resource on creating amazing visual effects for your Unity 5.x games. With the perfect mix of advanced techniques and their illustrations in real-world examples, this is the most comprehensive advanced guide on Unity shaders and effects you'll find.

Learning Unity Physics

by K. Aava Rani

If you are familiar with the fundamentals of Physics and have basic experience of Unity game development, but have no knowledge of using the two together, then this book is for you.

GitHub Essentials

by Achilleas Pipinellis

Unleash the power of collaborative development workflow using GitHub, one step at a time About This Book * Effectively use GitHub by learning its key features that leverage the power of Git and make collaboration on code easy to work with. * Be more productive on the development workflow of your projects using the valuable toolset that GitHub provides. * Explore the world of GitHub by following simple step-by-step real world scenarios accompanied by helpful, explanatory screenshots Who This Book Is For Intended for experienced or novice developers with a basic knowledge of Git. If you ever wanted to learn how big projects like Twitter, Google or even GitHub collaborate on code then this book is for you What You Will Learn * Create and upload repositories to your account * Create organizations and manage teams with different access levels on repositories * Use effectively the issue tracker and add context to issues with labels and milestones * Schedule and release versions of your software * Work effectively with a team and collaborate on code * Create, access, and personalize your user account and profile settings * Build a community around your project using the sophisticated tools GitHub provides * Build easy to deploy, free of charge static websites for your projects In Detail Whether you are an experienced developer or a novice, learning to work with Version Control Systems is a must in the software development world. Git is the most popular tool for that purpose and GitHub was built around it leveraging its powers by bringing it to the web. Starting with the basics of creating a repository you will then learn how to manage the issue tracker, the place where discussion about your project takes place. Continuing our journey we will explore how to use the wiki and write rich documentation that will accompany your project. Organization and team management will be the next stop and then onto the feature that made GitHub so well known, Pull Requests. Next we focus on creating simple web pages hosted on GitHub and lastly we explore the settings that are configurable for a user and a repository. Style and approach A step-by-step guide with real world scenarios accompanied by helpful images. Each topic is thoroughly explained with hands-on-examples and code where needed. At the end of each chapter there is a Tips and tricks section presenting hidden or overlooked features of GitHub.

Git Best Practices Guide

by Eric Pidoux

If you are a developer and you want to completely master Git without heavy theory, this is the book for you. A reasonable knowledge level and basic understanding of Git concepts will get you started with this book.

Take Control of 1Password, Second Edition

by Joe Kissell

Easily create and enter secure passwords on all your devices!Remembering and entering Web passwords can be easy and secure, thanks to 1Password, the popular password manager from AgileBits. In this book, Joe Kissell brings years of real-world 1Password experience into play to explain not only how to create, edit, and enter Web login data easily, but also how to autofill contact and credit card info when shopping online, audit your passwords and generate better ones, and sync and share your passwords using a variety of techniques--including 1Password for Teams. Joe focuses on 1Password 6 for the Mac, but he also provides details and directions for the iOS, Windows, and Android versions of 1Password.Meet 1Password: Set your master passcode, explore the various 1Password components, and decide on your ideal usage strategy."While reading Take Control of 1Password on my iPad I was furiously highlighting passages and following along with 1Password open on my Mac. [The book] showed me how some of my passwords were weak or duplicates. I immediately changed those passwords to unique and secure ones. "--Elisa Pacelli, in her MyMac book review.Master logins: In 1Password, a typical login contains a set of credentials used to sign in to a Web site. Find out how to create logins, sort them, search them, tag them, and more. You'll especially find help with editing logins. For example, if you change a site's password from dragon7 to eatsevendragonsforlunchatyahoo, you'll want to incorporate that into its login. Or, use 1Password's password generator to create highly secure random passwords, like dGx7Crve3WucELF#s.Understand password security: Get guidance on what makes for a good password, and read Joe's important Password Dos and Don'ts. A special topic covers how to perform a security audit in order to improve poor passwords quickly.Go beyond Web logins: A primary point of 1Password is to speed up Web logins, but 1Password can also store and autofill contact information (for more than one identity, even), along with credit card information. You'll also find advice on storing passwords for password-protected files and encrypted disk images, plus ideas for keeping track of confidential files, scans of important cards or documents, and more.Sync your passwords: Discover which 1Password syncing solution is right for you: Dropbox, iCloud, or a Finder folder, as well as a device-to-device Wi-Fi sync.Share your passwords: Learn how 1Password integrates with the 1Password for Teams online service for sharing passwords within groups, such as your family or company work group.You'll also discover the answers to key questions, including:Should I use my Web browser's autofill feature?What about iCloud Keychain? Should I use that too?What can I do quickly to get better password security?Should I buy 1Password from AgileBits or the Mac App Store?How can I find and update weak passwords I created long ago?What's the best way to work with the password generator?What should I do about security questions, like the name of my pet?How can 1Password provide a time-based one-time password (TOTP)? How can I access my 1Password data on another person's computer?How do I initiate 1Password logins from utilities like LaunchBar?

Take Control of Dropbox

by Joe Kissell

Sync, link, and share your files!Because Dropbox is so simple to use for basic file syncing, it's easy to forget that you can do far more with it than just sync files between two computers. If that's all you're doing, you're missing out!Author Joe Kissell explains why Dropbox is cool, shares best practices for using Dropbox on your own or with a group, helps you avoid common mistakes, clues you in to newer and advanced collaboration features, teaches you how to secure your Dropbox account, and describes unusual uses of Dropbox.Readers can quickly benefit from the book: new users can start in the "Dropbox Quick Start," which directs you to beginner basics or to special information for people who just want to access a shared Dropbox document.But, for those who already know Dropbox basics, "Check Your Dropbox Skills" routes you immediately to help with exciting new features that you may not yet have mastered -- or even been aware of(!) -- such as Dropbox Team, Dropbox Paper collaboration, file requests, and Office integration/collaboration.Teach This Book! Because a powerful aspect of Dropbox is sharing files with others, you may want to help your colleagues and friends use it. To that end, Take Control of Dropbox includes links to a downloadable 1-page PDF handout and to a 21-slide PDF-based presentation.Joe focuses on using Dropbox from a Macintosh or Windows PC, or Linux, but part of why this book has crept up to 151 pages in its second edition is that he has included helpful details for integrating a mobile device (primarily iOS and Android) into your Dropbox workflow.You'll find out how to:Recover accidentally deleted or revised files.Put new photos and videos into Dropbox with Camera Upload and share them easily.Sync data from Dropbox-savvy apps on all your devices (apps like 1Password, DEVONthink, and GoodReader). Make sure you're set up optimally by checking a few account-related details. These include security settings and methods of getting more storage space.Edit shared Office documents on the Dropbox Web site -- you don't need to have Office installed locally on your computer or subscribe to Office 365.Work with the Dropbox badge if you are editing a Dropbox-shared Office file on your local computer.Open PDFs from Dropbox from within Adobe Acrobat DC or Acrobat Reader DC -- and save any changes back to Dropbox.Set up a Dropbox team: learn how it works, and how to control who can do what and when.Create a Dropbox folder that other people can drop files into, but not see inside of.Unlink and remote-wipe Dropbox from a stolen device.Joe also shares examples of interesting Internet services that can interact with files that you put in your Dropbox folder to publish a blog, automate Web activities, automate your Mac, sync with other cloud services, and even publish a book like this one!

Take Control of Your Passwords (2.0)

by Joe Kissell

Improve your passwords without losing your cool, thanks to Joe Kissell's expert advice. Start on the path to modern password security by watching Joe's intro video and by checking out our Joe of Tech comic in the Contents &amp; Intro tab below (scroll down!). Read the book to understand the problems and apply a real-world strategy that includes choosing a password manager, auditing your existing passwords, and dealing with situations where automated tools can't help. "Awesome. You did an amazing job breaking it down. This should be mandatory reading." --Rich Mogull, CEO at Securosis</p>\n\n<p>This ebook helps you overcome frustrations that arise when attempting to design a strategy for dealing with the following password problems:</p>\n\n<ul><li><p>9-character passwords with upper- and lowercase letters, digits, and punctuation are NOT strong enough.</p></li>\n<li><p>You CANNOT turn a so-so password into a great one by tacking a punctuation character and number on the end.</p></li>\n<li><p>It is NOT safe to use the same password everywhere, even if it's a great password.</p></li>\n<li><p>A password is NOT immune to automated cracking because there's a delay between login attempts.</p></li>\n<li><p>Even if you're an ordinary person without valuable data, your account may STILL be hacked, causing you problems.</p></li>\n<li><p>You can NOT manually devise "random" passwords that will defeat potential attackers.</p></li>\n<li><p>Just because a password doesn't appear in a dictionary, that does NOT necessarily mean that it's adequate.</p></li>\n<li><p>It is NOT a smart idea to change your passwords every month.</p></li>\n<li><p>Truthfully answering security questions like "What is your mother's maiden name?" does NOT keep your data more secure.</p></li>\n<li><p>Adding a character to a 10-character password does NOT make it 10 percent stronger.</p></li>\n<li><p>Easy-to-remember passwords like "correct horse battery staple" will NOT solve all your password problems.</p></li>\n<li><p>All password managers are NOT pretty much the same.</p></li>\n<li><p>Your passwords will NOT be safest if you never write them down and keep them only in your head.</p></li>\n</ul><p class="quote">"Joe handles a confusing and scary subject more clearly and calmly than I would have thought possible. I'll be recommending this book to just about everybody I know." --William Porter, database developer, author, photographer</p></div>

Hadoop Application Architectures

by Mark Grover Jonathan Seidman Gwen Shapira Ted Malaska

Get expert guidance on architecting end-to-end data management solutions with Apache Hadoop. While many sources explain how to use various components in the Hadoop ecosystem, this practical book takes you through architectural considerations necessary to tie those components together into a complete tailored application, based on your particular use case.To reinforce those lessons, the book's second section provides detailed examples of architectures used in some of the most commonly found Hadoop applications. Whether you're designing a new Hadoop application, or planning to integrate Hadoop into your existing data infrastructure, Hadoop Application Architectures will skillfully guide you through the process.This book covers:Factors to consider when using Hadoop to store and model dataBest practices for moving data in and out of the systemData processing frameworks, including MapReduce, Spark, and HiveCommon Hadoop processing patterns, such as removing duplicate records and using windowing analyticsGiraph, GraphX, and other tools for large graph processing on HadoopUsing workflow orchestration and scheduling tools such as Apache OozieNear-real-time stream processing with Apache Storm, Apache Spark Streaming, and Apache FlumeArchitecture examples for clickstream analysis, fraud detection, and data warehousing

Mastering Elasticsearch - Second Edition

by Rafal Kuc Marek Rogozinski

This book is for Elasticsearch users who want to extend their knowledge and develop new skills. Prior knowledge of the Query DSL and data indexing is expected.

AngularJS by Example

by Chandermani

If you've always wanted to get started with AngularJS, this is an essential guide designed to help you do exactly that. Start building applications immediately with the featured examples, and uncover a simpler approach to JavaScript web development. You will need some prior experience with HTML, CSS, and JavaScript to get started.

Learning Android Application Development

by Raimon Rafols Montane Laurence Dawson

Build Android N applications using modern techniques and libraries to get your own high-quality apps published on Google Play in no time About This Book * Get started with Android development, from the installation of required tools to publishing to the market * Make your applications Android N ready--Android has evolved quite a lot since the very beginning and so has their Software Development Kit--so get up to speed * Save time and improve the quality of your applications with widely used open source libraries and dependency management Who This Book Is For Want to get started with Android development? Start here. What You Will Learn * Get to know how to use popular open source libraries to reduce time to market and avoid re-inventing the wheel * Automate your application's testing phase to avoid last minute crashes * Use dependency management to properly keep dependencies and updates under control * Efficiently show huge amounts of items in a list * Forget about memory and speed concerns * Publish and monetize your Android applications on Google Play * Persist your application data so it can continue working in offline mode * Don't let the UX break because of network issues In Detail The mobile app market is huge. But where do you start? And how you can deliver something that takes Google Play by storm? This guide is the perfect route into Android app development - while it's easy for new apps to sink without a trace, we'll give you the best chance of success with practical and actionable guidance that will unlock your creativity and help you put the principles of Android development into practice. From the fundamentals and getting your project started to publishing your app to a huge market of potential customers, follow this guide to become a confident, creative and reliable mobile developer. Get to grips with new components in Android 7 such as RecyclerView, and find out how to take advantage of automated testing, and, of course, much, much more. What are you waiting for? There's never been a better time - or a better way - to get into Android app development. Style and approach More than just a manual, this is an accessible route into Android development. Packed with examples that demonstrate how to put key concepts and ideas into practice, this guide isn't just about learning, it's about immediate development.

Learning F# Functional Data Structures and Algorithms

by Adnan Masood

If you have just started your adventure with F#, then this book will help you take the right steps to become a successful F# coder. An intermediate knowledge of imperative programming concepts, and a basic understanding of the algorithms and data structures in .NET environments using the C# language and BCL (Base Class Library), would be helpful.

Julia for Data Science

by Anshul Joshi

Explore the world of data science from scratch with Julia by your side About This Book * An in-depth exploration of Julia's growing ecosystem of packages * Work with the most powerful open-source libraries for deep learning, data wrangling, and data visualization * Learn about deep learning using Mocha.jl and give speed and high performance to data analysis on large data sets Who This Book Is For This book is aimed at data analysts and aspiring data scientists who have a basic knowledge of Julia or are completely new to it. The book also appeals to those competent in R and Python and wish to adopt Julia to improve their skills set in Data Science. It would be beneficial if the readers have a good background in statistics and computational mathematics. What You Will Learn * Apply statistical models in Julia for data-driven decisions * Understanding the process of data munging and data preparation using Julia * Explore techniques to visualize data using Julia and D3 based packages * Using Julia to create self-learning systems using cutting edge machine learning algorithms * Create supervised and unsupervised machine learning systems using Julia. Also, explore ensemble models * Build a recommendation engine in Julia * Dive into Julia's deep learning framework and build a system using Mocha.jl In Detail Julia is a fast and high performing language that's perfectly suited to data science with a mature package ecosystem and is now feature complete. It is a good tool for a data science practitioner. There was a famous post at Harvard Business Review that Data Scientist is the sexiest job of the 21st century. (https://hbr.org/2012/10/data-scientist-the-sexiest-job-of-the-21st-century). This book will help you get familiarised with Julia's rich ecosystem, which is continuously evolving, allowing you to stay on top of your game. This book contains the essentials of data science and gives a high-level overview of advanced statistics and techniques. You will dive in and will work on generating insights by performing inferential statistics, and will reveal hidden patterns and trends using data mining. This has the practical coverage of statistics and machine learning. You will develop knowledge to build statistical models and machine learning systems in Julia with attractive visualizations. You will then delve into the world of Deep learning in Julia and will understand the framework, Mocha.jl with which you can create artificial neural networks and implement deep learning. This book addresses the challenges of real-world data science problems, including data cleaning, data preparation, inferential statistics, statistical modeling, building high-performance machine learning systems and creating effective visualizations using Julia. Style and approach This practical and easy-to-follow yet comprehensive guide will get you learning about Julia with respect to data science. Each topic is explained thoroughly and placed in context. For the more inquisitive, we dive deeper into the language and its use case. This is the one true guide to working with Julia in data science.

The Art of Application Performance Testing: From Strategy to Tools

by Ian Molyneaux

Because performance is paramount today, this thoroughly updated guide shows you how to test mission-critical applications for scalability and performance before you deploy them—whether it’s to the cloud or a mobile device. You’ll learn the complete testing process lifecycle step-by-step, along with best practices to plan, coordinate, and conduct performance tests on your applications.Set realistic performance testing goalsImplement an effective application performance testing strategyInterpret performance test resultsCope with different application technologies and architecturesUnderstand the importance of End User Monitoring (EUM)Use automated performance testing toolsTest traditional local applications, web applications, and web servicesRecognize and resolves issues often overlooked in performance testsWritten by a consultant with over 15 years’ experience with performance testing, The Art of Application Performance Testing thoroughly explains the pitfalls of an inadequate testing strategy and offers a robust, structured approach for ensuring that your applications perform well and scale effectively when the need arises.

Getting Started with Bluetooth Low Energy

by Kevin Townsend Akiba Carles Cufí Robert Davidson

With Bluetooth Low Energy (BLE), smart devices are about to become even smarter. This practical guide demonstrates how this exciting wireless technology helps developers build mobile apps that share data with external hardware, and how hardware engineers can gain easy and reliable access to mobile operating systems.This book provides a solid, high-level overview of how devices use BLE to communicate with each other. You'll learn useful low-cost tools for developing and testing BLE-enabled mobile apps and embedded firmware and get examples using various development platforms--including iOS and Android for app developers and embedded platforms for product designers and hardware engineers.Understand how data is organized and transferred by BLE devicesExplore BLE's concepts, key limitations, and network topologyDig into the protocol stack to grasp how and why BLE operatesLearn how BLE devices discover each other and establish secure connectionsSet up the tools and infrastructure for BLE application developmentGet examples for connecting BLE to iPhones, iPads, Android devices, and sensorsDevelop code for a simple device that transmits heart rate data to a mobile device

Practical Zendesk Administration

by Anton De Young Stafford Vaughan

Implementing the Zendesk customer service software as part of your company's operations can be time-consuming, but with the best practices and advice in this hands-on guide, you can shorten the procedure considerably. You'll learn the purpose, benefits, and pitfalls of each Zendesk feature, with examples of how to configure it to match your company's needs and processes.Written by written by two experienced Zendesk product trainers, this book is distilled from years of working in the trenches, launching customer implementations, and answering thousands of questions from participants throughout the world. With it, you'll be able to determine the best way to put Zendesk's vast potential to work for your company.Apply custom branding to your user-facing support portalMitigate risk by implementing various Zendesk security featuresManage profiles and permissions for users, agents, and administratorsCreate tickets from email, voice, chat, feedback tabs, and social mediaCapture and classify help requests through standard and custom fieldsUse techniques to build an efficient agent support processAutomate your business rules in Zendesk to streamline your workflowProvide your customers with self-service support

Java Pocket Guide

by Robert Liguori Patricia Liguori

How many times have you reached an impasse while writing code because you couldn't remember how something in Java worked? This new pocket guide is designed to keep you moving. Concise, convenient and easy to use, the Java Pocket Guide gives you Java stripped down to its bare essentials -- in fact, it's the only book on Java that you can actually fit in your pocket. Written by Robert and Patricia Liguori, senior software and lead information engineers for Java-based air traffic management and simulation environments, Java Pocket Guide contains everything you really need to know about Java, particularly everything you need to remember. The book pays special attention to the new areas in Java 5 and 6, such as generics and annotations. Why do you need the Java Pocket Guide? It's the only CliffsNotes-style guide to Java available Lets you find important things quickly without consulting 1000-page tutorials Includes many command-line options Organized for quick and easy use on the job If you're looking to learn some aspect of Java, this is not your book. Java Pocket Guide is for the experienced Java programmers among you who need quick reminders to jog your memory on how something in the language works. Simply put, this pocket guide offers practical help for practicing developers.

Python Geospatial Analysis Essentials

by Erik Westra

If you are an experienced Python developer and wish to get up-to-speed with geospatial programming, then this book is for you. While familiarity with installing third-party Python libraries would be an advantage, no prior knowledge of geospatial programming is required.

Learning iOS Security

by Charles S. Edge Allister Banks

This book is intended for mobile security professionals who want to learn how to secure iOS operating systems and its applications. Any knowledge of iOS architecture would be an added advantage.

Web Penetration Testing with Kali Linux - Second Edition

by Juned Ahmed Ansari

Build your defense against web attacks with Kali Linux 2.0 About This Book * Gain a deep understanding of the flaws in web applications and exploit them in a practical manner * Get hands-on web application hacking experience with a range of tools in Kali Linux 2.0 * Develop the practical skills required to master multiple tools in the Kali Linux 2.0 toolkit Who This Book Is For If you are already working as a network penetration tester and want to expand your knowledge of web application hacking, then this book tailored for you. Those who are interested in learning more about the Kali Sana tools that are used to test web applications will find this book a thoroughly useful and interesting guide. What You Will Learn * Set up your lab with Kali Linux 2.0 * Identify the difference between hacking a web application and network hacking * Understand the different techniques used to identify the flavor of web applications * Expose vulnerabilities present in web servers and their applications using server-side attacks * Use SQL and cross-site scripting (XSS) attacks * Check for XSS flaws using the burp suite proxy * Find out about the mitigation techniques used to negate the effects of the Injection and Blind SQL attacks In Detail Kali Linux 2.0 is the new generation of the industry-leading BackTrack Linux penetration testing and security auditing Linux distribution. It contains several hundred tools aimed at various information security tasks such as penetration testing, forensics, and reverse engineering. At the beginning of the book, you will be introduced to the concepts of hacking and penetration testing and will get to know about the tools used in Kali Linux 2.0 that relate to web application hacking. Then, you will gain a deep understanding of SQL and command injection flaws and ways to exploit the flaws. Moving on, you will get to know more about scripting and input validation flaws, AJAX, and the security issues related to AJAX. At the end of the book, you will use an automated technique called fuzzing to be able to identify flaws in a web application. Finally, you will understand the web application vulnerabilities and the ways in which they can be exploited using the tools in Kali Linux 2.0. Style and approach This step-by-step guide covers each topic with detailed practical examples. Every concept is explained with the help of illustrations using the tools available in Kali Linux 2.0.

Microsoft Azure IaaS Essentials

by Gethyn Ellis

This book is intended for system administrators and other IT professionals who need to both design and implement an Azure-based cloud solution. With the help of this book, you will soon master the basic tasks needed to build a cloud-based solution.

.NET & XML

by Niel M. Bornstein

If you're seeking ways to build network-based applications or XML-based web services, Microsoft provides most of the tools you'll need. XML is integrated into the .NET Framework and Visual Studio .NET, but if you want to get a grasp on how .NET and XML actually work together, that's a different story. With .NET & XML, you can get under the hood to see how the .NET Framework implements XML, giving you the skills to write understandable XML-based code that interoperates with code written with other tools, and even other languages. .NET & XML starts by introducing XML and the .NET Framework, and then teaches you how to read and write XML before moving on to complex methods for manipulating, navigating, transforming, and constraining it. To demonstrate the power of XML in .NET, author Niel Bornstein builds a simple hardware store inventory system throughout the book. As you move from chapter to chapter, you'll absorb increasingly complex information until you have enough knowledge to successfully program your own XML-based applications. This tutorial also contains a quick reference to the API, plus appendices present additional .NET assemblies that you can use to work with XML, and how to work with the .NET XML configuration file format. One study puts the potential market for new software based on XML at or near $100 billion over the next five years. The .NET Framework gives you a way to become a part of it. But to use XML and .NET effectively, you need to understand how these two technologies work together. This book gives you the insight to take full advantage of the power the two provide.

Hadoop Security

by Joey Echeverria Ben Spivey

As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to corrupt or modify data in the event of a security breach.Authors Ben Spivey and Joey Echeverria provide in-depth information about the security features available in Hadoop, and organize them according to common computer security concepts. You'll also get real-world examples that demonstrate how you can apply these concepts to your use cases.Understand the challenges of securing distributed systems, particularly HadoopUse best practices for preparing Hadoop cluster hardware as securely as possibleGet an overview of the Kerberos network authentication protocolDelve into authorization and accounting principles as they apply to HadoopLearn how to use mechanisms to protect data in a Hadoop cluster, both in transit and at restIntegrate Hadoop data ingest into enterprise-wide security architectureEnsure that security architecture reaches all the way to end-user access

Refine Search

Showing 12,076 through 12,100 of 53,623 results