Best of
Computers

2018

Explain the Cloud Like I'm 10


Todd Hoff - 2018
    And I mean all the time. Every day there’s a new cloud-based dating app; a new cloud-based gizmo for your house; a new cloud-based game; or a thousand other new things—all in the cloud.The cloud is everywhere! Everything is in the cloud! What does it mean! Let’s slow down. Take a deep breath. That’s good. Take another. Excellent. This book teaches you all about the cloud. I’ll let you in on a little secret: the cloud is not that hard to understand. It’s not. It’s just that nobody has taken the time to explain to you what the cloud is. They haven’t, have they?Deep down I think this is because they don’t understand the cloud either, but I do. I’ve been a programmer and writer for over 30 years. I’ve been in cloud computing since the very start, and I’m here to help you on your journey to understand the cloud. Consider me your tour guide. I’ll be with you every step of the way, but not in a creepy way.I take my time with this book. I go slow and easy, so you can build up an intuition about what the cloud really is, one idea at a time. When you finish reading, you’ll understand the cloud. When you hear someone say some new cool thing is in the cloud, you’ll understand exactly what they mean. That’s a promise. How do I deliver on that promise? I use lots and lots of pictures. I use lots and lots of examples. We’ll reveal the secret inner-workings of AWS, Netflix, Facebook Messenger, Amazon Kindle, Apple iCloud, Google Maps, Nest and cloud DVRs. You’ll learn by seeing and understanding; no matter if you're a complete beginner, someone who knows a little and wants to learn more, or a programmer looking to change their career to the cloud.The cloud is the future. You don't want to miss out on the future, do you? Read this book and we'll discover it together.I’m excited. This will be fun. Let’s get started!

The CRPG Book Project - Expanded Edition


Felipe Pepe - 2018
    The completed ebook was first released as a free PDF in 2018, getting over 160,000 downloads. A deal was then made with Bitmap Books, which published a limited hardcover version of the book in 2019. All of the author’s profits (£20.992 as of January 2022) were donated to Vocação, a Brazilian NGO that helps kids and teenagers from poor areas to get a better education and find employment.In 2022, a new expanded edition was released, now with 160 extra pages, addressing issues with the previous release and expanding it to include games that were never released in English, as well as MMOs, MUDs, RPG Maker titles and more.This expanded edition is freely available for download at the project's website.

Getting Clojure


Russ Olsen - 2018
    The vision behind Clojure is of a radically simple language framework holding together a sophisticated collection of programming features. Learning Clojure involves much more than just learning the mechanics of the language. To really get Clojure you need to understand the ideas underlying this structure of framework and features. You need this book: an accessible introduction to Clojure that focuses on the ideas behind the language as well as the practical details of writing code.

Discovering Morgan


J.A. Armstrong - 2018
    She lives by them. Her rules have been her guide for thirty-one years. That is, until she meets Morgan Lane. When Hannah's best-friend and business partner asks her to appear on his friend, Morgan's radio show, Hannah balks. When Morgan approaches Hannah, Hannah finds herself unable to refuse. As time passes, Hannah and Morgan’s friendship begins to thrive, along with it, Hannah’s attraction to her friend. Everything in Hannah’s life becomes uncertain. Are her self-imposed rules and schedules the means to the end she desires, or have they become the roadblock standing in her way? What does Hannah desire? Does she know? As she makes discoveries about Morgan, Hannah begins the arduous process of uncovering herself. It's a journey she never expected to take. It's an exploration she desperately craves. Discovering Morgan is the first erotic-romance in the Journey of Exploration series of short stories by best-selling author JA Armstrong.

ASP.NET Core in Action


Andrew Lock - 2018
    ASP.NET Core is a re-imagining of the .NET Framework that frees developers from Visual Studio and Windows.ASP.NET Core in Action is for C# developers without any web development experience who want to get started and productive using ASP.NET Core to build web applications.

Django for Beginners: Learn web development with Django 2.0


William S. Vincent - 2018
    Proceed step-by-step through five progressively more complex web applications: from a "Hello World" app all the way to a robust Newspaper app with a custom user model, complete user authentication flow, foreign key relationships, and more. Learn current best practices around class-based views, templates, urls, user authentication, testing, and deployment. The material is up-to-date with the latest versions of both Django (2.0) and Python (3.6). TABLE OF CONTENTS: * Introduction * Chapter 1: Initial Setup * Chapter 2: Hello World app * Chapter 3: Pages app * Chapter 4: Message Board app * Chapter 5: Blog app * Chapter 6: Forms * Chapter 7: User Accounts * Chapter 8: Custom User Model * Chapter 9: User Authentication * Chapter 10: Bootstrap * Chapter 11: Password Change and Reset * Chapter 12: Email * Chapter 13: Newspaper app * Chapter 14: Permissions and Authorizations * Chapter 15: Comments * Conclusion

Cracking Codes with Python: An Introduction to Building and Breaking Ciphers


Al Sweigart - 2018
    You’ll begin with simple programs for the reverse and Caesar ciphers and then work your way up to public key cryptography, the type of encryption used to secure today’s online transactions, including digital signatures, email, and Bitcoin.Each program includes the full code and a line-by-line explanation of how things work. By the end of the book, you’ll have learned how to code in Python and you’ll have the clever programs to prove it!You’ll also learn how to:- Combine loops, variables, and flow control statements into real working programs- Use dictionary files to instantly detect whether decrypted messages are valid English or gibberish- Create test programs to make sure that your code encrypts and decrypts correctly- Code (and hack!) a working example of the affine cipher, which uses modular arithmetic to encrypt a message- Break ciphers with techniques such as brute-force and frequency analysisThere’s no better way to learn to code than to play with real programs. Cracking Codes with Python makes the learning fun!

Practical SQL: A Beginner's Guide to Storytelling with Data


Anthony DeBarros - 2018
    The book focuses on using SQL to find the story your data tells, with the popular open-source database PostgreSQL and the pgAdmin interface as its primary tools.You'll first cover the fundamentals of databases and the SQL language, then build skills by analyzing data from the U.S. Census and other federal and state government agencies. With exercises and real-world examples in each chapter, this book will teach even those who have never programmed before all the tools necessary to build powerful databases and access information quickly and efficiently.You'll learn how to: •Create databases and related tables using your own data •Define the right data types for your information •Aggregate, sort, and filter data to find patterns •Use basic math and advanced statistical functions •Identify errors in data and clean them up •Import and export data using delimited text files •Write queries for geographic information systems (GIS) •Create advanced queries and automate tasks Learning SQL doesn't have to be dry and complicated. Practical SQL delivers clear examples with an easy-to-follow approach to teach you the tools you need to build and manage your own databases. This book uses PostgreSQL, but the SQL syntax is applicable to many database applications, including Microsoft SQL Server and MySQL.

Blue Team Handbook: Soc, Siem, and Threat Hunting Use Cases: A Condensed Field Guide for the Security Operations Team


Don Murdoch - 2018
    This entry is for the first version!Blue Team Handbook: SOC, SIEM, and Threat Hunting Use Cases provides the security practitioner with numerous field notes on building a security operations team and mining data sources to get the maximum amount of information out of them with a threat hunting approach. The author shares his fifteen years of experience with SIEMs and security operations after implementing five major platforms, integrating over one hundred data sources into various platforms, and running a MSSP practice.This book covers the topics below using a "zero fluff" approach as if you hired him as a security consultant and were sitting across the table with him (or her). Topics covered include: -The book begins with a discussion for professionals to help them build a successful business case and a project plan, and deciding on SOC tier models. There is also a list of tough questions you need to consider when proposing a SOC, as well as a discussion of layered operating models. - It then goes through numerous data sources that feed a SOC and SIEM and provides specific guidance on how to use those data sources. Most of the examples presented were implemented in one organization or another. These uses cases explain how to use a SIEM and how to use the data coming into the platform, a question that is poorly answered by many vendors.-An inventory of Security Operations Center (SOC) Services.- Several business concepts are also introduced, because they are often overlooked by IT: value chain, PESTL, and SWOT. - Metrics, with a focus on objective measurements.-SOC staff onboarding, training topics, and desirable skills. Along these lines, there is a chapter on a day in the life of a SOC analyst. - Maturity analysis for the SOC and the log management program. - Applying a Threat Hunt mindset to the SOC. - A full use case template that was used within two major Fortune 500 companies, and is in active use by one major SIEM vendor, along with a complete example of how to build a SOC and SIEM focused use case. You can see the corresponding discussion on YouTube - search for the 2017 Security Onion conference. - Critical topics in deploying SIEM based on experience deploying five different technical platforms for nineteen different organizations in education, nonprofit, and commercial enterprises from 160 to 30,000 personnel. - Understanding why SIEM deployments fail with actionable compensators. - Real life experiences getting data into SIEM platforms and the considerations for the many different ways to provide data. - Issues relating to time, time management, and time zones. - Critical factors in log management, network security monitoring, continuous monitoring, and security architecture related directly to SOC and SIEM.- A table of useful TCP and UDP port numbers. This is the second book in the Blue Team Handbook Series. Volume One, focused on incident response, has over 32,000 copies in print and has a 4.6/5.0 review rating!Version 1.0.1 - Updated Dec 12, 2018: Minor spelling and grammar updates.

The Ray Tracer Challenge


Jamis Buck - 2018
    In just a couple of weeks, build a ray tracer that renders beautiful scenes with shadows, reflections, brilliant refraction effects, and subjects composed of various graphics primitives: spheres, cubes, cylinders, triangles, and more. With each chapter, implement another piece of the puzzle and move the renderer that much further forward. Do all of this in whichever language and environment you prefer, and do it entirely test-first, so you know it’s correct. Recharge yourself with this project’s immense potential for personal exploration, experimentation, and discovery.About this TitleThe renderer is a ray tracer, which means it simulates the physics of light by tracing the path of light rays around your scene. Each exciting chapter presents a bite-sized piece of the puzzle, building on earlier chapters and setting the stage for later ones. Requirements are given language-agnostically; it’s up to you to translate them into tests and code using whatever language you prefer. When the project is complete, you’ll look back and realize you’ve built an entire system test-first!There’s no research necessary—all the necessary formulas and algorithms are presented and illustrated right here. Dive into intriguing topics from fundamental concepts such as vectors and matrices; to the algorithms that simulate the intersection of light rays with spheres, planes, cubes, cylinders, and triangles; to geometric patterns such as checkers and rings. Lighting and shading effects, such as shadows and reflections, make your scenes come to life, and constructive solid geometry (CSG) enables you to combine your graphics primitives in simple ways to produce complex shapes.Play and experiment as you discover the fun of writing a ray tracer. Accept the challenge today!What You NeedAside from a computer, operating system, and programming environment, you’ll need a way to display PPM image files. On Windows, programs like Photoshop will work, or free programs like IrfanView. On Mac, no special software is needed, as Preview can open PPM files.

Ed Mastery: The Standard Unix Text Editor (IT Mastery Book 13)


Michael W. Lucas - 2018
    If you don’t know ed, you’re not a sysadmin. You're a mere dabbler. A dilettante. Deficient. Forty years after ed’s introduction, internationally acclaimed author Michael W Lucas has finally unlocked the mysteries of ed for everyone. With Ed Mastery, you too can become a proper sysadmin. Ed Mastery will help you: • understand buffers and addresses • insert, remove, and mangle text • master file management and shell escapes • comprehend regular expressions, searches, and substitutions • create high-performance scripts for transforming files You must be at least this competent to use this computer. Read Ed Mastery today!

Excel 2019 Bible


Michael Alexander - 2018
    Whether you use Excel at work or at home, you will be guided through the powerful new features and capabilities to take full advantage of what the updated version offers. Learn to incorporate templates, implement formulas, create pivot tables, analyze data, and much more. Navigate this powerful tool for business, home management, technical work, and much more with the only resource you need, Excel 2019 Bible. Create functional spreadsheets that work Master formulas, formatting, pivot tables, and more Get acquainted with Excel 2019's new features and tools Whether you need a walkthrough tutorial or an easy-to-navigate desk reference, the Excel 2019 Bible has you covered with complete coverage and clear expert guidance.

Java by Comparison: Become a Java Craftsman in 70 Examples


Simon Harrer - 2018
    

Learn Windows PowerShell in a Month of Lunches


Donald W. Jones - 2018
    This updated edition covers PowerShell features that run on Windows 7, Windows Server 2008 R2 and later, PowerShell v3 and later, and includes v5 features like PowerShellGet. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the Technology PowerShell is both a scripting language and an administrative shell that lets you control and automate nearly every aspect of Windows. It accepts and executes commands interactively and you can write scripts to manage most Windows servers like Exchange, IIS, and SharePoint, as well as online services like Azure and Office 365. About the Book Learn Windows PowerShell in a Month of Lunches, Third Edition is an innovative tutorial designed for busy IT professionals. Just set aside one hour a day - lunchtime would be perfect - for a month, and you'll be automating Windows tasks faster than you ever thought possible. This updated edition covers PowerShell features that run on Windows 7, Windows Server 2008 R2 and later, PowerShell v3 and later, and includes v5 features like PowerShellGet. What's Inside Learn PowerShell from the beginning, no experience required! Covers PowerShell v3 and up, Windows 7, and Windows Server 2008 R2 and later Each lesson takes you an hour or less About the Reader Experience with Windows administration is helpful. No programming or scripting experience needed. About the Author Veteran PowerShell MVPs Don Jones and Jeffery Hicks bring years as successful trainers to this concise, easy-to-follow book.

Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly


Dennis Andriesse - 2018
    The goal of all binary analysis is to determine (and possibly modify) the true properties of binary programs to understand what they really do, rather than what we think they should do. While reverse engineering and disassembly are critical first steps in many forms of binary analysis, there is much more to be learned.This hands-on guide teaches you how to tackle the fascinating but challenging topics of binary analysis and instrumentation and helps you become proficient in an area typically only mastered by a small group of expert hackers. It will take you from basic concepts to state-of-the-art methods as you dig into topics like code injection, disassembly, dynamic taint analysis, and binary instrumentation. Written for security engineers, hackers, and those with a basic working knowledge of C/C++ and x86-64, Practical Binary Analysis will teach you in-depth how binary programs work and help you acquire the tools and techniques needed to gain more control and insight into binary programs.Once you've completed an introduction to basic binary formats, you'll learn how to analyze binaries using techniques like the GNU/Linux binary analysis toolchain, disassembly, and code injection. You'll then go on to implement profiling tools with Pin and learn how to build your own dynamic taint analysis tools with libdft and symbolic execution tools using Triton. You'll learn how to:- Parse ELF and PE binaries and build a binary loader with libbfd- Use data-flow analysis techniques like program tracing, slicing, and reaching definitions analysis to reason about runtime flow of your programs- Modify ELF binaries with techniques like parasitic code injection and hex editing- Build custom disassembly tools with Capstone- Use binary instrumentation to circumvent anti-analysis tricks commonly used by malware- Apply taint analysis to detect control hijacking and data leak attacks- Use symbolic execution to build automatic exploitation toolsWith exercises at the end of each chapter to help solidify your skills, you'll go from understanding basic assembly to performing some of the most sophisticated binary analysis and instrumentation. Practical Binary Analysis gives you what you need to work effectively with binary programs and transform your knowledge from basic understanding to expert-level proficiency.

Get Programming with F#: A Guide for .Net Developers


Isaac Abraham - 2018
    And while F# runs on the .NET framework and supports OO features, its functional nature is what's driving interest. F# leads to quicker development time and a lower total cost of ownership. Its powerful feature set allows developers to more succinctly express their intent, and encourages best practices - leading to higher quality deliverables in less time. Developers find working in F# more enjoyable and rewarding; their managers appreciate the improved quality and speed of deliverables!Learn F# is a practical guide for experienced C# and .NET developers that teaches the F# language, tools, techniques, and practices that can be applied in common scenarios. You'll start with F# language basics and best development practices. You'll also learn the core set of FP techniques in F#, and why to use them. Then you'll discover how to write idiomatic F# code on the .NET framework in Visual Studio, and what tools to use to give you the best experience within VS. The second part of the book shows you how to apply F# in larger, real world scenarios, things like interop to C# /VB projects, SQL database access, web programming, and unit testing. By the end of the book, you'll be able to use F# in your day-to-day development, and know how and where to deepen your knowledge.

Professional CMake: A Practical Guide


Craig Scott - 2018
    The handbook for every CMake user, providing structured learning, the latest best practices and real-world advice from one of the CMake co-maintainers.

Get Programming with Haskell


Will Kurt - 2018
    It is arguable the most interesting language but also has the reputation of being one of the most challenging to learn. Learning Haskell doesn't have to be difficult, and this book can help!Learn Haskell teaches readers the Haskell language and functional programming concepts while they hack on interesting problems that are challenging but never frustrating. This example-filled tutorial will take users from the basics to tackling the tough topics. There are lots of crystal-clear illustrations, hands-on exercises, and open-ended tasks that encourage readers to explore Haskell on their own.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.

Mastering Vim Quickly: From WTF to OMG in no time


Jovica Ilic - 2018
    

Help Your Kids with Computer Science (Key Stages 1-5): A Unique Step-by-Step Visual Guide to Computers, Coding, and Communication


D.K. Publishing - 2018
    This unique visual study guide examines the technical aspects of computers, such as how they function, the latest digital devices and software, and how the Internet works. It also builds the confidence of parents and kids when facing challenges such as staying safe online, digital etiquette, and how to navigate the potential pitfalls of social media.Help Your Kids with Computer Science supports the Key Stage 1 to 5 curriculum in the UK, including GCSE and A-level Computer Science, and beyond. Jargon-free language helps to explain difficult and potentially dread-inducing homework such as hacking, ""big data"" and malware, while colourful graphics help make learning about the world of computer science exciting.Whether at home or school, this clear and helpful guide to computer science is the tool you need to be able to support students with confidence.

Hidden In Plain Sight 10: How To Program A Quantum Computer


Andrew H. Thomas - 2018
     This book contains an introduction to quantum mechanics, with complete instructions and videos showing you how to program a real quantum computer, provided by IBM.

Creative Coding in Python: 30+ Programming Projects in Art, Games, and More


Sheena Vaidyanathan - 2018
    Creative Coding in Python teaches kids the fundamentals of computer programming and demonstrates how to code 30+ fun, creative projects using Python, a free, intuitive, open-source programming language that's one of the top five most popular worldwide.Computer science educator Sheena Vaidyanathan helps kids understand the fundamental ideas of computer programming and the process of computational thinking using illustrations, flowcharts, and pseudocode, then shows how to apply those essentials to code exciting projects in Python:Arcade games and apps: Understand GUI (graphical user interfaces) and create your own arcade games and apps.Geometric art: Use turtle graphics to create original masterpieces.Interactive fiction: Explore booleans and conditionals to invent “create your own adventure” games.Chatbots: Discover variables, strings, integers, and more to design conversational programs.Dice games: Reuse code to devise games of chance.What’s next? Look at exciting ways to use your powerful new skills and expand your knowledge of coding in Python.Creative Coding in Python gives kids the tools they need to create their own computer programs.

Wired


Caytlyn Brooke - 2018
     Able to control virtual reality with her mind, the rush is intoxicating. But soon the device begins to take over her life. Immersed in a colorful and explosive world of technology, she finds it impossible to disconnect. As her addiction grows, Maggie’s world spirals out of control, endangering and pushing away reality. Can she kick the social addiction, or will the thrill of the connection pull her under?

PoC or GTFO, Volume 2


Manul Laphroaig - 2018
    Contributions range from humorous poems to deeply technical essays.The International Journal of Proof-of-Concept or Get The Fuck Out is a celebrated magazine of reverse engineering, retro-computing, and systems internals. This second collected volume holds all of the articles from releases nine to thirteen.Learn how to patch the firmware of a handheld amateur radio, then emulate that radio's proprietary audio code under Linux. How to slow the Windows kernel when exploiting a race condition and how to make a PDF file taht is also an Android app, an audio file, or a Gameboy speedrun. How to hack a Wacom pen table with voltage glitching, then hack it again by pure software to read RDID tags from its surface. How to disassemble every last byte of an Atari game and how to bypass every classic form of copy protection on Apple ][.But above all else, beyond the nifty tricks and silly songs, this book exists to remind you what a clever engineer can build from a box of parts with a bit of free time. Not to show you what others have done, but to show you how they did it so that you can do the same.

Principles of Package Design: Creating Reusable Software Components


Matthias Noback - 2018
    You will use package design principles to create packages that are just right in terms of cohesion and coupling, and are user- and maintainer-friendly at the same time.The first part of this book walks you through the five SOLID principles that will help you improve the design of your classes. The second part introduces you to the best practices of package design, and covers both package cohesion principles and package coupling principles. Cohesion principles show you which classes should be put together in a package, when to split packages, and if a combination of classes may be considered a "package" in the first place. Package coupling principles help you choose the right dependencies and prevent wrong directions in the dependency graph of your packages.What You'll LearnApply the SOLID principles of class designDetermine if classes belong in the same packageKnow whether it is safe for packages to depend on each other Who This Book Is ForSoftware developers with a broad range of experience in the field, who are looking for ways to reuse, share, and distribute their code

Impractical Python Projects: Playful Programming Activities to Make You Smarter


Lee Vaughan - 2018
    It picks up where the complete beginner books leave off, expanding on existing concepts and introducing new tools that you'll use every day. And to keep things interesting, each project includes a zany twist featuring historical incidents, pop culture references, and literary allusions.You'll flex your problem-solving skills and employ Python's many useful libraries to do things like: - Help James Bond crack a high-tech safe with a hill-climbing algorithm - Write haiku poems using Markov Chain Analysis- Use genetic algorithms to breed a race of gigantic rats- Crack the world's most successful military cipher using cryptanalysis- Derive the anagram, I am Lord Voldemort using linguistical sieves - Plan your parents' secure retirement with Monte Carlo simulation- Save the sorceress Zatanna from a stabby death using palingrams- Model the Milky Way and calculate our odds of detecting alien civilizations- Help the world's smartest woman win the Monty Hall problem argument- Reveal Jupiter's Great Red Spot using optical stacking- Save the head of Mary, Queen of Scots with steganography- Foil corporate security with invisible electronic inkSimulate volcanoes, map Mars, and more, all while gaining valuable experience using free modules like Tkinter, matplotlib, Cprofile, Pylint, Pygame, Pillow, and Python-Docx.Whether you're looking to pick up some new Python skills or just need a pick-me-up, you'll find endless educational, geeky fun with Impractical Python Projects.

Programming Ecto


Darin Wilson - 2018
    Learn how to use Ecto, the premier database library for Elixir, to connect your Elixir and Phoenix apps to databases. Get a firm handle on Ecto fundamentals with a module-by-module tour of the critical parts of Ecto. Then move on to more advanced topics and advice on best practices with a series of recipes that provide clear, step-by-step instructions on scenarios commonly encountered by app developers. Co-authored by the creator of Ecto, this title provides all the essentials you need to use Ecto effectively.

Cyber Wars: Hacks that Shocked the Business World


Charles Arthur - 2018
    These are the game changing hacks that make organizations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders and this book provides a deep insight into understanding how they work, how hackers think as well as giving invaluable advice on staying vigilant and avoiding the security mistakes and oversights that can lead to downfall. No organization is safe but by understanding the context within which we now live and what the hacks of the future might look like, you can minimize the threat. In Cyber Wars, you will learn how hackers in a TK Maxx parking lot managed to steal 94m credit card details costing the organization $1bn; how a 17 year old leaked the data of 157,000 TalkTalk customers causing a reputational disaster; how Mirai can infect companies' Internet of Things devices and let hackers control them; how a sophisticated malware attack on Sony caused corporate embarrassment and company-wide shut down; and how a phishing attack on Clinton Campaign Chairman John Podesta's email affected the outcome of the 2016 US election.

Seeking SRE: Conversations About Running Production Systems at Scale


David N. Blank-Edelman - 2018
    They’ve also learned just how difficult it is to maintain that reliability while iterating at the speed demanded by the marketplace. Site Reliability Engineering (SRE) is a proven approach to this challenge. SRE is a large and rich topic to discuss. Google led the way with Site Reliability Engineering, the wildly successful O’Reilly book that described Google’s creation of the discipline and the implementation that’s allowed them to operate at a planetary scale. Inspired by that earlier work, this book explores a very different part of the SRE space. The more than two dozen chapters in Seeking SRE bring you into some of the important conversations going on in the SRE world right now. Listen as engineers and other leaders in the field discuss: Different ways of implementing SRE and SRE principles in a wide variety of settings How SRE relates to other approaches such as DevOps Specialties on the cutting edge that will soon be commonplace in SRE Best practices and technologies that make practicing SRE easier The important but rarely explored human side of SRE David N. Blank-Edelman is the book’s curator and editor.

You'll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches


Josephine Wolff - 2018
    Each breach—the theft of 145.5 million Americans' information from Equifax, for example, or the Russian government's theft of National Security Agency documents, or the Sony Pictures data dump—makes headlines, inspires panic, instigates lawsuits, and is then forgotten. The cycle of alarm and amnesia continues with the next attack, and the one after that. In this book, cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures. We can learn valuable lessons in the aftermath of cybersecurity breaches.Wolff describes a series of significant cybersecurity incidents between 2005 and 2015, mapping the entire life cycle of each breach in order to identify opportunities for defensive intervention. She outlines three types of motives underlying these attacks—financial gain, espionage, and public humiliation of the victims—that have remained consistent through a decade of cyberattacks, offers examples of each, and analyzes the emergence of different attack patterns. The enormous TJX breach in 2006, for instance, set the pattern for a series of payment card fraud incidents that led to identity fraud and extortion; the Chinese army conducted cyberespionage campaigns directed at U.S.-based companies from 2006 to 2014, sparking debate about the distinction between economic and political espionage; and the 2014 breach of the Ashley Madison website was aimed at reputations rather than bank accounts.

The DevOps 2.3 Toolkit: Kubernetes: Deploying and managing highly-available and fault-tolerant applications at scale (The DevOps Toolkit Series Book 4)


Viktor Farcic - 2018
    I want you to become confident in your Kubernetes knowledge and only then choose whether to embrace it. That is, unless you already made up your mind and stumbled upon this book in search of Kubernetes guidance. The plan is to cover all aspect behind Kubernetes, from basic to advanced features. We'll go not only through the tools behind the official project but also third-party add-ons. I hope that, by the time you finish reading this book, you will be able to call yourself "Kubernetes ninja". I cannot say that you will know everything there is to know about the Kubernetes ecosystem. That would be impossible to accomplish since its growing faster than any single person could follow. What I can say is that you will be very confident in running a Kubernetes cluster of any scale in production. Like all my other books, this one is very hands-on. There will be just enough theory for you to understand the principles behind each topic. The book is packed with examples, so I need to give you a heads up. Do not buy this book if you're planning to read it on a bus or in bed before going to sleep. You will need to be in front of your computer. A terminal will be your best friend. `kubectl` will be your lover. The book assumes that you feel comfortable with containers, especially Docker. We won't go into details how to build an image, what is container registry, and how to write Dockerfile. I hope you already know all that. If that's not the case, you might want to postpone reading this and learn at least basic container operations. This book is about things that happen after you built your images and stored them in a registry. This book is about running containers at scale and not panicking when problems arise. It is about the present and the future of software deployment and monitoring. It's about embracing the challenges and staying ahead of the curve.

Comptia Security+ Sy0-501 Exam Cram


Diane Barrett - 2018
    It provides coverage and practice questions for every exam topic. The book contains a set of 150 questions. The powerful Pearson Test Prep practice test software provides real-time practice and feedback with all the questions so you can simulate the exam. Covers the critical information you need to know to score higher on your Security+ exam! - Analyze indicators of compromise and determine types of attacks, threats, and risks to systems - Minimize the impact associated with types of attacks and vulnerabilities - Secure devices, communications, and network infrastructure - Effectively manage risks associated with a global business environment - Differentiate between control methods used to secure the physical domain - Identify solutions for the implementation of secure network architecture - Compare techniques for secure application development and deployment - Determine relevant identity and access management procedures - Implement security policies, plans, and procedures related to organizational security - Apply principles of cryptography and effectively deploy related solutions Normal 0 false false false EN-US X-NONE X-NONE

BENT: How a Homeless Teen Became one of the Cybercrime Industry’s Most Prolific Counterfeiters


John J. Boseak - 2018
    Boseak phenomenal life of crime. Inked from head to toe, with an addiction to strippers and fast Cadillacs, Boseak was not your typical computer geek. He was, however, one of the most cunning scammers, counterfeiters, identity thieves and escape artists alive—and a major thorn in the side of the U.S. Secret Service as they fought a war on cybercrime. With a savant-like ability to circumvent banking security and stay one step ahead of law enforcement, Boseak made millions of dollars in the international cyber underworld, with the help of the Chinese and the Russians. Then, leaving nothing but a John Doe warrant and a cleaned-out bank account in his wake, he vanished. Along the way Boseak became a rock star—a counterfeit one, anyway—partying hard with jet-set Eurotrash and C-List celebrities from South Beach to Vegas. Despite the façade of living the life, Boseak was still the scared little boy inside, abandoned by his father, ignored by his mother, choosing to live on the streets of Miami and surviving by his wits. Anything was better than living at home, or being institutionalized as a ward of the state. And if trouble didn’t actually seem to find him, he was an expert at seeking it out. Boseak’s stranger-than-fiction tale of ingenious scams and impossible escapes, of brazen run-ins with the law and secret desires to straighten out and settle down, makes Bent a true crime con game that will keep you guessing.

SQL Server 2017 Query Performance Tuning: Troubleshoot and Optimize Query Performance


Grant Fritchey - 2018
    You will learn Query Store, adaptive execution plans, and automated tuning on the Microsoft Azure SQL Database platform. Anyone responsible for writing or creating T-SQL queries will find valuable the insight into bottlenecks, including how to recognize them and eliminate them.This book covers the latest in performance optimization features and techniques and is current with SQL Server 2017. If your queries are not running fast enough and you're tired of phone calls from frustrated users, then this book is the answer to your performance problems. SQL Server 2017 Query Performance Tuning is about more than quick tips and fixes. You'll learn to be proactive in establishing performance baselines using tools such as Performance Monitor and Extended Events. You'll recognize bottlenecks and defuse them before the phone rings. You'll learn some quick solutions too, but emphasis is on designing for performance and getting it right. The goal is to head off trouble before it occurs. What You'll LearnUse Query Store to understand and easily change query performanceRecognize and eliminate bottlenecks leading to slow performanceDeploy quick fixes when needed, following up with long-term solutionsImplement best practices in T-SQL to minimize performance riskDesign in the performance that you need through careful query and index designUtilize the latest performance optimization features in SQL Server 2017Protect query performance during upgrades to the newer versions of SQL Server Who This Book Is ForDevelopers and database administrators with responsibility for application performance in SQL Server environments. Anyone responsible for writing or creating T-SQL queries will find valuable the insight into bottlenecks, including how to recognize them and eliminate them.

OpenShift in Action


Jamie Duncan - 2018
    OpenShift, an innovative enterprise infrastructure management system from RedHat, radically simplifies the day-to-day operation of deploying and maintaining large-scale applications. The OpenShift container management platform (CMP) uses Docker, Kubernetes, and other container-oriented technologies to ease cluster management, scaling, and upgrades. By providing an intuitive shell over established technologies, OpenShift gives you the reliability and stability you need with the ease of use you want.

Postmortems: Selected Essays Volume One


Raph Koster - 2018
    In a quarter-century of writings and talks, he has offered up game design lessons, online community theories, and candid self-evaluation.This first volume of a three-book set of selected essays collects previously written postmortems and many brand new pieces. They are accompanied by historical material such as posts written for players, chat logs, speeches, design sketches, and more. The result is an inspiring historical look back at the development of virtual worlds.These are the stories behind Ultima Online and Star Wars Galaxies, the story of the early art game Andean Bird and the story of the ambitious project Metaplace that aimed to build the Metaverse, including:"A Story About a Tree," the classic piece from MUD days about whether our online bonds are real. "The Ultima Online Resource System," a detailed design breakdown of the pioneering world simulation. "A Jedi Saga," the popular tale of how an impossible design dilemma broke a world. "Influences," a challenge to the game development community to pursue art.

Get Coding 2! Build Five Computer Games Using HTML and JavaScript


David Whitney - 2018
    Learn HTML and JavaScript. Design and build five interactive computer games. Create cool graphics. Code simple artificial intelligence. This appealing guide, covering essential coding concepts, offers an ideal introduction to all these activities and more. By following simple step-by-step instructions and completing five exciting missions, aspiring programmers are invited to code well-known games such as tic-tac-toe and table tennis, then customize their projects to test their skills.

The DevOps 2.4 Toolkit: Continuous Deployment To Kubernetes: Continuously deploying applications with Jenkins to a Kubernetes cluster (The DevOps Toolkit Series Book 5)


Viktor Farcic - 2018
    I did not start with an index. I didn't write a summary of each chapter in an attempt to define the scope. I do not do such things. There was only a high-level goal to explore continuous delivery and deployment inside Kubernetes clusters. What I did do, though, was to set a few guidelines. The first guideline is that "all the examples will be tested on all major Kubernetes platforms." Well, that might be a bit far-fetched. I'm aware that any sentence that mentions "all" together with "Kubernetes" is bound to be incorrect. New platforms are popping out like mushrooms after rain. Still, what I can certainly do is to choose a few of the most commonly used ones. Minikube and Docker for Mac or Windows should undoubtedly be there for those who prefer to "play" with Docker locally. AWS is the biggest hosting provider so Kubernetes Operations (kops) must be included as well. Since it would be silly to cover only un-managed cloud, I had to include managed Kubernetes clusters as well. Google Kubernetes Engine (GKE) is the obvious choice. It is the most stable and features rich managed Kubernetes solution. Adding GKE to the mix means that Azure Container Service (AKS) and Amazon's Elastic Container Service (EKS) should be included as well so that we can have the "big trio" of the hosting vendors that offer managed Kubernetes. Unfortunately, at the time of this writing (May 2018), Elastic Container Service (EKS) is in the preview stage and Amazon is providing access only to a relatively small number of people. AKS, on the other hand, is available but, at this moment, it is too unstable. So, I'm forced to scale down from the trio to GKE as the only managed Kubernetes we'll explore. Finally, a possible on-prem solution should be included as well. Since OpenShift shines in that area, the choice was relatively easy. All in all, I decided to test everything in minikube and Docker for Mac locally, AWS with kops as the representative of a cluster in the cloud, GKE for managed Kubernetes clusters, and OpenShift (with minishift) as a potential on-prem solution. That, in itself, already constitutes a real challenge that might prove to be more than I can chew. Still, making sure that all the examples work with all those platforms and solutions should provide some useful insights. Some of you already chose the Kubernetes flavor you'll use. Others might still wonder whether to adopt one or the other. Even though the comparison of different Kubernetes platforms is not the primary scope of the book, I'll do my best to explain the differences as they come. To summarize the guidelines, the book has to explore continuous delivery and deployment in Kubernetes using Jenkins. All the examples have to be tested in minikube, Docker for Mac (or Windows), AWS with kops, GKE, and OpenShift with minishift, and EKS.

Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali


OccupyTheWeb - 2018
    Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers.If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the tools and techniques you'll need to take control of a Linux environment.First, you'll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you'll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You'll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to: - Cover your tracks by changing your network information and manipulating the rsyslog logging utility - Write a tool to scan for network connections, and connect and listen to wireless networks - Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email - Write a bash script to scan open ports for potential targets - Use and abuse services like MySQL, Apache web server, and OpenSSH - Build your own hacking tools, such as a remote video spy camera and a password crackerHacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?

Inside PixInsight (The Patrick Moore Practical Astronomy Series)


Warren A. Keller - 2018
    As the first comprehensive postprocessing platform to be created by astro-imagers for astro-imagers, it has for many replaced other generic graphics editors as the software of choice. PixInsight has been embraced by professionals such as the James Webb (and Hubble) Space Telescope's science imager Joseph DePasquale and Calar Alto's Vicent Peris, as well as thousands of amateurs around the world. While PixInsight is extremely powerful, very little has been printed on the subject. The first edition of this book broke that mold, offering a comprehensive look into the software’s capabilities. This second edition expands on the several new processes added to the PixInsight platform since that time, detailing and demonstrating each one with a now-expanded workflow. Addressing topics such as PhotometricColorCalibration, Large-Scale Pixel Rejection, LocalNormalization and a host of other functions, this text remains the authoritative guide to PixInsight.

Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking


Ric Messier - 2018
    Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book covers Kali's expansive security capabilities and helps you identify the tools you need to conduct a wide range of security tests and penetration tests. You'll also explore the vulnerabilities that make those tests necessary.Author Ric Messier takes you through the foundations of Kali Linux and explains methods for conducting tests on networks, web applications, wireless security, password vulnerability, and more. You'll discover different techniques for extending Kali tools and creating your own toolset.Learn tools for stress testing network stacks and applicationsPerform network reconnaissance to determine what's available to attackersExecute penetration tests using automated exploit tools such as MetasploitUse cracking tools to see if passwords meet complexity requirementsTest wireless capabilities by injecting frames and cracking passwordsAssess web application vulnerabilities with automated or proxy-based toolsCreate advanced attack techniques by extending Kali tools or developing your ownUse Kali Linux to generate reports once testing is complete

Microsoft Office 2019 Inside Out


Joe Habraken - 2018
    Renowned Office expert Joe Habraken offers a complete tour of Office 2019 and Office 365, with cutting-edge techniques and shortcuts for Word, Excel, PowerPoint, Outlook, Publisher, online Office apps, and more. Discover how experts tackle today's key tasks-and challenge yourself to new levels of mastery. Create amazing content faster with Office's new features, tools, and shortcuts Share, collaborate with, and secure Office files in the cloud Organize, edit, and format complex documents with Microsoft Word Build tables of contents, captions, indexes, and footnotes that automatically update Efficiently enter and manage data in Excel workbooks, and format it for easy understanding Build flexible, reliable Excel workbooks with formulas and functions Integrate data from external sources, including web tables, text files, and more Transform data into insight with Excel charts, Sparklines, and PivotTables Quickly create presentations with PowerPoint themes, Reuse Slides, and Libraries Build more impactful slides with advanced formatting, SmartArt, animation, transitions, and multimedia Use PowerPoint 2019 tools to present more effectively, both in person and online Systematically improve email productivity and security with Outlook 2019 Manage appointments and tasks, and quickly plan meetings

Theorem Proving in Lean


Jeremy Avigad - 2018
    A introduction to using Lean as an interactive theorem prover.

Computer Science: An Overview


Glenn Brookshear - 2018
    A broad exploration of computer science-with the depth needed to understand concepts Computer Science: An Overview provides a bottom-up, concrete-to-abstract foundation that students can build upon to see the relevance and interrelationships of future computer science courses. Its comprehensive coverage and clear language are accessible to students from all backgrounds, encouraging a practical and realistic understanding. More than 1,000 questions and exercises, Chapter Review Problems, and Social Issues questions reinforce core concepts. The 13th Edition continues its focus on Python to provide programming tools for exploration and experimentation. A new full-color design reflects the use of color in most modern programming interfaces to aid the programmer's understanding of code. Syntax coloring is now used more effectively for clarifying code and pseudocode segments in the text, and many figures and diagrams are now rendered more descriptively.

When Bill Gates Memorized an Encyclopedia


Mark Weakland - 2018
    But do you know what he was like as a child? From selling peanuts to memorizing entire encyclopedias, Bill used his brain. This playful story of his childhood will help young readers connect with a historic figure and will inspire them to want to achieve greatness.

Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence


Nick Furneaux - 2018
    Worse still, the blockchain can even be used to hide information and covert messaging, unknown to most investigators.Investigating Cryptocurrencies is the first book to help corporate, law enforcement, and other investigators understand the technical concepts and the techniques for investigating crimes utilizing the blockchain and related digital currencies such as Bitcoin and Ethereum.Understand blockchain and transaction technologies Set up and run cryptocurrency accounts Build information about specific addresses Access raw data on blockchain ledgers Identify users of cryptocurrencies Extracting cryptocurrency data from live and imaged computers Following the money With nearly $150 billion in cryptocurrency circulating and $3 billion changing hands daily, crimes committed with or paid for with digital cash are a serious business. Luckily, Investigating Cryptocurrencies Forensics shows you how to detect it and, more importantly, stop it in its tracks.

Comptia Network+ N10-007 Cert Guide, Deluxe Edition


Anthony Sequeira - 2018
    Expert instructor Anthony Sequeira shares preparation hints and test-taking tips, helping you identify areas of weakness and improves both your conceptual knowledge and hands-on skills, essential for successful completion of the performance-based testing items on the exam. This complete, CompTIA-approved study package includes the following:A test-preparation routine proven to help you pass the exam approved by CompTIA Clearly defined chapter learning objectives covering all N10-007 exam topics Chapter-ending review questions and exam preparation exercises, which help you drill on key concepts youmust know thoroughly The powerful Pearson Test Prep practice test software, complete with hundreds of well-reviewed, exam-realistic questions, customization options, and detailed performance reports More than 60 minutes of video mentoring 40 performance-based practice question exercises to help you prepare for the hands-on exam questions A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies An interactive, exam essentials appendix that quickly recaps all major chapter topics for easy reference A key terms Glossary in both print and on the companion website, which acts as an interactive flash-card application Study plan suggestions and templates to help you organize and optimize your study time This Deluxe Edition also includes two special features:A free copy of the CompTIA Network+ N10-007 Cert Guide Premium Edition eBook and Practice Test. This package provides you access to three eBook files (PDF, EPUB, and Mobi/Kindle format), more than 400 exam-realistic practice test questions, and links from all the questions to the specific sections in the PDF eBook file for detailed explanations and review. A free copy of the CompTIA Network+ N10-007 Hands-on Lab Simulator, including 75 hands-on practice labs covering real-world network configuration scenarios in Windows GUI and Cisco router and switch CLI environments, hardware activities, network design exercises, and technology mapping tasks. Well regarded for its level of detail, study plans, assessment features, challenging review questions and exercises, video instruction, and hands-on labs, this authorized study guide helps you master the concepts and techniques that ensure your exam success. Pearson Test Prep online system requirements: Browsers: Chrome version 40 and above; Firefox version 35 and above; Safari version 7; Internet Explorer 10, 11; Microsoft Edge; Opera. Devices: Desktop and laptop computers, tablets running on Android and iOS, smartphones with a minimum screen size of 4.7." Internet access required. Pearson Test Prep offline system requirements: Windows 10, Windows 8.1, Windows 7; Microsoft .NET Framework 4.5 Client; Pentium-class 1 GHz processor (or equivalent); 512 MB RAM; 650 MB disk space plus 50 MB for each downloaded practice exam; access to the Internet to register and download exam databases In addition to the wealth of content and exam preparation exercises, this edition includes a series of free hands-on exercises to help you master several real-world configuration and troubleshooting activities. These exercises can be performed on the CompTIA Network+ N10-007 Hands-on Lab Simulator software included free on the companion website that accompanies this book. CompTIA Network+ N10-007 Hands-on Lab Simulator Minimum System Requirements: Windows: Microsoft Windows 10 (32-bit/64-bit, all versions), Windows 8.1 (32-bit/64-bit, x86 processors only, all versions), Windows 7 (32-bit/64-bit, all versions) with SP1; Intel Pentium III or faster; 512 MB RAM (1GB recommended); 1.5 GB hard disk space; 32-bit color depth at 1024x768 resolution Mac: Apple macOS 10.13, 10.12, 10.11, 10.10; Intel Core Duo 1.83 Ghz or faster; 512 MB RAM (1 GB recommended); 1.5 GB hard disk space; 32-bit color depth at 1024x768 resolution Other applications installed during installation: Adobe AIR 3.8; Captive JRE Well regarded for its level of detail, study plans, assessment features, challenging review questions and exercises, video instruction, and hands-on labs, this authorized study guide helps you master the concepts and techniques that ensure your exam success.

Beyond Spreadsheets with R: A beginner's guide to R and RStudio


Jonathan Carroll - 2018
    You'll build on simple programming techniques like loops and conditionals to create your own custom functions. You'll come away with a toolkit of strategies for analyzing and visualizing data of all sorts using R and RStudio.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.About the TechnologySpreadsheets are powerful tools for many tasks, but if you need to interpret, interrogate, and present data, they can feel like the wrong tools for the task. That's when R programming is the way to go. The R programming language provides a comfortable environment to properly handle all types of data. And within the open source RStudio development suite, you have at your fingertips easy-to-use ways to simplify complex manipulations and create reproducible processes for analysis and reporting.About the BookWith Beyond Spreadsheets with R you'll learn how to go from raw data to meaningful insights using R and RStudio. Each carefully crafted chapter covers a unique way to wrangle data, from understanding individual values to interacting with complex collections of data, including data you scrape from the web. You'll build on simple programming techniques like loops and conditionals to create your own custom functions. You'll come away with a toolkit of strategies for analyzing and visualizing data of all sorts.What's insideHow to start programming with R and RStudioUnderstanding and implementing important R structures and operatorsInstalling and working with R packagesTidying, refining, and plotting your dataAbout the ReaderIf you're comfortable writing formulas in Excel, you're ready for this book.About the AuthorDr Jonathan Carroll is a data science consultant providing R programming services. He holds a PhD in theoretical physics.Table of ContentsIntroducing data and the R languageGetting to know R data typesMaking new data valuesUnderstanding the tools you'll use: FunctionsCombining data valuesSelecting data valuesDoing things with lots of dataDoing things conditionally: Control structuresVisualizing data: PlottingDoing more with your data with extensions

Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments


Matt Burrough - 2018
    You’ll start by learning how to approach a cloud-focused penetration test and how to obtain the proper permissions to execute it; then, you’ll learn to perform reconnaissance on an Azure subscription, gain access to Azure Storage accounts, and dig into Azure’s Infrastructure as a Service (IaaS).You’ll also learn how to: Uncover weaknesses in virtual machine settings that enable you to acquire passwords, binaries, code, and settings files Use PowerShell commands to find IP addresses, administrative users, and resource details Find security issues related to multi-factor authentication and management certificates Penetrate networks by enumerating firewall rules Investigate specialized services like Azure Key Vault, Azure Web Apps, and Azure Automation View logs and security events to find out when you’ve been caught Packed with sample pentesting scripts, practical advice for completing security assessments, and tips that explain how companies can configure Azure to foil common attacks, Pentesting Azure Applications is a clear overview of how to effectively perform cloud-focused security tests and provide accurate findings and recommendations.

Python Machine Learning: Python Machine Learning From Scratch: Step by Step Guide with Scikit-Learn and TensorFlow


Daniel Nedal - 2018
    This book would seek to explain common terms and algorithms in an intuitive way. There would be little assumption of prior knowledge on the part of the reader as terms would be introduced and explained as required. We would use a progressive approach whereby we start out slowly and improve on the complexity of our solutions. From AI Sciences Publisher Our books may be the best one for beginners; it's a step-by-step guide for any person who wants to start learning Artificial Intelligence and Data Science from scratch. It will help you in preparing a solid foundation and learn any other high-level courses. To get the most out of the concepts that would be covered, readers are advised to adopt a hands on approach which would lead to better mental representations. Step By Step Guide and Visual Illustrations and Examples This book and the accompanying examples, you would be well suited to tackle problems which pique your interests using machine learning and deep learning models. Instead of tough math formulas, this book contains several graphs and images which detail all important Python and Machine Learning concepts and their applications. Target Users The book designed for a variety of target audiences. The most suitable users would include: Anyone who is intrigued by how algorithms arrive at predictions but has no previous knowledge of the field. Software developers and engineers with a strong programming background but seeking to break into the field of machine learning. Seasoned professionals in the field of artificial intelligence and machine learning who desire a bird’s eye view of current techniques and approaches. What’s Inside This Book? Introduction Introduction to Labels and Features A Regression Example: Predicting Boston Housing Prices Import Libraries: How to forecast and Predict Popular Classification Algorithms Introduction to K Nearest Neighbors Introduction to Support Vector Machine Example of Clustering Running K-means with Scikit-Learn Introduction to Deep Learning using TensorFlow Deep Learning Compared to Other Machine Learning Approaches Applications of Deep Learning How to run the Neural Network using TensorFlow Cases of Study with Real Data Sources & References Frequently Asked Questions Q: Is this book for me and do I need programming experience? A: f you want to smash Machine Learning from scratch, this book is for you. Little programming experience is required. If you already wrote a few lines of code and recognize basic programming statements, you’ll be OK. Q: Can I loan this book to friends? A: Yes.

Play with Minecraft and Learn to Code: A Guide for Beginners


Al Sweigart - 2018
    Using ComputerCraft, a free Minecraft mod, and the Lua programming language (used by professional game developers), you'll write programs to make your bots dig mines, chop wood, craft items, and build anything you can imagine. Sit back, relax, and make your turtle army do the work! The book provides the full code needed to write each program and walks you through it line by line, explaining how things work along the way. By book's end, you'll have a handle on computer science basics, a taste of how fun and powerful coding can be, and plenty of turtle robots at your command.

Dynamical Systems with Applications Using Python


Stephen Lynch - 2018
    It emphasizes applications and simulation utilizing Python.The hands-on approach of Dynamical Systems with Applications using Python has minimal prerequisites, only requiring familiarity with ordinary differential equations. It will appeal to advanced undergraduate and graduate students, applied mathematicians, engineers, and researchers in a broad range of disciplines such as population dynamics, biology, chemistry, computing, economics, nonlinear optics, neural networks, and physics.

Access 2019 Bible


Michael Alexander - 2018
    With clear guidance toward everything from the basics to the advanced, this go-to reference helps you take advantage of everything Access 2019 has to offer. Whether you're new to Access or getting started with Access 2019, you'll find everything you need to know to create the database solution perfectly tailored to your needs, with expert guidance every step of the way. The companion website features all examples and databases used in the book, plus trial software and a special offer from Database Creations. Start from the beginning for a complete tutorial, or dip in and grab what you need when you need it. Access enables database novices and programmers to store, organize, view, analyze, and share data, as well as build powerful, integrable, custom database solutions — but databases can be complex, and difficult to navigate. This book helps you harness the power of the database with a solid understanding of their purpose, construction, and application. Understand database objects and design systems objects Build forms, create tables, manipulate datasheets, and add data validation Use Visual Basic automation and XML Data Access Page design Exchange data with other Office applications, including Word, Excel, and more From database fundamentals and terminology to XML and Web services, this book has everything you need to maximize Access 2019 and build the database you need.

CompTIA PenTest+ Certification All-in-One Exam Guide (Exam PT0-001)


Raymond Nutting - 2018
    

How to Create Your Website: For Writers and Other Clueless Souls (Book 3 in Self-Publishing Made Easy)


Mateja Klaric - 2018
    This book will show you how to navigate the world of websites, domains, emails, hosting services, and SEO* fast, easy, and at the lowest cost. It will also help you avoid many pitfalls so that you'll be able to make your website secure and cost-efficient.*Don't know what SEO is? Then that's yet another reason why you need this book!

Rediscovering JavaScript - Master ES6, ES7, and ES8


Venkat Subramaniam - 2018
    Whether you’re writing frontend applications or server side code, the phenomenal features from ES6 and beyond—like the rest operator, generators, destructuring, object literals, arrow functions, modern classes, promises, async, and metaprogramming capabilities—will get you excited and eager to program with JavaScript. You’ve found the right book to get started quickly and dive deep into the essence of modern JavaScript. Learn practical tips to apply the elegant parts of the language and the gotchas to avoid.

Learn Bash the Hard Way


Ian Miell - 2018
    Master Bash Using The Only Method That WorksThis book will train you to be a master in bash, a technology that's more often used than understood.It uses the 'Hard Way' method, the best way to develop your skills.Based on many years of experience, the book takes you through what you need to know to understand what's going on when you look at others' bash scripts, and write your own

Programming: 4 Manuscripts in 1 book : Python For Beginners - Python 3 Guide - Learn Java - Excel 2016


Timothy C. Needham - 2018
    • Write programs that use loops to perform repetitive tasks. • Design and write procedural programs that use methods. • Understanding Java Variables, Arrays, Loops, and Conditional Statements • Use if and switch statements to make decisions in your programs. • Learn the concept of Object Oriented Programming (from fundamentals to advanced) • How to understand and write simple Java programs • And much, much more! Let’s begin our learning. Excel 2016: A Comprehensive Beginner’s Guide to Microsoft Excel 2016 This book is intended for....

Computer Programming for Beginners: Fundamentals of Programming Terms and Concepts


Nathan Clark - 2018
     What are statements, operators, and functions? How to structure, build and deploy a program? What is functional programming and object oriented programming? How to store, manage and exchange data? These are topics many programming guides don’t cover, as they are assumed to be general knowledge to most developers. That is why this guide has been created. It is the ultimate primer to all programming languages. What This Book Offers Zero Knowledge Required This guide has specifically been created for someone who is completely new to programming. We cover all the concepts, terms, programming paradigms and coding techniques that every beginner should know. A Solid Foundation This guide will form the foundation for all future programming languages you may encounter. It doesn’t focus on merely one specific language, but rather the principles that apply to all programming languages. Detailed Descriptions & Code Samples Emphasis has been placed on beginner-friendly descriptions, supported by working code samples from the most popular languages, such as C#, Java and Python, to help illustrate concepts and terms. Key Topics What Is a Programming Language? Why Do We Need a Programming Language? The History of Programming Languages Popular Programming Languages Understanding the Structure of a Program What Are the Different Types of Programs? How Is a Program Built? How Is a Program Executed? What Are Program Statements? What Are Data Types? What Are Variables? What Are Operators? Working with Numbers The Importance of Strings Making Decisions in Programs Iterative Programming Logical Grouping of Code What Are Functions? Taking Input Sending Output What Is Functional Programming? What Is Object Oriented Programming? What Are Client Server Applications? What Is Web Programming? Managing Data in a Program Storing Data in Files Storing Data in Databases Data Exchange Formats Error Handling Logging in Programs Logical Grouping of Programs Deploying Programs Programming for the Internet Serverless Programming Programming for Mobile Devices Design Practices Learn Programming the Easy Way, Get Your Copy Today!

Deep Learning for Time Series Forecasting: Predict the Future with MLPs, CNNs and LSTMs in Python


Jason Brownlee - 2018
    With clear explanations, standard Python libraries, and step-by-step tutorial lessons you’ll discover how to develop deep learning models for your own time series forecasting projects.

Java Language Features: With Modules, Streams, Threads, I/O, and Lambda Expressions


Kishori Sharan - 2018
    Author Kishori Sharan provides over 50 diagrams and 290 complete programs to help you visualize and better understand the topics covered in this book.Java Language Features, Second Edition starts with a series of chapters on the essential language features provided by Java, including annotations, reflection, and generics. These topics are then complemented by details of how to use lambda expressions, allowing you to build powerful and efficient Java programs. The chapter on threads follows this up and discusses everything from the very basic concepts of a thread to the most advanced topics such as synchronizers, the fork/join framework, and atomic variables.This book contains unmatched coverage of Java MIO, the Stream API, the Path API, the FileVisitor API, the watch service, and asynchronous file I/O. With this in-depth knowledge, your data- and file-management programs will be able to take advantage of every feature of Java's powerful I/O framework and much more.Additionally, three appendices are available for free via the Download Source Code in apress.com. These appendices will give you a head start on the most important features of Java 10 and the new Java versioning scheme.What You’ll LearnUse essential and advanced features of the Java languageCode Java annotations and inner classesWork with reflection, generics, and threadsTake advantage of the garbage collectorManage streams with the Stream APIWho This Book Is ForThose new to Java programming and continues the learning Java journey; it is recommended that you read an introductory Java programming book first, such as Beginning Java Fundamentals, from Apress.

Practical Convolutional Neural Networks: Implement advanced deep learning models using Python


Mohit Sewak - 2018
    

A little book of R for time series


Avril Coghlan - 2018
    

Comptia Pentest+ Certification All-In-One Exam Guide (Exam Pt0-001)


Raymond Nutting - 2018
    Written by an expert penetration tester, the book provides learning objectives at the beginning of each chapter, hands-on exercises, exam tips, and practice questions with in-depth answer explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference.Covers all exam topics, including: - Pre-engagement activities- Getting to know your targets- Network scanning and enumeration- Vulnerability scanning and analysis- Mobile device and application testing- Social engineering- Network-based attacks- Wireless and RF attacks- Web and database attacks- Attacking local operating systems- Physical penetration testing- Writing the pen test report- And moreOnline content includes: - Interactive performance-based questions- Test engine that provides full-length practice exams and customized quizzes by chapter or by exam domain- Downloadable virtual machine files for use with some of the exercises in the book- Penetration Testing Tools and References appendix

Stylish F#: Crafting Elegant Functional Code for .NET and .NET Core


Kit Eason - 2018
    It provides F# developers with best practices, guidance, and advice to write beautiful, maintainable, and correct code. Stylish F# covers every design decision that a developer makes in constructing F# programs, helping you make the most educated and valuable design choices at every stage of code development. You will learn about the design of types and function signatures, the benefits of immutability, and the uses of partial function application. You will understand best practices for writing APIs to be used by F#, C#, and other languages. Each carefully vetted design choice is supported with compelling examples, illustrations, and rationales. What You'll Learn Know why, when, and how to code in immutable style Use collection functions, piping, and function composition to build working software quickly Be aware of the techniques available to bring error handling into the mainstream of program logic Optimize F# code for maximum performance Identify and implement opportunities to use function injection to improve program design Appreciate the methods available to handle unknown data values Understand asynchronous and parallel programming in F#, and how it differs from C# asynchronous programming Who This Book Is For Any developer who writes F# code and wants to write it better

Designing an Internet


David D. Clark - 2018
    What would an internet look like if it were designed, today, from the ground up? In this book, MIT computer scientist David Clark explains how the Internet is actually put together, what requirements it was designed to meet, and why different design decisions would create different internets. He does not take today's Internet as a given but tries to learn from it, and from alternative proposals for what an internet might be, in order to draw some general conclusions about network architecture.Clark discusses the history of the Internet, and how a range of potentially conflicting requirements--including longevity, security, availability, economic viability, management, and meeting the needs of society--shaped its character. He addresses both the technical aspects of the Internet and its broader social and economic contexts. He describes basic design approaches and explains, in terms accessible to nonspecialists, how networks are designed to carry out their functions. (An appendix offers a more technical discussion of network functions for readers who want the details.) He considers a range of alternative proposals for how to design an internet, examines in detail the key requirements a successful design must meet, and then imagines how to design a future internet from scratch. It's not that we should expect anyone to do this; but, perhaps, by conceiving a better future, we can push toward it.

Complex Network Analysis in Python: Recognize - Construct - Visualize - Analyze - Interpret


Dmitry Zinoviev - 2018
    Network analysis is a powerful tool you can apply to a multitude of datasets and situations. Discover how to work with all kinds of networks, including social, product, temporal, spatial, and semantic networks. Convert almost any real-world data into a complex network--such as recommendations on co-using cosmetic products, muddy hedge fund connections, and online friendships. Analyze and visualize the network, and make business decisions based on your analysis. If you're a curious Python programmer, a data scientist, or a CNA specialist interested in mechanizing mundane tasks, you'll increase your productivity exponentially. Complex network analysis used to be done by hand or with non-programmable network analysis tools, but not anymore! You can now automate and program these tasks in Python. Complex networks are collections of connected items, words, concepts, or people. By exploring their structure and individual elements, we can learn about their meaning, evolution, and resilience. Starting with simple networks, convert real-life and synthetic network graphs into networkx data structures. Look at more sophisticated networks and learn more powerful machinery to handle centrality calculation, blockmodeling, and clique and community detection. Get familiar with presentation-quality network visualization tools, both programmable and interactive--such as Gephi, a CNA explorer. Adapt the patterns from the case studies to your problems. Explore big networks with NetworKit, a high-performance networkx substitute. Each part in the book gives you an overview of a class of networks, includes a practical study of networkx functions and techniques, and concludes with case studies from various fields, including social networking, anthropology, marketing, and sports analytics. Combine your CNA and Python programming skills to become a better network analyst, a more accomplished data scientist, and a more versatile programmer. What You Need: You will need a Python 3.x installation with the following additional modules: Pandas (>=0.18), NumPy (>=1.10), matplotlib (>=1.5), networkx (>=1.11), python-louvain (>=0.5), NetworKit (>=3.6), and generalizesimilarity. We recommend using the Anaconda distribution that comes with all these modules, except for python-louvain, NetworKit, and generalizedsimilarity, and works on all major modern operating systems.

Hands-On Markov Models with Python: Implement probabilistic models for learning complex data sequences using the Python ecosystem


Ankur Ankan - 2018
    

Beginning Ejb in Java Ee 8: Building Applications with Enterprise JavaBeans


Jonathan Wetherbee - 2018
    Targeted at Java and Java EE developers, with or without prior EJB experience, this book is packed with practical insights, strategy tips, and code examples. As each chapter unfolds, you'll see how you can apply the new EJB spec to your own applications through specific examples.Beginning EJB in Java EE 8 serves not only as a reference, but also as a how-to guide and repository of practical examples to which you can refer as you build your own applications. It will help you harness the power of EJBs and take your Java EE 8 development to the next level. You'll gain the knowledge and skills you'll need to create the complex enterprise applications that run today's transactions and more. What You'll LearnBuild applications with Enterprise JavaBeans (EJBs) in the new Java EE 8 platformDiscover when to use EJBs over contexts and dependency injectionUse message-driven beans to do tasks asynchronouslyIntegrate EJBs with microservices using the new Eclipse Microprofile projectManage complex enterprise transactions and much moreWho This Book Is ForJava programmers new to enterprise development and for those who may have experience with EJBs but are new to Java EE 8, EE4J, and related Eclipse projects.

Practical Computer Vision: Extract insightful information from images using TensorFlow, Keras, and OpenCV


Abhinav Dadhich - 2018
    You will start by setting up the proper Python environment to work on practical applications. This includes setting up libraries such as OpenCV, TensorFlow, and Keras using Anaconda. Using these libraries, you'll start to understand the concepts of image transformation and filtering. You will find a detailed explanation of feature detectors such as FAST and ORB; you'll use them to find similar-looking objects. With an introduction to convolutional neural nets, you will learn how to build a deep neural net using Keras and how to use it to classify the Fashion-MNIST dataset. With regard to object detection, you will learn the implementation of a simple face detector as well as the workings of complex deep-learning-based object detectors such as Faster R-CNN and SSD using TensorFlow. You'll get started with semantic segmentation using FCN models and track objects with Deep SORT. Not only this, you will also use Visual SLAM techniques such as ORB-SLAM on a standard dataset. By the end of this book, you will have a firm understanding of the different computer vision techniques and how to apply them in your applications. What you will learn Learn the basics of image manipulation with OpenCV Implement and visualize image filters such as smoothing, dilation, histogram equalization, and more Set up various libraries and platforms, such as OpenCV, Keras, and Tensorflow, in order to start using computer vision, along with appropriate datasets for each chapter, such as MSCOCO, MOT, and Fashion-MNIST Understand image transformation and downsampling with practical implementations. Explore neural networks for computer vision and convolutional neural networks using Keras Understand working on deep-learning-based object detection such as Faster- R-CNN, SSD, and more Explore deep-learning-based object tracking in action Understand Visual SLAM techniques such as ORB-SLAM Who this book is for This book is for machine learning practitioners and deep learning enthusiasts who want to understand and implement various tasks associated with Computer Vision and image processing in the most practical manner possible. Some programming experience would be beneficial while knowing Python would be an added bonus.

Android for Dummies


Dan Gookin - 2018
    The difference between the two is slight, primarily that phones can place and receive phone calls and tablets feature more screen real estate. Beyond that, both devices work identically. Indeed, the existing titles featured a lot of overlap. As with previous titles, this book covers Android technology for a beginner or anyone who uses an Android mobile device and feels that the gizmo is getting the best of themThis book documents all the features of the Android phone and/or tablet, approaching them from the point of view of a smart person who is intimidated by the technology and baffled by the scant documentation and online support. All topics for the Android will be covered, from setup and configuration, to use of the phone features: texting, e-mailing, accessing the Internet, maps, navigation, camera and video, synching with a PC, and expanding the device's potential with new software. As usual, humor is generously sprinkled throughout the text. The accessible and fun writing style provides relief but never gets in the way of the book's important content. The reader will end up keeping this book close, referring to it often as they explore the features of their Android phone or tablet. It covers all the updates to the OS through the latest version release.

Beginning Data Science with Python and Jupyter: Use powerful industry-standard tools within Jupyter and the Python ecosystem to unlock new, actionable insights from your data


Alex Galea - 2018
    This step-by-step guide is ideal for beginners who know a little Python and are looking for a quick, fast-paced introduction. Key Features Get up and running with the Jupyter ecosystem and some example datasets Learn about key machine learning concepts like SVM, KNN classifiers and Random Forests Discover how you can use web scraping to gather and parse your own bespoke datasets Book Description Get to grips with the skills you need for entry-level data science in this hands-on Python and Jupyter course. You'll learn about some of the most commonly used libraries that are part of the Anaconda distribution, and then explore machine learning models with real datasets to give you the skills and exposure you need for the real world. We'll finish up by showing you how easy it can be to scrape and gather your own data from the open web, so that you can apply your new skills in an actionable context. What you will learn Get up and running with the Jupyter ecosystem and some example datasets Learn about key machine learning concepts like SVM, KNN classifiers, and Random Forests Plan a machine learning classification strategy and train classification, models Use validation curves and dimensionality reduction to tune and enhance your models Discover how you can use web scraping to gather and parse your own bespoke datasets Scrape tabular data from web pages and transform them into Pandas DataFrames Create interactive, web-friendly visualizations to clearly communicate your findings Who this book is for This book is ideal for professionals with a variety of job descriptions across large range of industries, given the rising popularity and accessibility of data science. You'll need some prior experience with Python, with any prior work with libraries like Pandas, Matplotlib and Pandas providing you a useful head start. Table of Contents Jupyter Fundamentals Data Cleaning and Advanced Machine Learning Web Scraping and Interactive Visualizations

Helping Kids with Coding For Dummies


Camille McCue - 2018
    Unfortunately, many parents, teachers, and mentors didn't learn the unique logic and language of coding in school. Helping Kids with Coding For Dummies comes to the rescue. It breaks beginning coding into easy-to-understand language so you can help a child with coding homework, supplement an existing coding curriculum, or have fun learning with your favorite kid. The demand to have younger students learn coding has increased in recent years as the demand for trained coders has far exceeded the supply of coders. Luckily, this fun and accessible book makes it a snap to learn the skills necessary to help youngsters develop into proud, capable coders! Help with coding homework or enhance a coding curriculum Get familiar with coding logic and how to de-bug programs Complete small projects as you learn coding language Apply math skills to coding If you’re a parent, teacher, or mentor eager to help 8 to 14 year olds learn to speak a coding language like a mini pro, this book makes it possible!

Kotlin for Android App Development


Peter Sommerhoff - 2018
    . . . Peter finds a good balance between what is essential and what can be left to readers, so this book is an efficient yet comprehensible source for starting programming with Kotlin." -Bernhard Rumpe, Professor of Software Engineering, RWTH Aachen University The Kotlin language brings state-of-the-art programming techniques and constructs to Android development. Kotlin for Android App Development will help you rapidly understand Kotlin's principles and techniques, apply Kotlin in production app development, integrate Kotlin with existing Java code, and plan a migration to Kotlin, if you choose. If you have at least basic programming experience (with any language), Peter Sommerhoff's well-crafted overview and examples will help you get quickly up-to-speed with the Kotlin language, its constructs, and its advanced functional and object-oriented capabilities. Once you've mastered these foundations, Sommerhoff walks you through two complete app development projects, introducing best practices and emerging patterns for writing code that's robust, concise, readable, and highly performant. Understand Kotlin's goals, principles, advantages, design, and constructs Take full advantage of functional programming in the Kotlin environment Write more concise and reusable code using Kotlin's object-oriented features Interoperate with existing Java code, and plan a migration to Kotlin Use coroutines to efficiently handle concurrency Capture data via third-party APIs, map it to internal data representations, and present it to users Master best practices for architecting Kotlin Android apps Improve productivity and readability by creating simple domain-specific languages in Kotlin Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

Introducing GitHub: A Non-Technical Guide


Brent Beer - 2018
    It’s perfect for project and product managers, stakeholders, and other team members who want to collaborate on a development project—whether it’s to review and comment on work in progress or to contribute specific changes. It’s also great for developers just learning GitHub. GitHub has rapidly become the default platform for software development, but it’s also ideal for other text-based documents, from contracts to screenplays. This hands-on book shows you how to use GitHub’s web interface to view projects and collaborate effectively with your team. The updated second edition covers code review, and includes updates to the desktop application, the Atom text editor, protected branches, and project management features. Keep track of, and work with, developers more effectively Learn the basics so you can contribute to your software projects Understand foundational Git knowledge, including commits and cloning Get tips on positive interaction with developers

Social Media & Screen Addiction (Calm Masterclass #2)


Adam Alter - 2018
    We all know screens and social media are incredibly addictive, but why? And is there anything we can actually do about it? Psychologist Adam Alter explores these questions and shares practical steps for managing the rise of social media and screen addiction in our lives.Link: https://www.calm.com/masterclass

Web Coding & Development All-in-One For Dummies


Paul McFedries - 2018
    If you’re a would-be developer looking to gain the know-how to build the interfaces, databases, and other features that run modern websites, web apps, and mobile apps, look no further. Web Coding & Development All-in-One For Dummies is your go-to interpreter for speaking the languages that handle those tasks. Get started with a refresher on the rules of coding before diving into the languages that build interfaces, add interactivity to the web, or store and deliver data to sites. When you're ready, jump into guidance on how to put it all together to build a site or create an app. Get the lowdown on coding basics Review HTML and CSS Make sense of JavaScript, jQuery, PHP, and MySQL Create code for web and mobile apps There’s a whole world of opportunity out there for developers—and this fast-track boot camp is here to help you acquire the skills you need to take your career to new heights!

Comptia It Fundamentals (Itf+) Study Guide: Exam Fc0-U61


Quentin Docter - 2018
    However, the FC0-U61 exam objectives are exactly the same. After the book was printed with IT Fundamentals in the title, CompTIA changed the name to IT Fundamentals+ (ITF+). We have corrected the title to IT Fundamentals+ (ITF+) in subsequent book printings, but earlier printings that were sold may still show IT Fundamentals in the title. Please rest assured that the book content is 100% the same.The ultimate study guide for the essential entry-level IT cert!The CompTIA IT Fundamentals Study Guide: Exam FC0-U61, Second Edition is your ideal companion for comprehensive exam preparation. Covering 100 percent of the latest exam objectives, this book contains everything you need to know to pass with flying colors--the first time! Clear, concise language breaks down fundamental IT concepts to help you truly grasp important concepts, and practical examples illustrate how each new skill is applied in real-world situations. You'll learn your way around hardware and software, conduct installations, and connect to networks to get a workstation up and running smoothly; you'll also develop the knowledge base needed to identify compatibility and security issues, mitigate risks, and conduct all-important preventative maintenance that keeps the end-user problem-free.The CompTIA IT Fundamentals certification validates your skills as a systems support specialist, and gets your foot in the door to a successful IT career. This book is your ultimate preparation resource, with expert guidance backed by online tools to take your preparation to the next level!Master 100 percent of Exam FC0-U61 objectives Learn real-world applications and practical on-the-job skills Know what to expect with exam highlights and review questions Access online study tools including flashcards, chapter tests, a practice exam, and more! The IT department is instrumental in keeping any organization on its feet. As support staff, you will be called upon to assess and repair common problems, set up and configure workstations, address individual issues, and much more. If you decide to continue on to more advanced IT positions, the CompTIA IT Fundamentals certification is a great springboard; if you're ready to launch your career, the CompTIA IT Fundamentals Study Guide offers complete, practical prep to help you face the exam with confidence.

Mastering Xamarin.Forms: Create High-Quality Multi-Platform Native Apps with Xamarin.Forms


Ed Snider - 2018
    This new edition features Xamarin.Forms 4 updates, including CollectionView and RefreshView, new coverage of client-side validation, and updates on how to implement user authentication.Mastering Xamarin.Forms, Third Edition is one of the few Xamarin books structured around the development of a simple app from start to finish, beginning with a basic Xamarin.Forms app and going step by step through several advanced topics to create a solution architecture rich with the benefits of good design patterns and best practices.This book introduces a core separation between the app's user interface and the app's business logic by applying the MVVM pattern and data binding, and then focuses on building a layer of plugin-like services that handle platform-specific utilities such as navigation and geo-location, as well as how to loosely use these services in the app with inversion of control and dependency injection. You’ll connect the app to a live web-based API and set up offline synchronization before testing the app logic through unit testing. Finally, you will learn how to add monitoring to your Xamarin.Forms projects to track crashes and analytics and gain a proactive edge on quality. What you will learn Find out how, when, and why to use architecture patterns and best practices with Xamarin.Forms Implement the Model-View-ViewModel (MVVM) pattern and data binding in Xamarin.Forms mobile apps Incorporate client-side validation in Xamarin.Forms mobile apps Extend the Xamarin.Forms navigation API with a custom ViewModel-centric navigation service Leverage the inversion of control and dependency injection patterns in Xamarin.Forms mobile apps Work with online and offline data in Xamarin.Forms mobile apps Use platform-specific APIs to build rich custom user interfaces in Xamarin.Forms mobile apps Explore how to monitor mobile app quality using Visual Studio App Center Who this book is for This book is intended for .NET developers who are familiar with Xamarin mobile application development and the open source Xamarin.Forms toolkit. If you have already started working with Xamarin.Forms and want to take your app to the next level, making it more maintainable, testable and flexible, then this book is for you. Table of Contents Getting Started MVVM and Data Binding Navigation Platform-Specific Services and Dependency Injection User Interface API Data Access Authentication Testing App Monitoring

Lua Quick Start Guide: The easiest way to learn Lua programming


Gabor Szauer - 2018
    There are many popular commercial projects that allow you to modify or extend them through Lua scripting, and this book will get you ready for that. This book is the easiest way to learn Lua. It introduces you to the basics of Lua and helps you to understand the problems it solves. You will work with the basic language features, the libraries Lua provides, and powerful topics such as object-oriented programming. Every aspect of programming in Lua, variables, data types, functions, tables, arrays and objects, is covered in sufficient detail for you to get started. You will also find out about Lua's module system and how to interface with the operating system.After reading this book, you will be ready to use Lua as a programming language to write code that can interface with the operating system, automate tasks, make playable games, and much more. This book is a solid starting point for those who want to learn Lua in order to move onto other technologies such as Love2D or Roblox.A quick start guide is a focused, shorter title that provides a faster paced introduction to a technology. It is designed for people who don't need all the details at this point in their learning curve. This presentation has been streamlined to concentrate on the things you really need to know. What you will learn Understand the basics of programming the Lua language Understand how to use tables, the data structure that makes Lua so powerful Understand object-oriented programming in Lua using metatables Understand standard LUA libraries for math, file io, and more Manipulate string data using Lua Understand how to debug Lua applications quickly and effciently Understand how to embed Lua into applications with the Lua C API Who this book is for This book is for developers who want to get up and running with Lua. This book is ideal for programmers who want to learn to embed Lua in their own applications, as well as for beginner programmers who have never coded before. Table of Contents Introduction to LUA Working with LUA Tables and Objects LUA Libraries Debuging LUA Embedding LUA LUA Bridge Next Steps

Ransomware (Killchain Book 1)


Brandon Clark - 2018
    Now only a Blackhat can save him. Haley retired from the seediest corners of the internet when Jacob was born to protect him from the worst of humanity. However, when she discovers the Russian mob is smuggling women into her city to restock their brothel, she can’t stand idly by. But instead of a daring rescue, she’s drawn into the very situation she most feared: her son’s life in exchange for a ransom only she can produce. Even for her, stealing the digital crown jewels to some of the most powerful and high profile organizations in the world is likely to put her behind bars, or worse, in the grave. Racing against time and through cyberspace, Haley is backed into the darkest corners of the internet to meet the kidnapper’s demands. She’ll stop at nothing to get her son back, even if it means working with her ex-husband again. But nothing is certain on the Darkweb, and Haley must decide what, and who, she is willing to sacrifice to hold her baby again.

Splunk 7 Essentials, Third Edition: Demystify machine data by leveraging datasets, building reports, and sharing powerful insights, 3rd Edition


J-P Contreras - 2018
    

Code Your Own Adventure


Max Wainewright - 2018
    With easy-to-follow, step-by-step instructions illustrated in a graphic novel style, this is the perfect introduction to key coding concepts. Prepare to save Planet Zyskinar, search for buried treasure, find the Lost City of Gold, and discover the Book of Spells! After an introduction to finding and using Scratch, you will embark on these four coding adventures. For each story, follow each numbered step of the illustrated instructions to draw the central characters and objects, animate the plot lines, and create games. A glossary at the back defines key coding terms. Choose your mission and get ready to code!

BEYOND THE BORDERS: A fantastic journey to the outer rims of 68000 (The Atari ST and the Creative People Book 2)


Marco A. Breddin - 2018
    It’s the beginning of the end of the home computer era. The Golden Years of underground culture. The demoscene grows and still discovers a variety of new techniques to overcome the limits of Atari’s 16/32-bit systems – often with an upcoming profession in mind. With an afterword by Erik Simon, co-founder of Thalion. The long-time game-developer does look back on his time with Wilfried Carmincke. Memories of the Makers of groups like ULM, SYNC, Electronic Images, Torment, Legacy, NeXT, Oxygène, Hemoroids, Diamond Design, Overlanders, Dune, MJJ Prod, Aggression, Chronicle, Hotline, Replicants, Medway Boys, Delta Force, ACF, Animal Mine, Stax, BMT, Disk Busters Association and the Maggie-Team. New insights about Eclipse Software Design. Founder Marc Rosocha has added many unknown details to the story. The video game pioneer tells the exciting story of his first encounter with the Atari Corporation when he worked with Ex-Thalion programmer Michael Bittner on advanced 3D routines, games and tools for Atari’s 32-bit dream machine: the Falcon. Summary: The game industry is changing and Japanese consoles overtake the market by storm. The Manga style infects European artists. IBM PC’s are gaining more attention. Philips CD-ROM promises to be the storage media of the future, while Commodore stays a tough opponent. Atari tries to rescue its market share by introducing the Falcon and the Mega STE, yet striving back to the console market with the first 64-bit console. Thalion in Gütersloh experience an internal division and must face their origin. Most European game publishers turn their backs to the ST. Former sceners won’t give up so fast, instead they are even heading to new horizons. Only one last thing has to be given to the test: are the crackers responsible for the overall sales decline? Demo Classics: Anomaly Megademo Dark Side of the Spoon Decade Demo Eat my Bollocks Flip-O-Demo Froggies Over The Fence O-Demo Ooh Crikey Wot A Scorcher Phaleon GigaDemo Punish You Machine Thalion Classics: Airbus A320 Ambermoon Amberstar Lionheart No Second Prize Trex Warrior Eclipse Classics: Lethal Xcess Monster Business Stone Age Tome 2. BEYOND THE BORDERS not only presents some of the best artistic works on Atari’s 16-bit computers, but also gives the readers a chance to experience the downfall of the home computer industry from an Atari perspective. Volume 2 is a highly compressed tome – packed with unforgettable Atari ST/E demos, unbelievable last-minute-achievements, underground background stories and features. www.microzeit.com