Book picks similar to
Building Virtual Machine Labs: A Hands-On Guide by Tony Robinson
free
self-education
tribe-of-hackers-recomended
cyber
iPad For Dummies
Edward C. Baig - 2010
This full-color guide is the perfect companion to help you get up to speed and on the go with Apple's revolutionary iPad.Veteran For Dummies authors and Mac gurus begin with a look at the multi-touch interface and then move on to setting up iTunes, surfing the Web, and sending and receiving e-mail. You'll discover how to share, store, and import photos; buy and read your favorite books; get directions and use maps; rent, buy, and watch movies and TV shows; listen to the latest music; play games; shop for cool new apps; and much more.Popular authors Edward Baig and Bob "Dr. Mac" LeVitus begin with the basics as they walk you through setting up and using the iPad in this full-color guide Offers a straightforward-but-fun approach to the many exciting functions of the iPad: listening to music, synchronizing your data, working with the calendar, setting up iTunes, and getting online via Wi-Fi, to name a few Presents an easy-to-understand approach to sending and receiving e-mail; shopping for movies, iBooks, and music at the iTunes Store; browsing the Web; sharing photos; downloading and watch movies and TV shows; and downloading apps from the App Store Explains how to use your iPad as a portable game console and how to manage your contacts and to-do lists Covers protecting your information and troubleshooting From no-nonsense basics to useful tips and techniques, iPad For Dummies will help you discover all the cool things your iPad can do.
HBase: The Definitive Guide
Lars George - 2011
As the open source implementation of Google's BigTable architecture, HBase scales to billions of rows and millions of columns, while ensuring that write and read performance remain constant. Many IT executives are asking pointed questions about HBase. This book provides meaningful answers, whether you’re evaluating this non-relational database or planning to put it into practice right away.
Discover how tight integration with Hadoop makes scalability with HBase easier
Distribute large datasets across an inexpensive cluster of commodity servers
Access HBase with native Java clients, or with gateway servers providing REST, Avro, or Thrift APIs
Get details on HBase’s architecture, including the storage format, write-ahead log, background processes, and more
Integrate HBase with Hadoop's MapReduce framework for massively parallelized data processing jobs
Learn how to tune clusters, design schemas, copy tables, import bulk data, decommission nodes, and many other tasks
Cloud Architecture Patterns: Using Microsoft Azure
Bill Wilder - 2012
You’ll learn how each of these platform-agnostic patterns work, when they might be useful in the cloud, and what impact they’ll have on your application architecture. You’ll also see an example of each pattern applied to an application built with Windows Azure.The patterns are organized into four major topics, such as scalability and handling failure, and primer chapters provide background on each topic. With the information in this book, you’ll be able to make informed decisions for designing effective cloud-native applications that maximize the value of cloud services, while also paying attention to user experience and operational efficiency.Learn about architectural patterns for:Scalability. Discover the advantages of horizontal scaling. Patterns covered include Horizontally Scaling Compute, Queue-Centric Workflow, and Auto-Scaling.Big data. Learn how to handle large amounts of data across a distributed system. Eventual consistency is explained, along with the MapReduce and Database Sharding patterns.Handling failure. Understand how multitenant cloud services and commodity hardware influence your applications. Patterns covered include Busy Signal and Node Failure.Distributed users. Learn how to overcome delays due to network latency when building applications for a geographically distributed user base. Patterns covered include Colocation, Valet Key, CDN, and Multi-Site Deployment.
Build Your Own Database Driven Website Using PHP & MySQL
Kevin Yank - 2001
There has been a marked increase in the adoption of PHP, most notably in the beginning to intermediate levels. PHP now boasts over 30% of the server side scripting market (Source: php.weblogs.com).The previous edition sold over 17,000 copies exclusively through Sitepoint.com alone. With the release of PHP 5, SitePoint have updated this bestseller to reflect best practice web development using PHP 5 and MySQL 4.The 3rd Edition includes more code examples and also a new bonus chapter on structured PHP Programming which introduces techniques for organizing real world PHP applications to avoid code duplication and ensure code is manageable and maintainable. The chapter introduces features like include files, user-defined function libraries and constants, which are combined to produce a fully functional access control system suitable for use on any PHP Website.
How the Internet Happened: From Netscape to the iPhone
Brian McCullough - 2018
In How the Internet Happened, he chronicles the whole fascinating story for the first time, beginning in a dusty Illinois basement in 1993, when a group of college kids set off a once-in-an-epoch revolution with what would become the first “dotcom.”Depicting the lives of now-famous innovators like Netscape’s Marc Andreessen and Facebook’s Mark Zuckerberg, McCullough also reveals surprising quirks and unknown tales as he tracks both the technology and the culture around the internet’s rise. Cinematic in detail and unprecedented in scope, the result both enlightens and informs as it draws back the curtain on the new rhythm of disruption and innovation the internet fostered, and helps to redefine an era that changed every part of our lives.
Dissecting The Hack: The F0rb1dd3n Network
Jayson E. Street - 2009
One half massive case study, one half technical manual, Dissecting the Hack has it all - learn all about hacking tools and techniques and how to defend your network against threats. Yes, the security threats are real - read more about the tactics that you see executed throughout the story in the second half of the book where you will learn to recon, scan, explore, exploit and expunge with the tools and techniques shown in the story. Every hack is real and can be used by you once you have the knowledge within this book! Utilizes actual hacking and security tools in its story- helps to familiarize a newbie with the many devices and their codeIntroduces basic hacking techniques in real life context for ease of learningPresented in the words of the hacker/security pro, effortlessly envelops the beginner in the language of the hack
Backtrack 5 Wireless Penetration Testing Beginner's Guide
Vivek Ramachandran - 2011
Every new attack is described in the form of a lab exercise with rich illustrations of all the steps associated. You will practically implement various attacks as you go along. If you are an IT security professional or a security consultant who wants to get started with wireless testing with Backtrack, or just plain inquisitive about wireless security and hacking, then this book is for you. The book assumes that you have familiarity with Backtrack and basic wireless concepts.
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kevin Poulsen - 2011
Max 'Vision' Butler was a white-hat hacker and a celebrity throughout the programming world, even serving as a consultant to the FBI. But there was another side to Max. As the black-hat 'Iceman', he'd seen the fraudsters around him squabble, their ranks riddled with infiltrators, their methods inefficient, and in their dysfunction was the ultimate challenge: he would stage a coup and steal their ill-gotten gains from right under their noses.Through the story of Max Butler's remarkable rise, KINGPIN lays bare the workings of a silent crime wave affecting millions worldwide. It exposes vast online-fraud supermarkets stocked with credit card numbers, counterfeit cheques, hacked bank accounts and fake passports. Thanks to Kevin Poulsen's remarkable access to both cops and criminals, we step inside the quiet,desperate battle that law enforcement fights against these scammers. And learn that the boy next door may not be all he seems.
Android Hacker's Handbook
Joshua J. Drake - 2013
Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them.If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox.A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysis Covers Android application building blocks and security as well as debugging and auditing Android apps Prepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attack Android Hacker's Handbook is the first comprehensive resource for IT professionals charged with smartphone security.
Building a DevOps Culture
Mandi Walls - 2013
But, as Mandi Walls explains in this Velocity report, DevOps is really about changing company culture—replacing traditional development and operations silos with collaborative teams of people from both camps.
The DevOps movement has produced some efficient teams turning out better products faster. The tough part is initiating the change. This report outlines strategies for managers looking to go beyond tools to build a DevOps culture among their technical staff.
Topics include:
Documenting reasons for changing to DevOps before you commit
Defining meaningful and achievable goals
Finding a technical leader to be an evangelist, tools and process expert, and shepherd
Starting with a non-critical but substantial pilot project
Facilitating open communication among developers, QA engineers, marketers, and other professionals
Realigning your team’s responsibilities and incentives
Learning when to mediate disagreements and conflicts
Download this free report and learn how to the DevOps approach can help you create a supportive team environment built on communication, respect, and trust.
Mandi Walls is a Senior Consultant with Opscode.
Google Drive & Docs In 30 Minutes
Ian Lamont - 2012
Millions of people use Google Drive and its popular word processor, Docs, every day. You too can use Drive and Docs to perform the following tasks: * Write letters and reports* Enter data into Sheets, Google's free online spreadsheet program* Give presentations using Slides* Collaborate online with classmates and colleagues on important documents* Convert documents to different file formats * Print documents, drawings, and spreadsheets* Export PDFs * Make pie charts, bar charts, and simple tables* Publish documents and spreadsheets onlineThere are a lot of features, including some unfamiliar ones for people who are used to Microsoft Office. "Google Drive & Docs In 30 Minutes" cuts through the clutter, using screenshots, step-by-step instructions, and plain English. After covering registration, file creation and other basics, the book zeroes in on the most important time-saving tips and productivity tools. Highlights include:* Converting files between Microsoft Office and Google Drive formats.* Best practices for organizing files in Google Drive.* What to expect with collaboration in Google Drive.* Using Google Drive on phones and tablets: What works, and what doesn't.* Accessing older versions of files.* How to publish your documents to the Web for colleagues or members of the public to view.* Sorting and filtering data in Google Spreadsheets (with examples).* Using Web Forms to gather data.* Google Slides: Is it a suitable alternative to Microsoft PowerPoint or Apple Keynote?* Working with offline files.* Downloading third-party apps."Google Drive And Docs In 30 Minutes" is an In 30 Minutes™ guide. Other books in the series include "Dropbox In 30 Minutes", "Google Blogger For Small Businesses In 30 Minutes", and "Excel Basics In 30 Minutes".
Architecting for the AWS Cloud: Best Practices (AWS Whitepaper)
Amazon We Services - 2016
It discusses cloud concepts and highlights various design patterns and best practices. This documentation is offered for free here as a Kindle book, or you can read it in PDF format at https://aws.amazon.com/whitepapers/.
The REST API Design Handbook
George Reese - 2012
The RESTful approach to web services design is rapidly become the approach of choice. Unfortunately, too few people have truly solid REST API design skills, and discussions of REST can become bogged down in dry theory.The REST API Design Handbook is a simple, practical guide to aid software engineers and software architects create lasting, scalable APIs based on REST architectural principles. The book provides a sound foundation in discussing the constraints that define a REST API. It quickly goes beyond that into the practical aspects of implementing such an API in the real world.Written by cloud computing expert George Reese, The REST API Design Handbook reflects hands on work in consuming many different third party APIs as well the development of REST-based web services APIs. It addresses all of the debates the commonly arise while creating these APIs. Subjects covered include:* REST architectural constraints* Using HTTP methods and response codes in an API* Authenticating RESTful API calls* Versioning* Asynchronous Operations* Pagination and Streaming* Polling and Push Notifications* Rate Limiting
CCENT/CCNA ICND1 100-105 Official Cert Guide
Wendell Odom - 2016
They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam. Master Cisco CCENT/CCNA ICND1 100-105 exam topics Assess your knowledge with chapter-opening quizzes Review key concepts with exam preparation tasks This is the eBook edition of the CCENT/CCNA ICND1 100-105 Official Cert Guide. This eBook does not include the companion CD-ROM with practice exam that comes with the print edition. CCENT/CCNA ICND1 100-105 Official Cert Guide presents you with an organized test-preparation routine through the use of proven series elements and techniques. “Do I Know This Already?” quizzes open each chapter and enable you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. CCENT/CCNA ICND1 100-105 Official Cert Guide from Cisco Press enables you to succeed on the exam the first time and is the only self-study resource approved by Cisco. Best-selling author and expert instructor Wendell Odom shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. This complete study package includes · A test-preparation routine proven to help you pass the exams · Do I Know This Already? quizzes, which enable you to decide how much time you need to spend on each section · Chapter-ending and part-ending exercises, which help you drill on key concepts you must know thoroughly · Troubleshooting sections, which help you master the complex scenarios you will face on the exam · A free copy of the CCENT ICND1 100-105 Network Simulator Lite software, complete with meaningful lab exercises that help you hone your hands-on skills with the command-line interface for routers and switches · Links to a series of hands-on config labs developed by the author · Online, interactive practice exercises that help you hone your knowledge · More than 90 minutes of video mentoring from the author · A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies · Study plan suggestions and templates to help you organize and optimize your study time Well regarded for its level of detail, study plans, assessment features, challenging review questions and exercises, video instruction, and hands-on labs, this official study guide helps you master the concepts and techniques that ensure your exam success. This official study guide helps you master all the topics on the CCENT/CCNA ICND1 exam, including · Networking fundamentals · Implementing basic Ethernet LANs · Ethernet LANs: design, VLANs, and troubleshooting · IPv4 addressing and subnetting · Implementing IPv4 · IPv4 design and troubleshooting ...
Ctrl+Shift+Enter Mastering Excel Array Formulas: Do the Impossible with Excel Formulas Thanks to Array Formula Magic
Mike Girvin - 2013
Beginning with an introduction to array formulas, this manual examines topics such as how they differ from ordinary formulas, the benefits and drawbacks of their use, functions that can and cannot handle array calculations, and array constants and functions. Among the practical applications surveyed include how to extract data from tables and unique lists, how to get results that match any criteria, and how to utilize various methods for unique counts. This book contains 529 screen shots.