Book picks similar to
Database Security by Silvana Castaño


security
favorites
databases-architechture
reference

Service-Oriented Design with Ruby and Rails


Paul Dix - 2010
    Today, Rails developers and architects need better ways to interface with legacy systems, move into the cloud, and scale to handle higher volumes and greater complexity. In Service-Oriented Design with Ruby and Rails Paul Dix introduces a powerful, services-based design approach geared toward overcoming all these challenges. Using Dix's techniques, readers can leverage the full benefits of both Ruby and Rails, while overcoming the difficulties of working with larger codebases and teams. Dix demonstrates how to integrate multiple components within an enterprise application stack; create services that can easily grow and connect; and design systems that are easier to maintain and upgrade. Key concepts are explained with detailed Ruby code built using open source libraries such as ActiveRecord, Sinatra, Nokogiri, and Typhoeus. The book concludes with coverage of security, scaling, messaging, and interfacing with third-party services. Service-Oriented Design with Ruby and Rails will help you Build highly scalable, Ruby-based service architectures that operate smoothly in the cloud or with legacy systems Scale Rails systems to handle more requests, larger development teams, and more complex code bases Master new best practices for designing and creating services in Ruby Use Ruby to glue together services written in any language Use Ruby libraries to build and consume RESTful Web services Use Ruby JSON parsers to quickly represent resources from HTTP services Write lightweight, well-designed API wrappers around internal or external services Discover powerful non-Rails frameworks that simplify Ruby service implementation Implement standards-based enterprise messaging with Advanced Message Queuing Protocol (AMQP) Optimize performance with load balancing and caching Provide for security and authentication

The Ultimate History of Video Games: From Pong to Pokemon - The Story Behind the Craze That Touched Our Lives and Changed the World


Steven L. Kent - 2001
    The Ultimate History of Video Games reveals everything you ever wanted to know and more about the unforgettable games that changed the world, the visionaries who made them, and the fanatics who played them. From the arcade to television and from the PC to the handheld device, video games have entraced kids at heart for nearly 30 years. And author and gaming historian Steven L. Kent has been there to record the craze from the very beginning.This engrossing book tells the incredible tale of how this backroom novelty transformed into a cultural phenomenon. Through meticulous research and personal interviews with hundreds of industry luminaries, you'll read firsthand accounts of how yesterday's games like Space Invaders, Centipede, and Pac-Man helped create an arcade culture that defined a generation, and how today's empires like Sony, Nintendo, and Electronic Arts have galvanized a multibillion-dollar industry and a new generation of games. Inside, you'll discover:·The video game that saved Nintendo from bankruptcy ·The serendipitous story of Pac-Man's design ·The misstep that helped topple Atari's $2 billion-a-year empire·The coin shortage caused by Space Invaders ·The fascinating reasons behind the rise, fall, and rebirth of Sega ·And much more! Entertaining, addictive, and as mesmerizing as the games it chronicles, this book is a must-have for anyone who's ever touched a joystick.

Getting Clojure


Russ Olsen - 2018
    The vision behind Clojure is of a radically simple language framework holding together a sophisticated collection of programming features. Learning Clojure involves much more than just learning the mechanics of the language. To really get Clojure you need to understand the ideas underlying this structure of framework and features. You need this book: an accessible introduction to Clojure that focuses on the ideas behind the language as well as the practical details of writing code.

The Way to Go: A Thorough Introduction to the Go Programming Language


Ivo Balbaert - 2012
    "

Cloud Computing for Dummies


Judith Hurwitz - 2009
    If you've been put in charge of implementing cloud computing, this straightforward, plain-English guide clears up the confusion and helps you get your plan in place.You'll learn how cloud computing enables you to run a more green IT infrastructure, and access technology-enabled services from the Internet ("in the cloud") without having to understand, manage, or invest in the technology infrastructure that supports them. You'll also find out what you need to consider when implementing a plan, how to handle security issues, and more.Cloud computing is a way for businesses to take advantage of storage and virtual services through the Internet, saving money on infrastructure and support This book provides a clear definition of cloud computing from the utility computing standpoint and also addresses security concerns Offers practical guidance on delivering and managing cloud computing services effectively and efficiently Presents a proactive and pragmatic approach to implementing cloud computing in any organization Helps IT managers and staff understand the benefits and challenges of cloud computing, how to select a service, and what's involved in getting it up and running Highly experienced author team consults and gives presentations on emerging technologies Cloud Computing For Dummies gets straight to the point, providing the practical information you need to know.

Hacking Linux Exposed: Linux Security Secrets & Solutions


Brian Hatch - 2001
    Hacking Exposed Linux provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks.Secure Linux by using attacks and countermeasures from the latest OSSTMM researchFollow attack techniques of PSTN, ISDN, and PSDN over LinuxHarden VoIP, Bluetooth, RF, RFID, and IR devices on LinuxBlock Linux signal jamming, cloning, and eavesdropping attacksApply Trusted Computing and cryptography tools for your best defenseFix vulnerabilities in DNS, SMTP, and Web 2.0 servicesPrevent SPAM, Trojan, phishing, DoS, and DDoS exploitsFind and repair errors in C code with static analysis and Hoare Logic

Ek Sanjhne Sarname


Kaajal Oza Vaidya
    The emotions of women from different places and their sentiments with these sentiments a new eras story is woven in vivid shades.

Footballistics


James Coventry - 2018
    The nature of football continually changes, which means its analysis must also keep pace. This book is for students, thinkers, and theorists of the game.'Ted Hopkins - Carlton premiership player, author, and co-founder of Champion Data. Australian Rules football has been described as the most data-rich sport on Earth. Every time and everywhere an AFL side takes to the field, it is shadowed by an army of statisticians and number crunchers. The information they gather has become the sport's new language and currency. ABC journalist James Coventry, author of the acclaimed Time and Space, has joined forces with a group of razor-sharp analysts to decipher the data, and to use it to question some of football's long-held truisms. Do umpires really favour the home side? Has goal kicking accuracy deteriorated? Is Geelong the true master of the draft? Are blonds unfairly favoured in Brownlow medal voting? And are Victorians the most passionate fans? Through a blend of entertaining storytelling and expert analysis, this book will answer more questions about footy than you ever thought to ask. Praise for Time and Space:'Brilliant, masterful' - The Guardian'Arguably one of the most important books yet written on Australian Rules football.' - Inside History'Should find its way into the hands of every coach.' - AFL Record

Network Security: Private Communication in a Public World


Charlie Kaufman - 1995
    In the second edition of Network Security, this most distinguished of author teams draws on hard-won experience to explain every facet of information security, from the basics to advanced cryptography and authentication; secure Web and email services; and emerging security standards. Highlights of the book's extensive new coverage include Advanced Encryption Standard (AES), IPsec, SSL, PKI Standards, and Web security.

The Handmaid's Billionaire


Gigi Marlowe - 2019
    She ran away.Sickness stole Corbin’s wife and love of his life.Mattie ended her marriage the day it should have begun.Corbin and Mattie are strangers living in Malibu, unaware of each other...Until Valentina Del Torre steps in.The matchmaker brings the lonely billionaire entertainment entrepreneur and the creative Broadway musical writer wannabe together, but it’s up to them to build a relationship.Corbin wants to love Mattie, but something is blocking him.Mattie must face her past and make a choice.But will Corbin wait for her to make it?Is new love just as good or better than first love?

Tell Yo Bitch 2


Niyah Moore - 2013
    Mai’s betrayal lands her in a life threatening situation at the hands of Cipher, whom seems to think Rocko is responsible for his cousin’s death. While Heather and Troi are forced to work out their differences for their own safety, Brandon isn’t really who he says he is. Heather has to decide if her relationship with Brandon will be able to outlast what he’s been hiding. Rocko comes back in contact with an old fling, Dominique. Will he be able to deal with her surprise?

We Will Meet Again...


Tarang Sinha - 2016
    Despite regular warnings from her ever-suspicious heart, she inexplicably gets attracted towards him. But she would not let him trespass her soul. Why? Is she scared of mendacious face of love her past has inflicted on her? Can Paridhi really trust Abhigyan? Is Abhigyan’s life really that perfect as it seems? Will a blissful breeze of love ever kiss her heart? Will a blissful breeze of love ever kiss her heart?A heart-warming saga of dreams and desires, We Will Meet Again promises to make you smile and cry at the same time. Hold on to your hearts before embarking on this roller coaster ride of emotions!

The Peaceful Life: Slowing down, choosing happiness, nurturing your feminine self, and finding sanctuary in your home


Fiona Ferris - 2020
    

802.11 Wireless Networks: The Definitive Guide


Matthew S. Gast - 2002
    Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain.The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware available everywhere you turn, the choice seems simple, and many people dive into wireless computing with less thought and planning than they'd give to a wired network. But it's wise to be familiar with both the capabilities and risks associated with the 802.11 protocols. And 802.11 Wireless Networks: The Definitive Guide, 2nd Edition is the perfect place to start.This updated edition covers everything you'll ever need to know about wireless technology. Designed with the system administrator or serious home user in mind, it's a no-nonsense guide for setting up 802.11 on Windows and Linux. Among the wide range of topics covered are discussions on:deployment considerationsnetwork monitoring and performance tuningwireless security issueshow to use and select access pointsnetwork monitoring essentialswireless card configurationsecurity issues unique to wireless networksWith wireless technology, the advantages to its users are indeed plentiful. Companies no longer have to deal with the hassle and expense of wiring buildings, and households with several computers can avoid fights over who's online. And now, with 802.11 Wireless Networks: The Definitive Guide, 2nd Edition, you can integrate wireless technology into your current infrastructure with the utmost confidence.

Programming the World Wide Web


Robert W. Sebesta - 2001
    'Programming The World Wide Web', written by bestselling author, Robert Sebesta, provides a comprehensive introduction to the programming tools and skills required for building and maintaining server sites on the Web.