Best of
Computers

2014

Automate the Boring Stuff with Python: Practical Programming for Total Beginners


Al Sweigart - 2014
    But what if you could have your computer do them for you?In "Automate the Boring Stuff with Python," you'll learn how to use Python to write programs that do in minutes what would take you hours to do by hand no prior programming experience required. Once you've mastered the basics of programming, you'll create Python programs that effortlessly perform useful and impressive feats of automation to: Search for text in a file or across multiple filesCreate, update, move, and rename files and foldersSearch the Web and download online contentUpdate and format data in Excel spreadsheets of any sizeSplit, merge, watermark, and encrypt PDFsSend reminder emails and text notificationsFill out online formsStep-by-step instructions walk you through each program, and practice projects at the end of each chapter challenge you to improve those programs and use your newfound skills to automate similar tasks.Don't spend your time doing work a well-trained monkey could do. Even if you've never written a line of code, you can make your computer do the grunt work. Learn how in "Automate the Boring Stuff with Python.""

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon


Kim Zetter - 2014
    The cause of their failure was a complete mystery.Five months later, a seemingly unrelated event occurred. A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were caught in a reboot loop—crashing and rebooting repeatedly. At first, technicians with the firm believed the malicious code they found on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a virus of unparalleled complexity and mysterious provenance and intent. They had, they soon learned, stumbled upon the world’s first digital weapon.Stuxnet, as it came to be known, was unlike any other virus or worm built before: It was the first attack that reached beyond the computers it targeted to physically destroy the equipment those computers controlled. It was an ingenious attack, jointly engineered by the United States and Israel, that worked exactly as planned, until the rebooting machines gave it all away. And the discovery of Stuxnet was just the beginning: Once the digital weapon was uncovered and deciphered, it provided clues to other tools lurking in the wild. Soon, security experts found and exposed not one but three highly sophisticated digital spy tools that came from the same labs that created Stuxnet. The discoveries gave the world its first look at the scope and sophistication of nation-state surveillance and warfare in the digital age.Kim Zetter, a senior reporter at Wired, has covered hackers and computer security since 1999 and is one of the top journalists in the world on this beat. She was among the first reporters to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. In COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the World’s First Digital Weapon, Zetter expands on this work to show how the code was designed and unleashed and how its use opened a Pandora’s Box, ushering in an age of digital warfare in which any country’s infrastructure—power grids, nuclear plants, oil pipelines, dams—is vulnerable to the same kind of attack with potentially devastating results. A sophisticated digital strike on portions of the power grid, for example, could plunge half the U.S. into darkness for weeks or longer, having a domino effect on all other critical infrastructures dependent on electricity.

Ry's Git Tutorial


Ryan Hodson - 2014
    Its popularity among open-source developers makes Git a necessary tool for professional programmers, but it can also do wonders for your personal coding workflow. You’ll be able to experiment with new ideas, radically refactor existing code, and efficiently share changes with other developers—all without the slightest worry towards breaking your project.This comprehensive guide will walk you through the entire Git library, writing code and executing commands every step of the way. You'll create commits, revert snapshots, navigate branches, communicate with remote repositories, and experience core Git concepts first-hand.Designed for newcomers to distributed development, Ry's Git Tutorial presents this complex subject in simple terms that anyone can understand. Beginner and veteran programmers alike will find this book to be a fun, fast, and friendly introduction to Git-based revision control.

Red Team Field Manual


Ben Clark - 2014
    The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell. The RTFM will repeatedly save you time looking up the hard to remember Windows nuances such as Windows wmic and dsquery command line tools, key registry values, scheduled tasks syntax, startup locations and Windows scripting. More importantly, it should teach you some new red team techniques.

CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide


Darril Gibson - 2014
    The SY0-301 version covers every aspect of the SY0-301 exam, and includes the same elements readers raved about in the previous version. Each of the eleven chapters presents topics in an easy to understand manner and includes real-world examples of security principles in action. The author uses many of the same analogies and explanations he’s honed in the classroom that have helped hundreds of students master the Security+ content. You’ll understand the important and relevant security topics for the Security+ exam, without being overloaded with unnecessary details. Additionally, each chapter includes a comprehensive review section to help you focus on what’s important. Over 400 realistic practice test questions with in-depth explanations will help you test your comprehension and readiness for the exam. The book includes a 100 question pre-test, a 100 question post-test, and practice test questions at the end of every chapter. Each practice test question includes a detailed explanation to help you understand the content and the reasoning behind the question. You’ll be ready to take and pass the exam the first time you take it. If you plan to pursue any of the advanced security certifications, this guide will also help you lay a solid foundation of security knowledge. Learn this material, and you’ll be a step ahead for other exams. This SY0-401 study guide is for any IT or security professional interested in advancing in their field, and a must read for anyone striving to master the basics of IT systems security. The author also posts related blogs to supplement the book at http://blogs.getcertifiedgetahead.com/.

Elasticsearch: The Definitive Guide: A Distributed Real-Time Search and Analytics Engine


Clinton Gormley - 2014
    This practical guide not only shows you how to search, analyze, and explore data with Elasticsearch, but also helps you deal with the complexities of human language, geolocation, and relationships.If you're a newcomer to both search and distributed systems, you'll quickly learn how to integrate Elasticsearch into your application. More experienced users will pick up lots of advanced techniques. Throughout the book, you'll follow a problem-based approach to learn why, when, and how to use Elasticsearch features.Understand how Elasticsearch interprets data in your documentsIndex and query your data to take advantage of search concepts such as relevance and word proximityHandle human language through the effective use of analyzers and queriesSummarize and group data to show overall trends, with aggregations and analyticsUse geo-points and geo-shapes--Elasticsearch's approaches to geolocationModel your data to take advantage of Elasticsearch's horizontal scalabilityLearn how to configure and monitor your cluster in production

The Swift Programming Language


Apple Inc. - 2014
    Swift builds on the best of C and Objective-C, without the constraints of C compatibility. Swift adopts safe programming patterns and adds modern features to make programming easier, more flexible, and more fun. Swift’s clean slate, backed by the mature and much-loved Cocoa and Cocoa Touch frameworks, is an opportunity to reimagine how software development works.

JavaScript for Kids: A Playful Introduction to Programming


Nick Morgan - 2014
    With the help of kid-friendly examples, author Nick Morgan teaches the essentials of JavaScript. Morgan starts with the basics of strings, arrays, and loops, then moves on to show readers how to modify elements with jQuery and draw graphics with canvas. By the end of the book, you'll be ready to create your own fun animations and games and you'll have a solid understanding of the fundamentals of JavaScript.

Exercises in Programming Style


Cristina Videira Lopes - 2014
    It is designed to be used in conjunction with code provided on an online repository. The book complements and explains the raw code in a way that is accessible to anyone who regularly practices the art of programming. The book can also be used in advanced programming courses in computer science and software engineering programs.The book contains 33 different styles for writing the term frequency task. The styles are grouped into nine categories: historical, basic, function composition, objects and object interactions, reflection and metaprogramming, adversity, data-centric, concurrency, and interactivity. The author verbalizes the constraints in each style and explains the example programs. Each chapter first presents the constraints of the style, next shows an example program, and then gives a detailed explanation of the code. Most chapters also have sections focusing on the use of the style in systems design as well as sections describing the historical context in which the programming style emerged.

Epic Text Fails! 2: More Funniest Autocorrects, Wrong Numbers, and Smartphone Mishaps


Marcus Rainey - 2014
    Yes, it is really that good." "This is going to be my 'go to book' when I've had a bad day!" Please Note: Some profanity, not for children!

The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory


Michael Hale Ligh - 2014
    As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics--now the most sought after skill in the digital forensics and incident response fields.Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. Discover memory forensics techniques:How volatile memory analysis improves digital investigations Proper investigative steps for detecting stealth malware and advanced threats How to use free, open source tools for conducting thorough memory forensics Ways to acquire memory from suspect systems in a forensically sound manner The next era of malware and security breaches are more sophisticated and targeted, and the volatile memory of a computer is often overlooked or destroyed as part of the incident response process. The Art of Memory Forensics explains the latest technological innovations in digital forensics to help bridge this gap. It covers the most popular and recently released versions of Windows, Linux, and Mac, including both the 32 and 64-bit editions.

The LEGO MINDSTORMS EV3 Discovery Book: A Beginner's Guide to Building and Programming Robots


Laurens Valk - 2014
    This full color book teaches you fundamental programming and robotics skills as you build and program powerful robots that move, monitor sensors, and respond to their environments. You will build seven increasingly sophisticated robots like the BRICK SORT3R (a robot that sorts bricks by color and size), the THE SNATCH3R (an autonomous robotic arm), and LAVA R3X (a humanoid that walks and talks). Valk also covers more advanced programming techniques like data wires and variables, and shows you how to create custom remote control programs. More than 100 building and programming challenges throughout encourage you to think creatively and to apply what you've learned to invent your own robots.

Adobe Premiere Pro CC Classroom in a Book (2019 Release)


Maxim Jago - 2014
    Adobe Premiere Pro CC Classroom in a Book contains 19 lessons that cover the basics, providing countless tips and techniques to help you become more productive with the program. You can follow the book from start to finish or choose only those lessons that interest you. In addition to learning the key elements of the Adobe Premiere Pro interface, this completely revised CC (2014 release) edition covers new features, including "scratch" track recording, Master Clip effects, and masking and tracking visual effects. Access to all of the project files used in the book's lessons are included with purchase of the book. Print editions come bundled with a DVD containing the lesson files, and students who purchase an eBook edition receive a code that lets them download the lesson files from their account page on peachpit.com. Both print and eBook users also get access to downloadable updates that cover new features that Adobe releases for Creative Cloud members. "The Classroom in a Book series is by far the best training material on the market. Everything you need to master the software is included: clear explanations of each lesson, step-by-step instructions, and the project files for the students." Barbara Binder, Adobe Certified InstructorRocky Mountain Training

OS X 10.10 Yosemite: The Ars Technica Review


John Siracusa - 2014
    Siracusa's overview, wrap-up, and critique of everything new in OS X 10.10 Yosemite.

Sega Mega Drive/Genesis: Collected Works


Keith Stuart - 2014
    Much of the visual material – drawn from the Sega of Japan archives – has never been released before.Alongside the illustrated history is ‘Arcade Perfect’, a written history of the console and its legacy by "Guardian" Games Editor Keith Stuart, which features the voices of Sega executives and industry luminaries – including the company’s founder David Rosen, its president Hayao Nakayama, Sega of America CEO Tom Kalinske and many more. The book opens with a foreword by legendary developer David Perry, on the console that catalysed his career.

Concurrency in C# Cookbook


Stephen Cleary - 2014
    With this cookbook, you will find recipes for writing asynchronous, parallel, and reactive code in C# that enables your app or program to engage in more than one process at a time. Presented in O’Reilly’s popular problem-solution-discussion cookbook format, this guide provides ready-to-use code, along with an explanation of why and how the solution works.

Exploring BeagleBone: Tools and Techniques for Building with Embedded Linux


Derek Molloy - 2014
    Comprehensive content and deep detail provide more than just a BeagleBone instruction manual—you’ll also learn the underlying engineering techniques that will allow you to create your own projects. The book begins with a foundational primer on essential skills, and then gradually moves into communication, control, and advanced applications using C/C++, allowing you to learn at your own pace. In addition, the book’s companion website features instructional videos, source code, discussion forums, and more, to ensure that you have everything you need.The BeagleBone’s small size, high performance, low cost, and extreme adaptability have made it a favorite development platform, and the Linux software base allows for complex yet flexible functionality. The BeagleBone has applications in smart buildings, robot control, environmental sensing, to name a few; and, expansion boards and peripherals dramatically increase the possibilities. Exploring BeagleBone provides a reader-friendly  guide to the device, including a crash course in computer engineering. While following step by step, you can: Get up to speed on embedded Linux, electronics, and programming Master interfacing electronic circuits, buses and modules, with practical examples Explore the Internet-connected BeagleBone and the BeagleBone with a display Apply the BeagleBone to sensing applications, including video and sound Explore the BeagleBone’s Programmable Real-Time Controllers Hands-on learning helps ensure that your new skills stay with you, allowing you to design with electronics, modules, or peripherals even beyond the BeagleBone. Insightful guidance and online peer support help you transition from beginner to expert as you master the techniques presented in Exploring BeagleBone, the practical handbook for the popular computing platform.

Microsoft .NET - Architecting Applications for the Enterprise


Dino Esposito - 2014
    But the principles and practices of software architecting–what the authors call the “science of hard decisions”–have been evolving for cloud, mobile, and other shifts. Now fully revised and updated, this book shares the knowledge and real-world perspectives that enable you to design for success–and deliver more successful solutions. In this fully updated Second Edition, you will: Learn how only a deep understanding of domain can lead to appropriate architecture Examine domain-driven design in both theory and implementation Shift your approach to code first, model later–including multilayer architecture Capture the benefits of prioritizing software maintainability See how readability, testability, and extensibility lead to code quality Take a user experience (UX) first approach, rather than designing for data Review patterns for organizing business logic Use event sourcing and CQRS together to model complex business domains more effectively Delve inside the persistence layer, including patterns and implementation.

Urban Outlaws


Peter Jay Black - 2014
    Orphans bonded over their shared sense of justice, the kids have formed the Urban Outlaws, a group dedicated to outsmarting criminals and handing out their stolen money through Random Acts of Kindness (R.A.K.s).But the kids find themselves in serious trouble when they're caught in an epic battle to control Proteus, a genius super-computer. Proteus can crack any code in the world—and steal top-secret documents in nanoseconds. It's down to the Urban Outlaws to use their guile, guts, and skill to destroy the computer, avert world domination . . . and stay alive.Don't miss the global launch of this debut series from Peter Jay Black—the perfect mix of explosive action, cool technology, and characters with lots of heart.

Help Your Kids with Computer Coding


Carol Vorderman - 2014
    Yet 9 out of 10 schools don't even offer computer science classes to students, according to code.org. Help correct this disparity by introducing your kids to the world of computer programming early, with a fun and approachable method. This book begins by introducing the essential concepts of programming with simple instructions, and without specialized computer lingo. Fun projects throughout let kids start putting their computer skills into practice and build their own code using Scratch programming and Python, the two most popular languages. Also included are profiles on coding stars and insights in technology such as the Raspberry Pi mini computer. In typical DK fashion, colorful graphics and step-by-step instructions assist readers in starting to think like their computers.

Minecraft Handbook 3: The Combat Handbook


Mojang - 2014
    Learn how to build a fort, craft armour and weapons, set mob traps, defeat enemies in combat, as well as how to battle your way out of "the Nether" and "the End."With tips and tricks from experts and celebrities, including Minecraft developer, Jens “Jeb” Bergensten, and creator, Markus “Notch” Persson, readers will learn the skills needed to becoming the ultimate Minecraft warrior in no time!

Electric Dreams: The Collected Works of Jim'll Paint It


Jim'll Paint It - 2014
    I'll paint it. On Paint.Jim'll Paint It is an enigma. As he says on his wildly successful Tumblr and Facebook pages: Got something in your brain that you'd really like to see with your eyes? Just ask and if I like the sound of it I'll paint it for you using incredibly high tech and sophisticated MS Paint software.Generating hundreds of thousands of requests, Jim has painted everything from Brian Blessed punching a polar bear to Mary and Joseph being turned away from a Premier Inn by Lenny Henry, and his recent picture of Vladimir Putin as every member of the Village People became an internet sensation. Here for the first time are the selected works of one of the finest and most popular artists of our day. Electric Dreams also includes many never-seen-before paintings.

Black Hat Python: Python Programming for Hackers and Pentesters


Justin Seitz - 2014
    But just how does the magic happen?In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to:Create a trojan command-and-control using GitHubDetect sandboxing and automate common malware tasks, like keylogging and screenshottingEscalate Windows privileges with creative process controlUse offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machineExtend the popular Burp Suite web-hacking toolAbuse Windows COM automation to perform a man-in-the-browser attackExfiltrate data from a network most sneakilyInsider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits.When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python."

Rails 4 Test Prescriptions: Build a Healthy Codebase


Noel Rappin - 2014
    Rails 4 Test Prescriptions is a comprehensive guide to how tests can help you design and write better Rails applications. In this completely revised edition, you'll learn why testing works and how to test effectively using Rails 4, Minitest 5, and RSpec 3, as well as popular testing libraries such as factory_girl and Cucumber. Do what the doctor ordered to make your applications feel all better. Side effects may include better code, fewer bugs, and happier developers.Your Ruby on Rails application is sick. Deadlines are looming, but every time you make the slightest change to the code, something else breaks. Nobody remembers what that tricky piece of code was supposed to do, and nobody can tell what it actually does. Plus, it has bugs. You need test-driven development, a process for improving the design, maintainability, and long-term viability of software.Containing both practical code examples and discussion of why testing works, this book starts with the most basic features delivered as part of core Ruby on Rails. Once you've integrated those features into your coding practice, you'll learn how to use popular third-party testing tools such as RSpec, Mocha, Cucumber, and factory_girl. You'll test the component parts of a Rails application, including the back-end model logic and the front-end display logic. Using Rails examples, you'll learn how to use testing to enable your code to respond better to future change. Plus, you'll see how to handle real-world testing situations.This completely revised edition contains a new tutorial, as well as new examples throughout the book. Many chapters, including the JavaScript chapter, have undergone major changes to reflect new tools and new practices. And there are brand new chapters on testing for security, and testing external services.What You Need: Ruby 2.1, Rails 4

Fundamentals of Computers


Reema Thareja - 2014
    

Bioinformatics Data Skills: Reproducible and Robust Research with Open Source Tools


Vince Buffalo - 2014
    Many biologists begin their bioinformatics training by learning languages like Perl and R alongside the Unix command line. But there’s a huge gap between knowing a few programming languages and being prepared to analyze large amounts of biological data.Rather than teach bioinformatics as a set of workflows that are likely to change with this rapidly evolving field, this book demsonstrates the practice of bioinformatics through data skills. Rigorous assessment of data quality and of the effectiveness of tools is the foundation of reproducible and robust bioinformatics analysis. Through open source and freely available tools, you’ll learn not only how to do bioinformatics, but how to approach problems as a bioinformatician.Go from handling small problems with messy scripts to tackling large problems with clever methods and toolsFocus on high-throughput (or "next generation") sequencing dataLearn data analysis with modern methods, versus covering older theoretical conceptsUnderstand how to choose and implement the best tool for the jobDelve into methods that lead to easier, more reproducible, and robust bioinformatics analysis

Commodore 64: a visual Commpendium


Sam Dyer - 2014
    Unlike other books about the C64, it celebrates the visual side of the computer. Each spread features a beautiful image from a game and a select few words. This ranges from a mini review from an ex journalist such as Gary Penn or Steve Jarratt or a quote from the original developers and artists such as David Crane, Ron Gilbert, Jon Hare and Andrew Hewson just to name a few... The book also feature game maps, loading screens, stunning artwork by Oliver Frey and a foreword written by Sensible Software’s legendary graphic artist Stoo Cambridge.The book is organized in chronological order, starting in the early days with games such as Jupiter Lander and go through to the latter days of the C64 featuring games such as Mayhem In Monsterland and Lemmings. It then moves on to finish looking at modern day C64 publishers and programmers such as RGCD and Paul Koller.ContributorsMat Allen, Steve Brown, Stoo Cambridge, Gary Carr, David Crane, Karen Davies-Downey, Steven Day (STE’86), Mevlut Dinc, Paul Docherty (DOKK), Andy Dyer, Oliver Frey, Kevin Furry, Ron Gilbert, Jon Hare, Andrew Hewson, Robin Hogg, Steve Jarratt, Roger Kean, Phil King, Paul Koller, John F. Kutcher, James Leach, Robin Levy, Peter Liepa, Oliver Lindau, Steinar Lund, Michal Okowicki, Archer MacLean, Jordan Mechner, Alan Miller, Jeff Minter, Paul Norman, Philip Oliver, Gary Penn, Jason Perkins, Simon Phipps, Jacco Van ’t Riet, Hugh Riley, Andy Roberts, Stephen Robertson (SIR), John Rowlands, Stephen Ruddy, Mat Sneap, Bob Stevenson, Jonathan Smyth Temples, Stephen Ian Thomson (S.I.T), Martin Walker, Matt Wilsher and Stuart Wynne. About the AuthorSam has over 10 years experience as an award winning professional Graphic Designer, working for agencies in London and also in the South West of England. His passion for design and also the Commodore 64, mean that he is ideally placed to create this book to the highest possible standard.

HTML5 and CSS3 All-In-One for Dummies


Andy Harris - 2014
    This friendly, all-in-one guide covers everything you need to know about each of these technologies and their latest versions so that you can use them together. Building on the bestselling formats of the first two editions, this new edition teaches you the fundamentals of HTML5 and CSS3, and then presents ways for using them with JavaScript, MySQL, and Ajax to create websites that work.Covers using JavaScript, PHP, MySQL, and Ajax in the context of programming dynamic web pages with CSS3 and HTML5 Includes self-contained minibooks that review HTML, CSS, design and layout, client-side JavaScript, Ajax and server-side, and putting it all together Examines new web development advancements including new technologies and changes to the standards Features a website that contains supporting materials including code and several valuable programs that are useful for web development HTML5 and CSS3 All-in-One For Dummies, 3rd Edition serves as the perfect reference for both web development beginners and seasoned professionals looking to learn more about how to get the most out of the powerful combination of HTML5 and CSS3.

Cloud Design Patterns: Prescriptive Architecture Guidance for Cloud Applications (Microsoft patterns & practices)


Alex Homer - 2014
    They run on commodity hardware, provide services to untrusted users, and deal with unpredictable workloads. These factors impose a range of problems that you, as a designer or developer, need to resolve. Your applications must be resilient so that they can recover from failures, secure to protect services from malicious attacks, and elastic in order to respond to an ever changing workload. This guide demonstrates design patterns that can help you to solve the problems you might encounter in many different areas of cloud application development. Each pattern discusses design considerations, and explains how you can implement it using the features of Windows Azure. The patterns are grouped into categories: availability, data management, design and implementation, messaging, performance and scalability, resilience, management and monitoring, and security. You will also see more general guidance related to these areas of concern. It explains key concepts such as data consistency and asynchronous messaging. In addition, there is useful guidance and explanation of the key considerations for designing features such as data partitioning, telemetry, and hosting in multiple datacenters. These patterns and guidance can help you to improve the quality of applications and services you create, and make the development process more efficient. Enjoy!

Richard Renaldi: Touching Strangers


Richard Renaldi - 2014
    Working on the street with a large format eight-by-ten-inch view camera, Renaldi encounters the subjects for his photographs in towns and cities all over the United States. He pairs them up and invites them to pose together, intimately, in ways that people are usually taught to reserve for their close friends and loved ones. Renaldi creates spontaneous and fleeting relationships between strangers, for the camera, often pushing his subjects beyond their comfort levels. These relationships may only last for the moment the shutter is released, but the resulting photographs are moving and provocative, and raise profound questions about the possibilities for positive human connection in a diverse society. Following an extremely successful Kickstarter effort which raised nine times its goal, Touching Strangers will have an extensive social media campaign. Visit touchingstrangers.org for more information.Richard Renaldi (born 1968) graduated from New York University with a BFA in photography in 1990. He has presented solo exhibitions both in the United States and abroad, including at Fotografins Hus, Stockholm; Robert Morat Galerie, Hamburg, Germany; and Yossi Milo Gallery, New York. Renaldi's work has also appeared in group exhibitions, including Strangers: The First ICP Triennial of Photography and Video at the International Center of Photography in New York (2003). Touching Strangers is Renaldi's third book, following Figure and Ground (Aperture, 2006) and Fall River Boys (Charles Lane Press, 2009).

Adobe Photoshop CC Classroom in a Book (2014 Release)


Andrew Faulkner - 2014
    Adobe Photoshop CC Classroom in a Book contains 14 lessons that cover the basics, providing countless tips and techniques to help you become more productive with the program. You can follow the book from start to finish or choose only those lessons that interest you. In addition to learning the key elements of the Photoshop interface, this completely revised CC (2014 release) edition covers new features, including Generator, 3D printing, linked Smart Objects, Blur Gallery, smarter Smart Guides, Perspective Warp, and more. Purchasing this book gives you access to the downloadable lesson files you need to work through the projects in the book, and to electronic book updates covering new features that Adobe releases for Creative Cloud customers. For access, goto www.peachpit.com/redeem and redeem the unique code provided inside this book. "The Classroom in a Book series is by far the best training material on the market. Everything you need to master the software is included: clear explanations of each lesson, step-by-step instructions, and the project files for the students." Barbara Binder, Adobe Certified InstructorRocky Mountain Training

Fractal 3D Magic


Clifford A. Pickover - 2014
    Prolific polymath Clifford Pickover introduces the collection, which provides background on everything from the classic Mandelbrot set, to the infinitely porous Menger Sponge, to ethereal fractal flames. The following eye-popping gallery displays mathematical formulas transformed into stunning computer-generated 3D anaglyphs. More than 200 intricate designs, visible in three dimensions thanks to the enclosed 3D glasses, will engross math and optical illusions enthusiasts alike.

The Browser Hacker's Handbook


Wade Alcorn - 2014
    Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods.The web browser has become the most popular and widely used computer program in the world. As the gateway to the Internet, it is part of the storefront to any business that operates online, but it is also one of the most vulnerable entry points of any system. With attacks on the rise, companies are increasingly employing browser-hardening techniques to protect the unique vulnerabilities inherent in all currently used browsers. The Browser Hacker's Handbook thoroughly covers complex security issues and explores relevant topics such as:Bypassing the Same Origin Policy ARP spoofing, social engineering, and phishing to access browsers DNS tunneling, attacking web applications, and proxying--all from the browser Exploiting the browser and its ecosystem (plugins and extensions) Cross-origin attacks, including Inter-protocol Communication and Exploitation The Browser Hacker's Handbook is written with a professional security engagement in mind. Leveraging browsers as pivot points into a target's network should form an integral component into any social engineering or red-team security assessment. This handbook provides a complete methodology to understand and structure your next browser penetration test.

Building Virtual Pentesting Labs for Advanced Penetration Testing


Kevin Cardwell - 2014
    This book is ideal if you want to build and enhance your existing pentesting methods and skills. Basic knowledge of network security features is expected along with web application testing experience.

IOS Programming: The Big Nerd Ranch Guide


Joe Conway - 2014
    After completing this book, you will have the know-how and the confidence you need to tackle iOS projects of your own. Based on Big Nerd Ranch's popular iOS Bootcamp course and its well-tested materials and methodology, this bestselling guide teaches iOS concepts and coding in tandem. The result is instruction that is relevant and useful.Throughout the book, the authors explain what's important and share their insights into the larger context of the iOS platform. You get a real understanding of how iOS development works, the many features that are available, and when and where to apply what you've learned.Here are some of the topics covered:Xcode 5, Instruments, and Storyboards Building interfaces using the iOS 7 aesthetic ARC and strong and weak references Handling touch events and gestures Toolbars, navigation controllers, and split view controllers Using Auto Layout to scale user interfaces Using Dynamic Type to scale fonts Localization and Internationalization Block syntax and use Saving/loading data: Archiving and Core Data Core Location and Map Kit Communicating with web services using JSON Using the Model-View-Controller-Store design pattern

Encyclopædia Moronica: Volume I


G. Ambatte - 2014
    The Encyclopædia Moronica consists of 26 tales of the trials and tribulations endured by technical wizards in a world of users, apprentices, supervisors, managers and even CEOs, whose only magical power seems to be their superhuman ability to break things.

Learning Concurrent Programming in Scala


Aleksandar Prokopec - 2014
    It starts by introducing you to the foundations of concurrent programming on the JVM, outlining the basics of the Java Memory Model, and then shows some of the classic building blocks of concurrency, such as the atomic variables, thread pools, and concurrent data structures, along with the caveats of traditional concurrency. It then walks you through different high-level concurrency abstractions, each tailored toward a specific class of programming tasks. Finally, the book presents an overview of when to use which concurrency library and demonstrates how they all work together.This book is a must-have tutorial for software developers aiming to write concurrent programs in Scala, or broaden their existing knowledge of concurrency.This book is intended for Scala programmers that have no prior knowledge about concurrent programming, as well as those seeking to broaden their existing knowledge about concurrency. Basic knowledge of the Scala programming language will be helpful. Readers with a solid knowledge in another programming language, such as Java, should find this book easily accessible.

Adobe Indesign CC Classroom in a Book (2014 Release)


Kelly Kordes Anton - 2014
    You can follow the book from start to finish or choose only those lessons that interest you.In addition to learning the key elements of the InDesign interface, this completely revised CC (2014 release) edition covers new features, including rows and columns in tables, dual PDF and IDML file packaging, fixed and reflow EPUBs, and major improvements in the way text and graphics are handled during EPUB export.Purchasing this book gives you access to the downloadable lesson files you need to work through the projects in the book, and to electronic book updates covering new features that Adobe releases for Creative Cloud customers. For access, goto www.peachpit.com/redeem and redeem the unique code provided inside this book."The Classroom in a Book series is by far the best training material on the market. Everything you need to master the software is included: clear explanations of each lesson, step-by-step instructions, and the project files for the students."Barbara Binder, Adobe Certified InstructorRocky Mountain Training

Programming Windows Store Apps with HTML, CSS, and JavaScript


Kraig Brockschmidt - 2014
    The ebook includes 20 chapters and 4 appendices.

Color for Designers: Ninety-five things you need to know when choosing and using colors for layouts and illustrations (Creative Core Book 2)


Jim Krause - 2014
    Color For Designers leans in neither direction, instead choosing to simply tell it like it is while bringing home the timeless thinking behind effective color selection and palette building. In this fundamental guide to understanding and working with color, bestselling author Jim Krause starts out by explaining the basics with an introduction to the color wheel, hue, saturation, value, and more. He then dives deeper into the practical application of color with instruction on how to alter hues, create palettes, target themes, paint with color, use digital color, and accurately output your colorful creations to print. The book is set up in easy-to-digest spreads that are straight-to-the-point, fun to read, and delightfully visual. Color For Designers–releasing on the heels of its companion volume, Visual Design–is the second book in the New Riders Creative Core series, which aims to provide instruction on the fundamental concepts and techniques that all designers must master to become skilled professionals.

How To Start A Home-Based Ebay Business!


Ann Eckhart - 2014
    After all, who doesn't want to be their own boss and work from the comfort of their own home? Whether you are a stay-at-home parent who wants to bring in some extra money or are someone who has lost their job in this tough economy, a home-based Ebay business can provide you with flexibility, freedom, AND a great income! In "How To Start A Home-Based Ebay Business!", author Ann Eckhart, herself an Ebay Top Rated Power Seller, helps you understand all of the things that go into making selling on Ebay a legitimate business. While not a "how to list on Ebay" guide, this book instead talks about all of the business aspects of selling on Ebay, including the following topics: part-time vs. full-time, Ebay and PayPal, business advice, sales tax permits and EIN's, sole proprietor vs. LLC, education, equipment and office space, banking, accounting, paying yourself vs. reinvesting in your business, insurance, sourcing products, terms of service, Ebay stores, marketing, listing tips, and keeping a schedule. Whether you want to start an Ebay business or expand the one you already have, "How To Start A Home-Based Ebay Business" will help you understand everything that goes into making your Ebay career successful and profitable!

System Center 2012 R2 Configuration Manager: Mastering the Fundamentals


Kent Agerlund - 2014
    This is the ultimate source for the working IT Professional who wants to design and implement System Center 2012 R2 Configuration Manager in a midsize- or small-business environment. Enterprise administrators also will find a lot of inspiration, as many of the features and scenarios discussed fit all three environments. The book is packed with real-world scenarios taken from 17 years of experience with SMS and ConfigMgr projects. By following the book from A-Z, you will end up with a ConfigMgr environment that is based on best practices and production ready.

When Computing Got Personal: A history of the desktop computer


Matt Nicholson - 2014
    It is a tale not only of extraordinary innovation and vision but also of cunning business deals, boardroom tantrums and acrimonious lawsuits. Here you will find some of the most intelligent and eccentric people you could hope to meet, including wide-eyed hippies, subversive students, computer nerds, entrepreneurs, hackers, crackers and financial backers. Some lost out and some became millionaires, but all played a part in transforming our world.

Text Analysis with R for Students of Literature


Matthew L. Jockers - 2014
    Computation provides access to information in text that we simply cannot gather using traditional qualitative methods of close reading and human synthesis. "Text Analysis with R for Students of Literature" provides a practical introduction to computational text analysis using the open source programming language R. R is extremely popular throughout the sciences and because of its accessibility, R is now used increasingly in other research areas. Readers begin working with text right away and each chapter works through a new technique or process such that readers gain a broad exposure to core R procedures and a basic understanding of the possibilities of computational text analysis at both the micro and macro scale. Each chapter builds on the previous as readers move from small scale "microanalysis" of single texts to large scale "macroanalysis" of text corpora, and each chapter concludes with a set of practice exercises that reinforce and expand upon the chapter lessons. The book's focus is on making the technical palatable and making the technical useful and immediately gratifying.

Conceptualizing and measuring human anxiety on the Internet


Santosh Kalwar - 2014
    The Internet is an integral part of our personal, business, family, research, enter- tainment, academic and social life. However, there are social implications in using the Internet that are dependent on categories such as gender, age, eth- nicity and cultural attributes. This social aspect can play a detrimental role in the expression of human anxiety on the Internet. An anxiety is a complex phenomenon that requires further elaboration. Thus, the aim of this thesis is to investigate human anxiety, or specifically, whether Internet anxiety can be conceptualized and measured. This thesis utilizes literature, qualitative and quantitative research methodologies, and a triangulation validation approach to conceptualize and measure the Internet anxiety phenomenon.In particular, the aim is to explore anxiety levels of Internet participants to develop and validate an Internet anxiety scale based on earlier research on Internet anxiety. The results of the dissertation present a two phase study. In Phase I, a smaller set of studies were conducted with a limited sample size. In Phase II, the research topic was investigated using 385 participants. Based on a number of studies or experiments, the state-of-the-art discovered in this thesis is creation, design, and validation of two scales, the Self-Assessment Scale (SAS) and a Modified Internet Anxiety Scale (MIAS) for measuring users’ anxieties on the Internet.The result of this dissertation is a conceptualization and measurement of various types of Internet anxiety and measurement of a↵ective feelings of users on the Internet. As a proof-of-concept of measuring Internet anxiety, this thesis describes the author’s implementation of three sets of tools: MyAnxiety, introduc- ing Internet anxieties types; Intelligentia, for collecting Internet anxieties types; and MyIAControl tool, implemented as a browser plug-in, for measuring affective feelings of users on the Internet. Conclusions drawn from the results show that these empirically validated scales and tools might be useful for researchers and practitioners in understanding and measuring the Internet anxiety phenomenon further.

Networked Audiovisual Systems


Brad Grimes - 2014
    Each chapter features diagrams, photos, notes, chapter reviews, and end-of-chapter questions with in-depth explanations. In accordancewith InfoComm's performance standards for the AV industry as they relate to networking, this book serves as both an on-the-job reference and a study tool for the Certified Technology Specialist (CTS) exams.Networked AV Systems covers: Network classifications, topologies, architectures, andstandardsLayers of a networkBandwidth, encoding, and transportNetwork building blocksDesigning a network for AV systemsEthernet and AVBNetwork addressingSubnetting: networking AV devices togetherProtocols, ports, and documenting AV devicesAudio and video streamingDigital signageConferencingSecure remote management and monitoringService level agreementsNetwork securityTroubleshooting networked systems

IPv6 Address Planning: Designing an Address Plan for the Future


Tom Coffeen - 2014
    Meanwhile, IPv6 adoption is surging. More than half of the traffic on the nation's largest mobile network is over IPv6 while a social networking giant plans to no longer use IPv4 internally within 18 months. No matter where you work, as a networking professional, IPv6 adoption is in your future.Along with that adoption comes the need for an IPv6 address plan. This guide provides a comprehensive overview of how to create one. In three sections--preparation, design, and maintenance--enterprise IT network architects, engineers, and administrators will learn the current best-practices for designing, deploying, and maintaining an effective IPv6 addressing plan.

Networking for VMware Administrators (VMware Press Technology)


Christopher Wahl - 2014
    

Swift for Beginners: Develop and Design


Boisy G. Pitre - 2014
    With Swift, Apple has lowered the barrier to entry to writing iOS and OS X apps by giving developers an innovative new programming language for creating software. If you are new to Swift, this book is for you. If you have never used C, C++, or Objective-C, this book is also for you. With this book, you'll be writing simple Swift apps before you know it. Author Boisy Pitre starts at the beginning--walking readers through key Swift features--and builds on that knowledge to show readers how to take advantage of Swift's modern programming concepts to write apps for iOS and OS X. In each chapter, Boisy highlights key Swift concepts, offering guidance and highlighting best practices, on the way to building apps using Swift. Readers will not just learn the concepts of Swift but understand how to use them in a real-world setting. Readers will learn how to Start using variables, constants, and types.Work with collections.Use functions and closures.Handle control structures.Use the Playground environment for quick feedback.Handle memory management.And the book's last section, Boisy brings everything together and steps readers through building a app. Part of the Develop and Design series, books built for both sides of your brain.

Encyclopædia Moronica: Volume II


G. Ambatte - 2014
    The Encyclopædia Moronica returns, with another 26 tales of the genius, patience, wisdom, and just sheer luck that technical support requires to outwit the unwitting and repair the unfixable.

Basher Science: Physics


Dan Green - 2014
    

FreeBSD Mastery: Storage Essentials (IT Mastery Book 4)


Michael W. Lucas - 2014
    FreeBSD Mastery: Storage Essentials takes you on a deep dive into FreeBSD’s disk management systems.You’ll learn about:* identifying your storage hardware* the Common Access Method* GEOM–FreeBSD’s powerful and flexible stackable storage system* GUID Partition Tables, the modern disk partitioning standard* MBR/disklabel partitioning, used by older and embedded systems* avoiding common partitioning errors* aligning partitions to the physical disk, for peak performance* the high-performance Unix File System* tuning UFS to fit your environment and load* Two ways to journal filesystems, and when to use each* The GELI and GBDE disk encryption systems, and when to use each* Software-based disk mirroring, striping, RAID-5 and RAID-10.* Custom FreeBSD installsAnd more!Don’t just configure your storage. Understand it. Get FreeBSD Mastery: Storage Essentials today!

Thinking in HTML


Aravind Shenoy - 2014
    Instead of wandering through loads of theory, we will understand HTML practically so that we can semantically define the markup and structure of a webpage. We have used Notepad for the examples in this book. Alternatively, you can also use Notepad++ or any advanced editor. All you need to do is copy the code and paste it into Notepad. Upon execution, you will get the output as depicted in the screenshots. Screenshots are provided for each sample code. Coding improves with practice. The examples in this book are compatible with almost every modern browser such as Mozilla Firefox, Opera or Google Chrome to name a few. Instead of using the verbatim code, you can modify the code and see the change in the output, thereby understanding the subtle nuances of HTML. By the end of the book, with practice, you can achieve better things as you get to grips with HTML.

Chfi Computer Hacking Forensic Investigator Certification All-In-One Exam Guide


Charles L. Brooks - 2014
    An all-new exam guide for version 8 of the Computer Hacking Forensic Investigator exam from EC-Council, the certifying body behind the Certified Ethical Hacker credential.

Protect Your Tech: Your geek-free guide to a secure and private digital life


Mish Slade - 2014
     Last updated in October 2014 to cover the latest solutions to major digital threats. Like most people, you rely heavily on your laptop or smartphone for many aspects of your personal and business life. But what would happen if your phone or laptop got stolen - what information would a criminal be able to find out about you? The answer is: enough to get into your bank accounts and control your entire online identity. And in fact, your device never needs to leave your sight for you to be exposed to these risks every time you go online. Protect Your Tech is an entertaining, action-oriented guide to safeguarding your digital life. With simple, jargon-free explanations, you'll learn easy steps you can take to keep your personal data safely under wraps. Find out: How easy it is for someone to crack your online passwords – even “clever” ones like “Pa55w0rd!” The simple, but crucial, steps you need to take to protect yourself when you’re using your phone or laptop from a café, airport or other public place How to make sure that even if your device gets stolen, the thief can’t find out anything about you The dangers you’re exposed to if you use a “cloud” storage solution like Dropbox or Google Drive – and what to do about it How to avoid getting scammed when you’re buying online And much more! Contains step-by-step instructions for desktop (Windows and Mac) and mobile (iOS and Android) devices. The same principles will apply if you use other operating systems (like Linux, Blackberry or Windows Phone), but the recommended software won’t work on these platforms. If you’re a security professional, this book won’t be for you. You won’t learn how to hide from governments or use highly complex military-grade security techniques. Instead, you’ll be introduced to the most common threats you’ll encounter as an everyday internet user, and easy steps you can take – with only a bare minimum of tech knowledge – to keep yourself safer than 99% of the online population. With clear, practical explanations, a complete lack of jargon and a hefty dollop of humor, Protect Your Tech is an easy, fun way to transform yourself from an average internet user into an unusually safe one. Scroll to the top of the page and click “Look Inside” for a preview!

Learning To Program


Steven Foote - 2014
    

Elasticsearch in Action


Radu Gheorghe - 2014
    You'll ramp up fast, with an informative overview and an engaging introductory example. Within the first few chapters, you'll pick up the core concepts you need to implement basic searches and efficient indexing. With the fundamentals well in hand, you'll go on to gain an organized view of how to optimize your design. Perfect for developers and administrators building and managing search-oriented applications.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.About the TechnologyModern search seems like magic you type a few words and the search engine appears to know what you want. With the Elasticsearch real-time search and analytics engine, you can give your users this magical experience without having to do complex low-level programming or understand advanced data science algorithms. You just install it, tweak it, and get on with your work.About the Book"Elasticsearch in Action" teaches you how to write applications that deliver professional quality search. As you read, you'll learn to add basic search features to any application, enhance search results with predictive analysis and relevancy ranking, and use saved data from prior searches to give users a custom experience. This practical book focuses on Elasticsearch's REST API via HTTP. Code snippets are written mostly in bash using cURL, so they're easily translatable to other languages.What's InsideWhat is a great search application?Building scalable search solutionsUsing Elasticsearch with any languageConfiguration and tuningAbout the ReaderFor developers and administrators building and managing search-oriented applications.About the AuthorsRadu Gheorghe is a search consultant and software engineer. Matthew Lee Hinman develops highly available, cloud-based systems. Roy Russo is a specialist in predictive analytics.Table of ContentsPART 1 CORE ELASTICSEARCH FUNCTIONALITYIntroducing ElasticsearchDiving into the functionalityIndexing, updating, and deleting dataSearching your dataAnalyzing your dataSearching with relevancyExploring your data with aggregationsRelations among documentsPART 2 ADVANCED ELASTICSEARCH FUNCTIONALITYScaling outImproving performanceAdministering your cluster"

Adobe Lightroom and Photoshop for Photographers Classroom in a Book with Access Code


Adobe Creative Team - 2014
    Adobe Photoshop, its older relative, is still around, though, and is still indispensable for the unique tools it offers, as well as its wide range of uses. This book shows photographers how to use these two great products together to achieve results they could not have produced working with one alone.First, the book provides a quick overview of the cataloging functions of Lightroom -- useful for Photoshop users who may have used a different photo organization tool (or none at all!). Then you'll work through a series of projects that focus on taking images from Lightroom into Photoshop to use tools not available in Lightroom. Typical workflows include stitching images into a panorama, layering multiple exposures of a scene to create a high dynamic range (HDR) image, fixing common photo problems (like blur caused by camera shake), bringing out important details or adding creative effects with adjustment layers, or layering images to create composites (including adding text or 3D objects), or doing precise photo retouching.Classroom in a Book(R), the best-selling series of hands-on software training workbooks, helps you learn the features of Adobe software quickly and easily. Classroom in a Book offers what no other book or training program does-an official training series from Adobe Systems Incorporated, developed with the support of Adobe product experts.

Learn SCCM 2012 in a Month of Lunches: Covers System Center 2012 R2 Configuration Manager


James Bannan - 2014
    Microsoft System Center Configuration Manager (SCCM) sits smack in the middle of this tapestry, providing a single administrative control center to deploy and manage Windows servers and applications across your entire infrastructure, including cross-platform management of Mac OS X, Linux, and UNIX.Learn SCCM in a Month of Lunches is a super-practical guide to Microsoft System Center Configuration Manager. This book cuts to the chase and gets readers up to speed with the day-to-day tasks of managing a system with SCCM in a matter of days. Whether readers have just been pressed into service as new sysadmins or are familiar with the inner workings of Active Directory and App-V, they'll be productive immediately as they work through the 25 self-contained lessons in this handy tutorial.Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.

Really Understand Binary


Rex A. Barzee - 2014
     The binary number system (also called base 2) is used by computers to store numbers and to perform arithmetic. A software developer that understands binary will write code that compensates for the limitations a computer has when doing arithmetic. A network analyst will use binary to divide and configure networks with subnet masks. A security analyst will use binary to understand data encryption and to analyze attacks. This book will help you really understand binary by comparing it to what you already know in base 10. From this book you will learn 1. How to easily convert between binary, hexadecimal, and decimal 2. How to add, negate, subtract, divide, and multiply in binary 3. How a computer multiplies integers in binary 4. What the binary operators do: left shift, unsigned right shift, signed right shift, not, and, or, exclusive or 5. How IEEE 754 binary floating point numbers represent real base 10 numbers

High Availability for the LAMP Stack: Eliminate Single Points of Failure and Increase Uptime for Your Linux, Apache, MySQL, and PHP Based Web Applications


Jason Cannon - 2014
    This step-by-step guide teaches you everything you need to know in order to eliminate single points of failure for your Linux, Apache, MySQL, and PHP based web applications.Do you wish you could ensure your web site was up all the time and finally enjoy a peaceful night's sleep?Do you want to be able to scale without downtime and handle unexpected surges of traffic?Do you want a solution that just works without spending weeks testing various combinations of technologies and software?Do you want someone to lay it all out for you and walk you through an entire deployment?If so, you're in the right place... I understand, because I've been there. I know what it's like to be woken up in the middle of the night when a web server goes down. I don't know about you, but I'm fairly grumpy at 2:47 A.M. when something is broke and I'm the one that has to fix it.That's why I strive to eliminate single points of failure and ensure service availability. I would much rather plan for failure ahead of time than have to react to it. If you have a robust design that's easy to support you can repair any failures at your convenience instead of trying to cobble together a makeshift solution in the middle of the night.I've spent countless hours designing, testing, and implementing high availability solutions for a wide range of Linux based services during my career. I've put together a well designed, well tested solution for the LAMP (Linux, Apache, MySQL, PHP) stack that easily scales to support an increasing number of users all the while decreasing downtime. I've taken each possible single point of failure into account from the obvious ones to the less than obvious edge cases you'll need to cover in order to have a truly robust design. This architecture and design: Works on physical servers. If you're running on bare metal, this design will work for you. Works in virtual environments such as VMWare, VirtualBox, Ovirt, Red Hat Enterprise Virtualization (RHEV), KVM, and Xen. Works in the cloud -- You'll learn about the important nuances for running in the cloud. This design works whether you're using Amazon Web Services (AWS), Rackspace Cloud, or another provider. Scales without downtime…. add more servers or resources without users even noticing. Works with custom written web sites and applications that run on the LAMP stack. Supports popular open source web applications such as WordPress, Drupal, Joomla, MediaWiki, phpBB, Redmine, SugarCRM, and more. This demonstrates everything step-by-step... This is not just a design, though. It's an entire book complete with lessons and demonstrations you can use on actual Linux servers. In the book I'll be performing the demonstrations on Ubuntu servers, but the concepts are the same no matter if you're using RedHat Enterprise Linux, CentOS, or another distribution. The only real difference is the couple of commands you'll use to perform some of the software installations. The design and configurations remain the same. Apply what you learn to other situations Even though this course is targeted directly at the LAMP stack (Linux, Apache, MySQL, PHP), the concepts and techniques presented can be reused in a variety of other situations.

Computer Coding for Kids


Carol Vorderman - 2014
    Computer Coding for Kids is a unique step-by-step guide, perfect for kids interested in computer programming and how computers work. Avoiding computer jargon, this book guides children through creating computer programs starting with the very basics. Computer Coding for Kids is the only programming book that teaches both Scratch and Python programming languages, with illustrated, simple, step-by-step explanations that make the complex art of computer programming clear for the complete beginner. Starting with simple explanations of programming basics, it progresses to more advanced projects where children can build their own games.Computer Coding for Kids is ideal for kids looking to take your first steps into programming or those that are already interested and hungry to learn more.

Making Music with Computers: Creative Programming in Python (Chapman & Hall/CRC Textbooks in Computing)


Bill Manaris - 2014
    Making Music with Computers: Creative Programming in Python introduces important concepts and skills necessary to generate music with computers. It interweaves computing pedagogy with musical concepts and creative activities, showing students how to integrate the creativity and design of the arts with the mathematical rigor and formality of computer science.The book provides an introduction to creative software development in the Python programming language. It uses innovative music-creation activities to illustrate introductory computer programming concepts, including data types, algorithms, operators, iteration, lists, functions, and classes. The authors also cover GUIs, event-driven programming, big data, sonification, MIDI programming, client–server programming, recursion, fractals, and complex system dynamics.Requiring minimal musical or programming experience, the text is designed for courses in introductory computer science and computing in the arts. It helps students learn computer programming in a creative context and understand how to build computer music applications. Also suitable for self-study, the book shows musicians and digital music enthusiasts how to write music software and create algorithmic music compositions.Web ResourceA supplementary website (http://jythonMusic.org) provides a music library and other software resources used in the text. The music library is an extension of the jMusic library and incorporates other cross-platform programming tools. The website also offers example course and associated media resources.

Professional Application Lifecycle Management with Visual Studio 2013


Mickey Gousset - 2014
    The focus will be on practical application of the tools on code samples, development scenarios and automation scripting. The book is designed to be used both as a step-by-step guide and as a reference for modeling, designing and coordinating enterprise solutions at every level using ALM.The focus is on practical implementation, with a nuts & bolts approach. For example, as a case study the authors will put C# code through a series of practical tests to show the reader how to make use of the testing tools available in ALM. The authors will also provide examples demonstrating new capabilities for supporting non-Microsoft projects, inlcuding iOS, MacOS, Java and Android development. This edition will be forward-compatible with future product releases.

Does My Voice Count?: A Book about Citizenship


Sandy Donovan - 2014
    That's what good citizenship is all about! The questions and answers in this book will show you how to be a great citizen. Get ready to make your voice count!

The Scanner Monkey Way: Sharing With a Tribe of Online Sellers to Make More Money and Have More Fun


Jay Bayne - 2014
    The underlying theme is how sharing information and working WITH rather than AGAINST other online sellers will help you increase your sales on Amazon or eBay and grow your business. Scanner Monkey founder, Jay Bayne, and his co-leader, Cordelia Blake walk you through the history of the Scanner Monkey group and discuss how living by the “Scanner Monkey Way” code of conduct can benefit all online sellers in a group. You will learn how utilizing crowd sourcing to locate profitable deals (or BOLOs) can not only help you make more money, but also have more fun than a barrel of monkeys! This will be illustrated with several examples from some of the Scanner Monkey members on how sharing with their "co-opetition" has benefited their businesses. Lastly, resources like the BOLOG database of deals and the private BOLO Exchange will be explained as ways to enhance your product sourcing.

Learning AV Foundation: A Hands-On Guide to Mastering the AV Foundation Framework


Bob McCune - 2014
    However, the framework is extremely large, reliant on cutting-edge language features, and poorly documented. Now, there's a more productive way to master these immensely powerful technologies: Bob McCune's Learning AV Foundation. McCune's live presentations and GitHub projects have already helped thousands of Apple developers get started with AV Foundation. Building on his experience, McCune helps you gain true mastery by creating real-world apps, hands-on. You'll build a voice memo app, custom video player, video editor, and an image/video camera app. As you proceed, you'll master all the techniques you need to write your own advanced media apps from scratch. Throughout, McCune provides carefully crafted challenges and complete starter apps--all designed to help you deepen your understanding and make the most of Apple's breakthrough media framework. COVERAGE INCLUDES Understanding how AV Foundation fits in Apple's media environment and each of its key areas of functionalityEnabling your apps with audio playback and recording featuresEnhancing video playback to deliver a richer, more dynamic experienceUsing AV Kit to match your user interfaces with iOS Videos or OS X QuickTime PlayerDeveloping media capture apps with real-time video processing using OpenGL ES and Core ImageImplementing custom video playersIntegrating advanced capture features such as video zooming, face detection, barcode scanning, and high frame rate captureMixing multiple audio tracks and automating volume controlBuilding sophisticated non-linear, non-destructive editing appsAdding advanced video editing capabilities, such as video transitions and animation effects

Responsive Web Design With Adobe Photoshop


Dan Rose - 2014
    However, that work generally results in a static graphic of the page, which has to be translated by a developer into the components of a Web page: HTML files and Web-compatible image files.Our multi-device world has shown us that this approach to web design, including full-page comps done in Photoshop, is increasingly problematic. Modern web designers are adopting a new approach: creating flexible web pages whose layout can adapt to suit the screen on which they are displayed. This is "Responsive Web Design" [RWD].Until now, books on designing responsive Web sites have focused on HTML and CSS - in other words, they've been very code-centric, and visual creativity seems to take a back seat. This new book is aimed at the visual Web designer who's accustomed to working in Photoshop. Adobe Photoshop CC contains many new features that help streamline the process of converting a static page design to a set of components for a responsive web page.Dan Rose is one of the best-known advocates of this new way of working in Photoshop. He's observed that only a few people are talking about Photoshop for RWD constructively, yet a majority (63% as of his last informal poll) of web designers are using Photoshop for more than simple asset creation. This transition is a pain point for many designers.His new book will balance coverage of conceptual issues (how to fit tools like Photoshop to the design workflow rather than fitting a workflow to the tools) with practical design exercises tailored to help communicate the overall design direction of the page while respecting the needs of the fluid Web. In addition, he will introduce methods for taking HTML back into Photoshop for further refinement.

Behold a Pale Farce: Cyberwar, Threat Inflation, the Malware Industrial Complex


Bill Blunden - 2014
    By demonstrating that the American public is being coerced by a threat that has been blown out of proportion—much like the run-up to the Gulf War or the global war on terror—this book discusses how the notion of cyberwar instills a crisis mentality that discourages formal risk assessment, making the public anxious and hence susceptible to ill-conceived solutions. With content that challenges conventional notions regarding cyber security, Behold a Pale Farce covers topics—including cybercrime; modern espionage; mass-surveillance systems; and the threats facing infrastructure targets such as the Federal Reserve, the stock exchange, and telecommunications—in a way that provides objective analysis rather than advocacy. This book is a must-read for anyone concerned with the recent emergence of Orwellian tools of mass interception that have developed under the guise of national security.

Mastering Hyper-V 2012 R2 with System Center and Windows Azure


John Savill - 2014
    Coverage also includes hybrid cloud scenarios specifically with Windows Azure to complete the full virtualization piece of providing data both on premise and off premise.In addition, you will explore the Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities, how seamless management is possible with PowerShell and System Center, plus how Azure Storage can play a part in a company’s complete solution.Key topics covered include: virtualization fundamentals, network virtualization, storage configuration, Hyper-V management and maintenance, failover clustering and migration, Hyper-V replica and cloud orchestration, private cloud implementation, Azure IaaS, Azure storage, managing with PowerShell, Hyper-V decoding, and Windows Server 2012 R2 integration.

Ethical Hacking and Penetration Testing Guide


Rafay Baloch - 2014
    You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test. The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each of the steps and tools in a structured, orderly manner allowing you to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process will allow you to clearly see how the various tools and phases relate to each other. An ideal resource for those who want to learn about ethical hacking but don't know where to start, this book will help take your hacking skills to the next level. The topics described in this book comply with international standards and with what is being taught in international certifications.

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation


Bruce Dang - 2014
    Reverse engineering is not about reading assembly code, but actually understanding how different pieces/components in a system work. To reverse engineer a system is to understand how it is constructed and how it works. The book provides: Coverage of x86, x64, and ARM. In the past x86 was the most common architecture on the PC; however, times have changed and x64 is becoming the dominant architecture. It brings new complexity and constructs previously not present in x86. ARM ("Advanced RISC Machine) "is very common in embedded / consumer electronic devices; for example, most if not all cell phones run on ARM. All of apple's i-devices run on ARM. This book will be the first book to cover all three.Discussion of Windows kernel-mode code (rootkits/drivers). This topic has a steep learning curve so most practitioners stay away from this area because it is highly complex. However, this book will provide a concise treatment of this topic and explain how to analyze drivers step-by-step.The book uses real world examples from the public domain. The best way to learn is through a combination of concept discussions, examples, and exercises. This book uses real-world trojans / rootkits as examples congruent with real-life scenariosHands-on exercises. End-of-chapter exercises in the form of conceptual questions and hands-on analysis so so readers can solidify their understanding of the concepts and build confidence. The exercises are also meant to teach readers about topics not covered in the book.

Microcontrollers: From Assembly Language to C Using the PIC24 Family


Bryan A. Jones - 2014
    Hardware interfacing topics include parallel port usage, analog-to-digital conversion, digital-to-analog conversion, the serial peripheral bus (SPI), the inter-integrated circuit bus (I2C), asynchronous serial communication, and timers. Assembly language programming is covered in the context of the PIC24 instruction set, and no initial knowledge of assembly language programming is assumed. Specific hardware interfacing topics covered are parallel IO, analog-to-digital/digital-to-analog conversion, pulse width modulation, timer usage for IO polling, and industry standard serial interface standards. Interfacing examples include external devices such as pushbutton switches, LEDs, serial EEPROMs, liquid crystal displays (LCDs), keypads, rotary encoders, external digital-to-analog converters, DC motors, servos, temperature sensors, and IR receivers. Master the PIC24 family with MICROCONTROLLERS: FROM ASSEMBLY LANGUAGE TO C USING THE PIC24 FAMILY.

Yes, you can... sell your handmade wares online


T.K. Kinney - 2014
    If you are looking for get rich quick methods or for ways to “make” money… this Kindle Mini is not for you. However, the only thing limiting how much money you could earn by combining this information with your own determination is most likely (wait for it)…you. If you have been told by more than one person that you may not be living up to your own potential, it may be true. Setting aside blaming anyone else, ask yourself if you think you can do better for yourself, for your family and maybe even for the world. NOTE: This is not a” book”. This is one unit of a collection of Kindle Mini’s being made available periodically in an effort to distribute information that is inspiring, useful and/or current. This unit is primarily a list of over 20 websites that were live and/or active at the time of publication.

A 2014 Guide to Free PC Software


Norman W Jordan - 2014
    Links are provided to where you can download the program. Software programs the writer has used is recommended. And things to stay away from are included.

Etsy Selling Success: How To Sell On Etsy - Pinterest Edition (Etsy Selling, Etsy Business, Etsy Success)


Donna Henderson - 2014
    Regularly priced at $5.99. Read on your PC, Mac, smart phone, tablet or Kindle device. Starting an Etsy shop was most likely a big decision for you. Is it seriously lagging in sales? Are you out of fresh ideas to stir up interest in your products? Is your free time very limited? There are ways to really boost the sheer number of eyes that see your products on a daily basis. This can easily translate to more sales. Pinterest is a social media platform that is all about a beautiful visual presentation. It is the PERFECT forum to present your products to those that would be most interested; fellow artisans. Download this book NOW and: Find Out How To Create A Pinterest Account. Learn How To Use The Pinterest Community To Promote Your Products. Discover The Best Ways To Use Pinterest To Showcase Your Products And Skills. Discover The Best Ways To Use Pinterest To Showcase Your Products And Skills. Pinterest is a great way to become more social with fellow crafters and get your looked at more people than you could have ever imagined. Download this book NOW and get your business going using Pinterest! Download your copy today! To order, click the BUY button and download your copy right now! Tags: etsy, how to sell on etsy, selling on etsy, etsy selling, etsy selling success, etsy success, etsy business

Delphi Cookbook


Daniele Teti - 2014
    Familiarity with the fundamentals of RAD (Rapid Application Development) Studio is expected. What You Will Learn Develop visually stunning applications using FireMonkey Deploy LiveBinding effectively with the right OOP approach Create server-side programs to serve RESTful web services and provide data to your mobile apps Use well-defined GUI design patterns to build mobile applications that provide a great user experience Build mobile apps that read data from a remote server efficiently Call the platform native API on Android and iOS even for an unpublished API Manage software customization for your customer by making better use of an extended RTTI Implement the most popular design pattern without wasting too much time on debugging and bug fixing In Detail Delphi is a cross-platform Integrated Development Environment (IDE) that supports rapid application development for Microsoft Windows, Apple Mac OS X, Google Android, and Apple iOS. It helps you to concentrate on the real business and save yourself the pain of wandering amid GUI widget details, or having to tackle inter-platform incompatibilities. It also has a wide range of drag-and-drop controls, helping you code your business logic into your business model, and it compiles natively for desktop and mobile platforms.This book will teach you how to design and develop applications, deploy them on the cloud platform, and distribute them within an organization via Google Play and other similar platforms.You will begin with the basics of Delphi and get acquainted with JSON format strings, XSLT transformations, unicode encodings and various types of streams. We then move on to more advanced topics such as developing higher-order functions and using enumerators and RTTI. You will get an understanding of how Delphi RTL functions and how to use FireMonkey in a VCL application. We will then cover topics such as multithreading, using the parallel programming library and putting Delphi on a server. We will also take a look at the new feature of WebBroker Apache modules and then ride the mobile revolution with FireMonkey.By the end of the book, you will be able to develop and deploy cross-platform applications using Delphi.

Smartphones and beyond: Lessons from the remarkable rise and fall of Symbian


David W. Wood - 2014
    These multi-purpose near-miracle devices place into the hands of users worldwide astonishing quantities of real-time information. They have become major sources of entertainment, utility, and control. Indeed, every year, smartphones become ever more capable. As such, they’re profoundly transforming human experience in every walk of life. But where are these steps of smartphone progress taking us? What are the core factors that have propelled all these improvements? And can we re-use some of that underlying improvement engine for potentially even more significant purposes? In short, these are questions of the smartphone future, the smartphone past, and the wider present. These questions deserve good answers. These questions have inspired the author to set down in writing his own experiences and reflections from two helter-skelter decades close to the heart of this remarkable industry. Throughout that time period, he has been an avid enthusiast for the potential of smartphones, an active participant in many key projects, a futurist and forecaster of what might happen next, and, at the same time, a persistent critic of much of what he saw. He observed at close quarters the maelstrom of the industry, with its rich mix of stunning successes and devastating failures. He lived through a great deal which deserves to be better known. This book shares particular insight from the inside story of the remarkable rise and fall of Symbian. Symbian is the comparatively little-known company that, behind the scenes, laid vital foundations for the present-day near-ubiquity of smartphones. Despite its subsequent untimely demise, Symbian has rich connections with the future, the past, and the wider present of smartphones. The author tells the Symbian story from his unique vantage point as the only person to remain on the company’s senior leadership team throughout almost the entirety of its turbulent, roller-coaster existence: from its 1998 formation as an uneasy joint venture based around “the big three” giants of the mobile phone industry of that era – Ericsson, Motorola, and Nokia – right through to its collapse, a dozen years later, under pressure from faster, nimbler, more inspired competitors from Silicon Valley. Nowadays few people remember much about Symbian – if they ever knew about it in the first place. It was a company that mainly lived in the shadows, away from public glare. But despite its low public profile, Symbian was the indisputable global leader in the smartphone market for most of the first decade of the 21st century. During that time, software developed by Symbian powered the vast majority of the world’s smartphones, as the smartphone market itself grew and grew in scale. Sales of Symbian-powered smartphones went from millions of units being sold in a year, through millions of units being sold in a month, to millions of units being sold each week. For much of that time, Symbian appeared to have the potential to be “the Microsoft of mobile computing”, with potential revenues and publicity to match. Symbian’s customers included the world’s top five mobile phone manufacturers, and many other regional leaders. But sales eventually peaked, in 2010, and fell into steep decline shortly afterwards. Ask people today about smartphones and the words they’ll mention are “iPhone”, “Android” – and (perhaps) “Windows Phone” or “RIM BlackBerry”. The word “Symbian” is a fast-receding memory. It need not have turned out this way. With different choices and different actions, Symbian could have fulfilled its vision of being “the most widely used and most widely liked software platform in the world”. As the book shows, that vision was credible as well as ambitious. En route, the Symbian story, “warts and all”, suggests many practical lessons for how to guide the future evolution of other forms of smart technology.

Designing Software Synthesizer Plug-Ins in C++: For RackAFX, VST3, and Audio Units


Will Pirkle - 2014
    You will learn synthesizer operation, starting with the underlying theory of each synthesizer component, and moving on to the theory of how these components combine to form fully working musical instruments that function on a variety of target digital audio workstations (DAWs). Containing some of the latest advances in theory and algorithm development, this book contains information that has never been published in textbook form, including several unique algorithms of the author’s own design.The book is broken into three parts: plug-in programming, theory and design of the central synthesizer components of oscillators, envelope generators, and filters, and the design and implementation of six complete polyphonic software synthesizer musical instruments, which can be played in real time. The instruments implement advanced concepts including a user-programmable modulation matrix. The final chapter shows you the theory and code for a suite of delay effects to augment your synthesizers, introducing you to audio effect processing.The companion website, www.focalpress.com/cw/pirkle, gives you access to free software to guide you through the application of concepts discussed in the book, and code for both Windows and Mac platforms. In addition to the software, it features bonus projects, application notes, and video tutorials. A reader forum, monitored by the author, gives you the opportunity for questions and information exchange.

Advanced Python for Biologists


Martin O. Jones - 2014
    It starts with the basic Python knowledge outlined in Python for Biologists and introduces advanced Python tools and techniques with biological examples. You'll learn: - How to use object-oriented programming to model biological entities - How to write more robust code and programs by using Python's exception system - How to test your code using the unit testing framework - How to transform data using Python's comprehensions - How to write flexible functions and applications using functional programming - How to use Python's iteration framework to extend your own object and functions Advanced Python for Biologists is written with an emphasis on practical problem-solving and uses everyday biological examples throughout. Each section contains exercises along with solutions and detailed discussion.

Cython: A Guide for Python Programmers


Kurt W Smith - 2014
    It's possible with Cython, the compiler and hybrid programming language used by foundational packages such as NumPy, and prominent in projects including Pandas, h5py, and scikits-learn. In this practical guide, you'll learn how to use Cython to improve Python's performance--up to 3000x-- and to wrap C and C++ libraries in Python with ease.Author Kurt Smith takes you through Cython's capabilities, with sample code and in-depth practice exercises. If you're just starting with Cython, or want to go deeper, you'll learn how this language is an essential part of any performance-oriented Python programmer's arsenal.Use Cython's static typing to speed up Python codeGain hands-on experience using Cython features to boost your numeric-heavy PythonCreate new types with Cython--and see how fast object-oriented programming in Python can beEffectively organize Cython code into separate modules and packages without sacrificing performanceUse Cython to give Pythonic interfaces to C and C++ librariesOptimize code with Cython's runtime and compile-time profiling toolsUse Cython's prange function to parallelize loops transparently with OpenMP

Talk to Me


Sonia Ellis - 2014
    But with the rest of the world — except for Bella, her robotic cat — she's too terrified to speak a word. Maddie wakes one night to find an intruder in the house, and now she's the only one who can identify him and save Mom from being arrested. Sadina suspects her best friend, Rio — especially now that Rio has started paying attention to another girl. With Mom in trouble and Rio acting like a stranger, Sadina's world is collapsing. And that's when her friends join together to help transform Bella into Chattercat, a talking robot that just might get some answers from Maddie.Filled with beautiful watercolor illustrations, this captivating mystery, geared toward readers in grades 4 to 8, covers a range of important issues: friendship, teamwork, trust, making hard choices, and continuing to pursue goals, even in the face of overwhelming odds. With its key plot device involving artificial intelligence, the story contributes to student interest in STEM fields.

DIY Comms and Control for Amateur Space: Talking and Listening to Your Satellite


Sandy Antunes - 2014
    We walk the path originally paved by AMSATs to discuss the steps and licensing needed to set up and operate both a command uplink and a data download station and network. Find out how playing nicely with others maximizes your ability to get your data down.

OpenCV Essentials


Oscar Deniz Suarez - 2014
    Working experience with computer vision / image processing is expected.

Rna-Seq Data Analysis: A Practical Approach


Eija Korpelainen - 2014
    RNA-seq Data Analysis: A Practical Approach enables researchers to examine differential expression at gene, exon, and transcript levels and to discover novel genes, transcripts, and whole transcriptomes.Balanced Coverage of Theory and Practice.Each chapter starts with theoretical background, followed by descriptions of relevant analysis tools and practical examples. Accessible to both bioinformaticians and nonprogramming wet lab scientists, the examples illustrate the use of command-line tools, R, and other open source tools, such as the graphical Chipster software.The Tools and Methods to Get Started in Your Lab. Taking readers through the whole data analysis workflow, this self-contained guide provides a detailed overview of the main RNA-seq data analysis methods and explains how to use them in practice. It is suitable for researchers from a wide variety of backgrounds, including biology, medicine, genetics, and computer science. The book can also be used in a graduate or advanced undergraduate course.

Arduino Programming in 24 Hours, Sams Teach Yourself


Richard Blum - 2014
    Arduino users range from hobbyists to artists, students to electronic designers who want to prototype their hottest new products. To make the most of Arduino, though, they need to master C, Arduino's primary software language -- and C can be challenging. "Sams Teach Yourself Arduino Programming in 24 Hours" is the solution. This hands-on tutorial guides you through every step of learning C programming on Arduino, giving you a springboard for creating virtually any project. Perfect for anyone getting started with "DIY" hardware, it combines just the right depth of C instruction with plenty of expert guidance and easy-to-understand project examples. You'll learn how to:Set up an efficient Arduino programming environmentWrite code with the Arduino IDE, and quickly create working programsMaster C syntax, decision control, strings, data structures, functions, pointers, EEPROM data storage, and hardware librariesWork with both digital interfaces and analog devicesAdd interrupts, communicate with devices, and use sensorsWork with motors, LCDs, and Ethernet networkingWrite and read data files to SD memory cardsCreate prototyping environments, use prototyping shields, and interface electronics to your ArduinoThroughout, step-by-step instructions walk you through key tasks... Q and As, Quizzes, and Exercises test your knowledge... "Did You Know?" tips offer insider advice... "Watch Out!" alerts help you avoid problems. By the time you're finished, you won't just understand core C and Arduino concepts: you'll be ready to create inspired Arduino projects of your own.

Wordpress 4 :: Rapid Wordpress Websites: A visual step-by-step guide to building Wordpress websites fast! (Webmaster Series Book 5)


Andy Williams - 2014
    It teaches you on a strictly "need-to-know" basis, and will have you building your own website in hours. And I don't leave you stranded either. I created a companion website for readers of this book, with tutorials and help to take your Wordpress skills to the next level, when, and only when, YOU are ready. What's in this book? We start at the very beginning by getting good, reliable web hosting and choosing a domain name. I actually walk you through every step, so there will be no confusion. Once you have your domain, we'll install Wordpress and have a look around the Wordpress Dashboard - think of this as your mission control. After planning what we want to do, we'll actually build the companion site as we work through the book. We cover the essential settings in Wordpress that you need to know, how to use the editor, the difference between pages and post, categories and tags, etc. We'll set up custom navigation so your visitors can find their way around your Wordpress site, and carefully use widgets to enhance the design and user experience. Once the site is built, we'll play around with customizing the look and feel using themes, and I'll point you in the direction of some interesting plugins you might like to look at. These will be covered in more depth on the companion website. The book will take you from nothing to a complete website in hours, and I'll point out a number of beginner mistakes and things to avoid. Who am I? My name is Andy Williams and I am a Wordpress-a-holic. I've been using Wordpress for nearly 10 years to build sites for myself, and my clients. I run a newsletter over at ezseonews.com.

Windows Performance Secrets


Mark L. Van Name - 2014
    The authors provide unique information that isn't available elsewhere. The CD-ROM contains WinBench and Winstone, Ziff-Davis' industry standard benchmarking software.

How to Setup a Windows PC: A Step-by-Step Guide to Setting Up and Configuring a New or Existing Computer (Location Independent Series Book 4)


Jeff Blum - 2014
    Which is a missed opportunity since doing it well can supercharge your productivity and safeguard your important data. The topics discussed in this book not only apply to a new computer, but can be used to verify that your current computer is optimized for productivity and security as well.The steps I discuss include everything you need to know and do to get the best Windows user experience.The book is written mostly as a step-by-step guide, covering the following steps:Step 0: Pre-SetupStep 1: Setup Computer and Create Administrator and Guest AccountsStep 2: Make a System ImageStep 3: Install Antivirus SoftwareStep 4: Remove CrapwareStep 5: Update the Operating System (OS)Step 6: Import Data Files from Your Old ComputerStep 7: Install Printers and Other PeripheralsStep 8: Install and Configure Browser(s) of ChoiceStep 9: Install Your Preferred SoftwareStep 10: Perform a Full Security Scan and run CCleanerStep 11: Create a System BackupStep 12: Organize, Protect, Sync and Backup Your DataStep 13: Working More Productively with Your ComputerStep 14: Protect Your Computer against Loss or TheftStep 15: Use and Look for ProblemsStep 16: Care for Your LaptopStep 17: Prepare Your Old ComputerScattered throughout the book you will find hundreds of links to useful resources. I have further added appendices about caring for your computer, putting your computer to use when idle, and basic troubleshooting ideas.

Stop Thief! - Identity Theft Protection, Credit Ratings and Repair and Other Fraud and Cyber Crime Prevention: A comprehensive guide of proven strategies ... Detection, Prevention, Identity Theft)


Michael Boyd - 2014
    Identity Theft can be a frustrating and overwhelming experience, but there are ways to protect yourself, and this book will help. Here Is A Preview Of What You'll Learn...The different types of Identity TheftThe methods and techniques of Identity ThievesNumerous ways to begin to protect yourself NOWSigns to detect if your credit or identity has been compromisedWhat to do NOW! A step by step guide if your identity has been stolenChildren's Identity Theft and ProtectionThe emotional effects of Identity Theft and how to cope...And much, much more!Download your copy today and protect your identity and credit now! Tags: Theft, Identity Thieves, Cyber Crimes, Cyber Theft, Computer Crimes, Internet Crimes, Stolen Identity, Credit Card Fraud, Bank Fraud, Credit Ratings and Repair

The Java Virtual Machine Specification, Java Se 8 Edition


Tim Lindholm - 2014
    The book provides complete, accurate, and detailed coverage of the Java Virtual Machine. It fully describes the new features added in Java SE 8, including the invocation of default methods and the class file extensions for type annotations and method parameters. The book also clarifies the interpretation of class file attributes and the rules of bytecode verification.

Adobe Master Class: Advanced Compositing in Photoshop: Bringing the Impossible to Reality with Bret Malley


Bret Malley - 2014
    . . a big-box store and parking lot can be transformed into a scene of reclaimed nature . . . and an ordinary person can sculpt fire with his bare hands. And in Adobe Master Class: Advanced Compositing in Photoshop, Bret shares the techniques he uses to elevate an image from the everyday to the extraordinary, showing you how to make seemingly impossible scenarios come to life. Starting with an overview of the Adobe Photoshop interface that focuses on the hidden tools you need to know to create stunning composite imagery, this fun yet informative guide walks through all the necessary stages-from the first planning sketches to the final finishing touches-of making all kinds of unique creations. Beyond the orientation of tools, layers, adjustments and more, Bret uses step-by-step tutorials to break down a wide variety of his Photoshop artworks. Additional detailed project walkthroughs offer tips on everything from creating a superhuman to compositing an epic fantasy landscape. And interviews and spreads featuring various established and emerging artists provide a range of inspirational imagery, creative insight, and professional know-how. - Features an engaging, writing style that makes learning advanced Photoshop techniques fun - Provides detailed, step-by-step examples, walking through complex compositing projects from start to finish - Includes "Visual Masters" spreads that highlight beautiful and innovative work by current digital artists to inspire you to bring what's in your imagination-the wildly impossible-to reality - Includes access to downloadable resource files so you can work through the projects along with the author Bret Malley is an award-winning digital artist and full-time college instructor living in Portland, Oregon, with his wife, Erin, and new baby boy, Kellen. He has an MFA in Computer Art from Syracuse University and teaches photography, design, and Adobe Photoshop to university and college students of all levels and backgrounds. As a computer artist, he is crazy about digital tools and art-making of all kinds, and especially enjoys working in Photoshop, his ultimate favorite of all applications.

E-learning with Camtasia Studio


David B. Demyan - 2014
    It delivers a high level of professional quality, enhancing the effectiveness of e-learning videos and the prestige of the video author.With this book, experts and new users alike will be led through a series of detailed tips and tutorials to design, record, edit, enhance, and deliver a stunning e-learning video that will work as a standalone or within a learning management system. By following through the examples, exercises, and screenshots in this book, you will gain thorough knowledge of creating and deploying your own video e-learning project in no time.

Learning Veeam® Backup & Replication for VMware vSphere


Christian Mohn - 2014
    This powerful and easy-to-use solution helps administrators rest assured that their data is protected, while at the same time retaining the flexibility that virtualization provides."Learning Veeam® Backup & Replication for VMware vSphere" starts with an introduction to Veeam® Backup & Replication, describing the prerequisites, requirements, and deployment steps needed to get the required infrastructure in place. It provides a description of its features and capabilities as well as useful tips on doing day-to-day administrative tasks. This book is a practical and hands-on guide to installing, configuring, and managing a backup infrastructure.

Linux for Beginners and Command Line Kung Fu


Jason Cannon - 2014
    Knowing where to start when learning a new skill can be a challenge, especially when the topic seems so vast. There can be so much information available that you can't even decide where to start. Or worse, you start down the path of learning and quickly discover too many concepts, commands, and nuances that aren't explained. This kind of experience is frustrating and leaves you with more questions than answers.Linux for Beginners doesn't make any assumptions about your background or knowledge of Linux. You need no prior knowledge to benefit from this book. You will be guided step by step using a logical and systematic approach. As new concepts, commands, or jargon are encountered they are explained in plain language, making it easy for anyone to understand. Here is what you will learn by reading Linux for Beginners: How to get access to a Linux server if you don't already. What a Linux distribution is and which one to choose. What software is needed to connect to Linux from Mac and Windows computers. Screenshots included. What SSH is and how to use it, including creating and using SSH keys. The file system layout of Linux systems and where to find programs, configurations, and documentation. The basic Linux commands you'll use most often. Creating, renaming, moving, and deleting directories. Listing, reading, creating, editing, copying, and deleting files. Exactly how permissions work and how to decipher the most cryptic Linux permissions with ease. How to use the nano, vi, and emacs editors. Two methods to search for files and directories. How to compare the contents of files. What pipes are, why they are useful, and how to use them. How and why to redirect input and output from applications. How to customize your shell prompt. How to be efficient at the command line by using aliases, tab completion, and your shell history. How to schedule and automate jobs using cron. How to switch users and run processes as others. Where to go for even more in-depth coverage on each topic. Command Line Kung Fu information: Become a Linux Ninja with Command Line Kung Fu! Do you think you have to lock yourself in a basement reading cryptic man pages for months on end in order to have ninja like command line skills? In reality, if you had someone share their most powerful command line tips, tricks, and patterns you'd save yourself a lot of time and frustration. What if you could look over the shoulder of a good friend that just happened to be a command line guru? What if they not only showed you the commands they were using, but why they were using them and exactly how they worked? And what if that friend took the time to write all of it down so you can refer to it whenever you liked? Well, a friend did just that. Command Line Kung Fu is packed with dozens of tips and over 100 practical real-world examples. You won't find theoretical examples in this book. The examples demonstrate how to solve actual problems and accomplish worthwhile goals. The tactics are easy to find, too. Each chapter covers a specific topic and groups related tips and examples together. For example, if you need help extracting text from a file look in the "Text Processing and Manipulation" chapter. Also, a comprehensive index is included. If you want to find every example where a given command is used -- even if it's not the main subject of the tip -- look in the index. It will list every single place in the book where that command appears.

Ruby Wizardry: An Introduction to Programming for Kids


Eric Weinstein - 2014
    The storybook combines whimsical narrative and fun illustrations with real programming lessons. As kids follow the adventures of young heroes Ruben and Scarlet, they'll learn about strings, loops, lambdas, hashes, and more Ruby programming skills.Ruby Wizardry is a modern day fairy tale that teaches programming skills kids can actually use, and it will have them hooked on programming for years to come.

Mastering Puppet


Thomas Uphill - 2014
    Deal with issues found in larger deployments, such as scaling, and improving performance. Step by step tutorial to utilize Puppet efficiently to have a fully functioning Puppet infrastructure in an enterprise- level environment In Detail Puppet is a configuration management system written for system administrators to manage a large number of systems efficiently and help maintain order. Mastering Puppet deals with the issues faced in larger deployments such as scaling and duplicate resource definitions. It will show you how to fit Puppet into your organization and keep everyone working. The concepts presented can be adapted to suit any size organization. This book starts with setting up and installing Puppet in your organization and then moves on to implementing version control in Puppet, creating custom modules, and extending your Puppet infrastructure. Finally, you will learn tips and tricks that are useful when troubleshooting Puppet and the best practices to make you a pro. What you will learn from this book Scale out your Puppet masters using proxy techniques Automate Puppet master deployment using Git Hooks, r10k, and librarian-puppet Access public modules from Git Forge and use them to solve real-world problems Use Hiera and ENC to automatically assign modules to nodes Create custom modules, facts, and types Use exported resources to orchestrate changes across the enterprise Approach Presented in an easy-to-follow, step-by-step tutorial format and packed with examples, this book will lead you through making the best out of Puppet in an enterprise environment. Who this book is written for If you are a system administrator or developer who has used Puppet in production and are looking for ways to easily use Puppet in an enterprise environment, this book is for you. This book assumes an intermediate

CORS in Action: Creating and consuming cross-origin APIs


Monsur Hossain - 2014
    It starts with the basics: how to make CORS requests and how to implement CORS on the server. It then explores key details such as performance, debugging, and security. API authors will learn how CORS opens their APIs to a wider range of users. JavaScript developers will find valuable techniques for building rich web apps that can take advantage of APIs hosted anywhere. The techniques described in this book are especially applicable to mobile environments, where browsers are guaranteed to support CORS. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the BookSuppose you need to share some JSON data with another application or service. If everything is hosted on one domain, it's a snap. But if the data is on another domain, the browser's "same-origin" policy stops you cold. CORS is a new web standard that enables safe cross-domain access without complex server-side code. Mastering CORS makes it possible for web and mobile applications to share data simply and securely. CORS in Action introduces CORS from both the server and the client perspective. It starts with making and enabling CORS requests and then explores performance, debugging, and security. You'll learn to build apps that can take advantage of APIs hosted anywhere and how to write APIs that expand your products to a wider range of users. For web developers comfortable with JavaScript. No experience with CORS is assumed.What's InsideCORS from the ground upServing and consuming cross-domain dataBest practices for building CORS APIsWhen to use CORS alternatives like JSON-P and proxiesAbout the AuthorMonsur Hossain is an engineer at Google who has worked on API-related projects such as the Google JavaScript Client, the APIs Discovery Service, and CORS support for Google APIs.Table of ContentsPART 1 INTRODUCING CORSThe Core of CORSMaking CORS requestsPART 2 CORS ON THE SERVERHandling CORS requestsHandling preflight requestsCookies and response headersBest practicesPART 3 DEBUGGING CORS REQUESTSDebugging CORS requestsAPPENDIXESCORS referenceConfiguring your environmentWhat is CSRF?Other cross-origin techniques

Basic Security Testing with Kali Linux


Daniel W. Dieterle - 2014
    Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can find issues with their security before the bad guys do.In "Basic Security Testing with Kali Linux," you will learn basic examples of how hackers find out information about your company, locate weaknesses in your security and how they gain access to your system.This hands-on, step by step learning book covers topics like: Kali Linux Introduction and Overview Metasploit & Metasploitable 2 Tutorials Information Gathering A section on Shodan (the "Hacker's Google") Exploiting Windows and Linux Systems Escalating Privileges in Windows Wireless (WiFi) Attacks Social Engineering Attacks Password Attacks Kali on a Raspberry Pi Securing your Network Though no network can be completely "Hacker Proof," knowing how an attacker works will help put you on the right track of better securing your network.

Data-Driven Security: Analysis, Visualization and Dashboards


Jay Jacobs - 2014
    This careful guide explores two of the most powerful data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security methods, and make better decisions.Everything in this book will have practical application for information security professionals.Helps IT and security professionals understand and use data, so they can thwart attacks and understand and visualize vulnerabilities in their networks Includes more than a dozen real-world examples and hands-on exercises that demonstrate how to analyze security data and intelligence and translate that information into visualizations that make plain how to prevent attacks Covers topics such as how to acquire and prepare security data, use simple statistical methods to detect malware, predict rogue behavior, correlate security events, and more Written by a team of well-known experts in the field of security and data analysis Lock down your networks, prevent hacks, and thwart malware by improving visibility into the environment, all through the power of data and Security Using Data Analysis, Visualization, and Dashboards.