PostgreSQL 9.0 High Performance
Gregory Smith - 2010
You could spend years discovering solutions to them all, step by step as you encounter them. Or you can just look in here. All successful database applications are destined to eventually run into issues scaling up their performance. Peek into the future of your PostgreSQL database's problems today. Know the warning signs to look for, and how to avoid the most common issues before they even happen. Surprisingly, most PostgreSQL database applications evolve in the same way: Choose the right hardware. Tune the operating system and server memory use. Optimize queries against the database, with the right indexes. Monitor every layer, from hardware to queries, using some tools that are inside PostgreSQL and others that are external. Using monitoring insight, continuously rework the design and configuration. On reaching the limits of a single server, break things up; connection pooling, caching, partitioning, and replication can all help handle increasing database workloads. The path to a high performance database system isn't always easy. But it doesn't have to be mysterious with the right guide. This book is a clear, step-by-step guide to optimizing and scaling up PostgreSQL database servers. - Publisher.
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Dafydd Stuttard - 2007
The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.
The Deadline: A Novel about Project Management
Tom DeMarco - 1997
Rizzoli- Ex-General Markov- Abdul Jamid- The Sinister Minister Belok- The Numbers Man- QuickerStill- Morovia's First Programmer- Think Fast!- Planning for the Summer Games- The Guru of Conflict Resolution- Maestro Diyeniar- Interlude- Part and Whole- Standing on Ceremony- Endgame Begins- The Year's Hottest IPO- Passing Through Riga on the Way Home
DNS and BIND
Cricket Liu - 1996
This book brings you up-to-date with the latest changes in this crucial service.The fifth edition covers BIND 9.3.2, the most recent release of the BIND 9 series, as well as BIND 8.4.7. BIND 9.3.2 contains further improvements in security and IPv6 support, and important new features such as internationalized domain names, ENUM (electronic numbering), and SPF (the Sender Policy Framework).Whether you're an administrator involved with DNS on a daily basis or a user who wants to be more informed about the Internet and how it works, you'll find that this book is essential reading.Topics include:What DNS does, how it works, and when you need to use it How to find your own place in the Internet's namespace Setting up name servers Using MX records to route mail Configuring hosts to use DNS name servers Subdividing domains (parenting) Securing your name server: restricting who can query your server, preventing unauthorized zone transfers, avoiding bogus servers, etc. The DNS Security Extensions (DNSSEC) and Transaction Signatures (TSIG) Mapping one name to several servers for load sharing Dynamic updates, asynchronous notification of change to a zone, and incremental zone transfers Troubleshooting: using nslookup and dig, reading debugging output, common problems DNS programming using the resolver library and Perl's Net::DNS module
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Michael Hale Ligh - 2010
Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills.
Security professionals face a constant battle against malicious software; this practical manual will improve your analytical capabilities and provide dozens of valuable and innovative solutions
Covers classifying malware, packing and unpacking, dynamic malware analysis, decoding and decrypting, rootkit detection, memory forensics, open source malware research, and much more
Includes generous amounts of source code in C, Python, and Perl to extend your favorite tools or build new ones, and custom programs on the DVD to demonstrate the solutions
Malware Analyst's Cookbook is indispensible to IT security administrators, incident responders, forensic analysts, and malware researchers.
Essential PHP Security
Chris Shiflett - 2005
It also works beautifully with other open source tools, such as the MySQL database and the Apache web server. However, as more web sites are developed in PHP, they become targets for malicious attackers, and developers need to prepare for the attacks.Security is an issue that demands attention, given the growing frequency of attacks on web sites. Essential PHP Security explains the most common types of attacks and how to write code that isn't susceptible to them. By examining specific attacks and the techniques used to protect against them, you will have a deeper understanding and appreciation of the safeguards you are about to learn in this book.In the much-needed (and highly-requested) Essential PHP Security, each chapter covers an aspect of a web application (such as form processing, database programming, session management, and authentication). Chapters describe potential attacks with examples and then explain techniques to help you prevent those attacks.Topics covered include:Preventing cross-site scripting (XSS) vulnerabilitiesProtecting against SQL injection attacksComplicating session hijacking attemptsYou are in good hands with author Chris Shiflett, an internationally-recognized expert in the field of PHP security. Shiflett is also the founder and President of Brain Bulb, a PHP consultancy that offers a variety of services to clients around the world.
The Complete Free Kindle Fire Apps (Free Kindle Fire Apps That Don't Suck Book 1)
The App Bible - 2012
This is the one you want… Personally, I will check out any book this author writes about apps because, for some reason, maybe a bad case of OCD, he is obviously compelled to do the most thorough investigation into each and every aspect, good and bad of apps in a particular genre. My hat's off to him, and he has my thanks for saving me a ton of time and grief.” - Linda Abbott (Reviewer) Nearly 800 Pages of In-Depth Reviews, and Tips and Tricks to Help You Get The Most Out of Your Free Kindle Fire Apps Question: Why Do You Need This Book? Answer: Because you have better things to do with your time than to trudge through the Amazon App Store and test tons of apps until you find the best ones Question: OK. But Why Do You Need To Buy THIS Book? Answer: Because you need more than some random list of “Top Kindle Fire Apps.” You also need: To know which apps to download first Tips and tricks for how to get the most out of the apps How to find help if you’re having a problem with an app An in-depth review describing what is good and what is bad about each app Problem: Even if you have a list of the top free apps, how do you know which ones to install first? Solution: At the end of this book, all the apps are ranked from best to worst according to a UNIQUE RANKING SYSTEM FOUND ONLY IN MY BOOKS Question: How Else Is This Book Unique? Answer: In addition to its unique ranking system, it also offers in-depth reviews that provide the following: A summary of what the app does A summary of what is good and what is bad about each app When available: The app developer’s contact information, website information, as well as links to pertinent articles about the app Tips and tricks for many of the apps (how to get the most from the app) A brief summary of the positive and negative reviews of the app on Amazon PLUS: A list of 5 must-have free productivity apps that every Kindle Fire owner should install to have greater control over their Kindle Fire A list of 15 free productivity apps that most Kindle Fire owners will find useful since they provide a great deal of functionality Question: OK…But What Types Of Apps, Exactly, Does The Book Include? Answer: A dizzying variety… Game Apps Arcade and Board game apps Mind game apps: Card, logic, and word game apps Kids Apps Educational apps and Game apps for kids: Apps for toddlers, preschoolers, elementary schoolers, and high schoolers in the following categories: Art apps, Book apps, English apps, and Math apps Productivity Apps Art
25 Real Estate Lead Generating Strategies That Work
Greg Reed - 2014
Well ‘next’ might be exaggerating it a little. A sale would be more appropriate. Each night I’d return home and let out a bunch of expletives that would make my dog blush. I was often in a foul mood. Then after 10 years of struggle I discovered, developed and implemented a bunch of real estate marketing strategies which I am going reveal in this book that saw my income virtually double in one year. After 2 years of using these real estate lead generation skills my income shot up another 50%. The word soon got out that I had discovered a way to make ‘easy’ (no such thing) real estate sales. Real estate referrals became my method of operation. Companies were approaching me to move camps. In fact one company placed me on a $200,000 package to help boost sales. The strategies worked for me and they’ll work for you. This book is for real estate sales people, real estate agents or brokers who are totally overwhelmed with the complexities of selling real estate. It’s for agents seething with frustration at their pathetic sales. And it’s also for successful real estate agents wanting to take their real estate career to the next level. You have two obstacles from making a killing in real estate sales: 1. You have no idea what business you are REALLY in. Most real estate sales people think that they are in the real estate business to assist people with their real estate buying, selling, leasing or managing needs.While partly ‘true’ unless you have a real estate lead that wants to buy, sell, lease or manage a property through you, you have no business. PERIOD. 2. A belief that you are ‘Gods’ answer to all things real estate.Let’s face it. Real estate agents are an egotistical bunch. How often do you see advertisements stating “Billy Blogs – No. 1 For XYZ Real Estate” or “Cheryl Champion – Top Real Estate Marketer, Mars Tribune” Who gives a toss. The public certainly don’t and nor should you especially if you are a newbie just getting started. With my real estate lead generation tips you’ll soon be the ‘king’ or queen’ of your local area. My real estate lead generation strategies are by no means complete. But they are a good start in raising you from the depths of despair to making you the champion agent you so rightly deserve to be. Here’s my appeal to you. Believe in yourself. Believe in your real estate career. Follow my suggestions. Implement those that appeal to you and be consistent. These real estate lead generation strategies take time but they have helped me sell over $400 million of real estate. They will work for you to.
Learn Java in One Day and Learn It Well: Java for Beginners with Hands-on Project
Jamie Chan - 2016
Learn Java Programming Fast with a unique Hands-On Project. Book 4 of the Learn Coding Fast Series. Covers Java 8. Have you always wanted to learn computer programming but are afraid it'll be too difficult for you? Or perhaps you know other programming languages but are interested in learning the Java language fast? This book is for you. You no longer have to waste your time and money trying to learn Java from boring books that are 600 pages long, expensive online courses or complicated Java tutorials that just leave you more confused and frustrated. What this book offers... Java for Beginners Complex concepts are broken down into simple steps to ensure that you can easily master the Java language even if you have never coded before. Carefully Chosen Java Examples Examples are carefully chosen to illustrate all concepts. In addition, the output for all examples are provided immediately so you do not have to wait till you have access to your computer to test the examples. Careful selection of topics Topics are carefully selected to give you a broad exposure to Java, while not overwhelming you with information overload. These topics include object-oriented programming concepts, error handling techniques, file handling techniques and more. In addition, new features in Java (such as lambda expressions and default methods etc) are also covered so that you are always up to date with the latest advancement in the Java language. Learn The Java Programming Language Fast Concepts are presented in a "to-the-point" style to cater to the busy individual. You no longer have to endure boring and lengthy Java textbooks that simply puts you to sleep. With this book, you can learn Java fast and start coding immediately. How is this book different... The best way to learn Java is by doing. This book includes a unique project at the end of the book that requires the application of all the concepts taught previously. Working through the project will not only give you an immense sense of achievement, it’ll also help you retain the knowledge and master the language. Are you ready to dip your toes into the exciting world of Java coding? This book is for you. Click the BUY button and download it now. What you'll learn: Introduction to Java - What is Java? - What software do you need to code Java programs? - How to install and run JDK and Netbeans? Data types and Operators - What are the eight primitive types in Java? - What are arrays and lists? - How to format Java strings - What is a primitive type vs reference type? - What are the common Java operators? Object Oriented Programming - What is object oriented programming? - How to write your own classes - What are fields, methods and constructors? - What is encapsulation, inheritance and polymorphism? - What is an abstract class and interface? Controlling the Flow of a Program - What are condition statements? - How to use control flow statements in Java - How to handle errors and exceptions - How to throw your own exception
Information Theory, Inference and Learning Algorithms
David J.C. MacKay - 2002
These topics lie at the heart of many exciting areas of contemporary science and engineering - communication, signal processing, data mining, machine learning, pattern recognition, computational neuroscience, bioinformatics, and cryptography. This textbook introduces theory in tandem with applications. Information theory is taught alongside practical communication systems, such as arithmetic coding for data compression and sparse-graph codes for error-correction. A toolbox of inference techniques, including message-passing algorithms, Monte Carlo methods, and variational approximations, are developed alongside applications of these tools to clustering, convolutional codes, independent component analysis, and neural networks. The final part of the book describes the state of the art in error-correcting codes, including low-density parity-check codes, turbo codes, and digital fountain codes -- the twenty-first century standards for satellite communications, disk drives, and data broadcast. Richly illustrated, filled with worked examples and over 400 exercises, some with detailed solutions, David MacKay's groundbreaking book is ideal for self-learning and for undergraduate or graduate courses. Interludes on crosswords, evolution, and sex provide entertainment along the way. In sum, this is a textbook on information, communication, and coding for a new generation of students, and an unparalleled entry point into these subjects for professionals in areas as diverse as computational biology, financial engineering, and machine learning.
The Scheme Programming Language
R. Kent Dybvig - 1987
Many exercises are presented to help reinforce the lessons learned, and answers to the exercises are given in a new appendix.Most of the remaining chapters are dedicated to the reference material, which describes in detail the standard features of Scheme included in the Revised$^5$ Report on Scheme and the ANSI/IEEE standard for Scheme.Numerous examples are presented throughout the introductory and reference portions of the text, and a unique set of extended example programs and applications, with additional exercises, are presented in the final chapter. Reinforcing the book's utility as a reference text are appendices that present the formal syntax of Scheme, a summary of standard forms and procedures, and a bibliography of Scheme resources.The Scheme Programming Language stands alone as an introduction to and essential reference for Scheme programmers. it is also useful as a supplementary text for any course that uses Scheme.The Scheme Programming Language is illustrated by artist Jean-Pierre Hébert, who writes Scheme programs to extend his ability to create sophisticated works of digital art.R. Kent Dybvig is Professor of Computer Science at Indiana University and principal developer of Chez Scheme.
The Docker Book: Containerization is the new virtualization
James Turnbull - 2014
In this book, we'll will walk you through installing, deploying, managing, and extending Docker. We're going to do that by first introducing you to the basics of Docker and its components. Then we'll start to use Docker to build containers and services to perform a variety of tasks. We're going to take you through the development life cycle, from testing to production, and see where Docker fits in and how it can make your life easier. We'll make use of Docker to build test environments for new projects, demonstrate how to integrate Docker with continuous integration workflow, and then how to build application services and platforms. Finally, we'll show you how to use Docker's API and how to extend Docker yourself. We'll teach you how to: * Install Docker. * Take your first steps with a Docker container. * Build Docker images. * Manage and share Docker images. * Run and manage more complex Docker containers. * Deploy Docker containers as part of your testing pipeline. * Build multi-container applications and environments. * Explore the Docker API. * Getting Help and Extending Docker.
Software Architecture: Perspectives on an Emerging Discipline
Mary Shaw - 1996
But, although they use these patterns purposefully, they often use them informally and nearly unconsciously. This book organizes this substantial emerging "folklore" of system design -- with its rich language of system description -- and closes the gap between the useful abstractions (constructs and patterns) of system design and the current models, notations and tools. It identifies useful patterns clearly, gives examples, compares them, and evaluates their utility in various settings -- allowing readers to develop a repertoire of useful techniques that goes beyond the single-minded current fads. KEY TOPICS: Examines the ways in which architectural issues can impact software design; shows how to design new systems in principled ways using well-understood architectural paradigms; emphasizes informal descriptions, touching lightly on formal notations and specifications, and the tools that support them; explains how to understand and evaluate the design of existing software systems from an architectural perspective; and presents concrete examples of actual system architectures that can serve as models for new designs. MARKET: For professional software developers looking for new ideas about system organization.
The Hacker Playbook 3: Practical Guide To Penetration Testing
Peter Kim - 2018
With a combination of new strategies, attacks, exploits, tips and tricks, you will be able to put yourself in the center of the action toward victory. The main purpose of this book is to answer questions as to why things are still broken. For instance, with all the different security products, secure code reviews, defense in depth, and penetration testing requirements, how are we still seeing massive security breaches happening to major corporations and governments? The real question we need to ask ourselves is, are all the safeguards we are putting in place working? This is what The Hacker Playbook 3 - Red Team Edition is all about. By now, we are all familiar with penetration testing, but what exactly is a Red Team? Red Teams simulate real-world, advanced attacks to test how well your organization's defensive teams respond if you were breached. They find the answers to questions like: Do your incident response teams have the right tools, skill sets, and people to detect and mitigate these attacks? How long would it take them to perform these tasks and is it adequate? This is where you, as a Red Teamer, come in to accurately test and validate the overall security program. THP3 will take your offensive hacking skills, thought processes, and attack paths to the next level. This book focuses on real-world campaigns and attacks, exposing you to different initial entry points, exploitation, custom malware, persistence, and lateral movement--all without getting caught! This heavily lab-based book will include multiple Virtual Machines, testing environments, and custom THP tools. So grab your helmet and let's go break things! For more information, visit http://thehackerplaybook.com/about/.
Power Friending: Demystifying Social Media to Grow Your Business
Amber Mac - 2010
I think she's a leader in this space." -Tony Robbins, world-renowned speaker and entrepreneur Amber Mac wants to be your friend. She may be a tech-savvy webpreneur, the popular host of TV shows and video podcasts, and an in-demand consultant and speaker, but if you ask Amber Mac about her strategy for success, she'll tell you she's just trying to be a good friend. When it comes to social media-whether it's Facebook or Twitter or the latest video blog-the tools evolve quickly, the rules change rapidly, and the technology feels more and more complex. But making social media work for your company doesn't have to be complicated or expensive. In this compact yet thorough guide, Mac shows you how to effectively harness the online world to grow your business. The secret: think of your audience as your friends and then treat them that way. The Power Friending approach is all about developing real relationships based on mutual respect and support. While you may never meet some of your online friends face-to-face, they still expect you to follow the established norms of friendship: be authentic, reach out, listen. And don't lie to your friends. These same rules apply when building a strong brand online. Whether you're a blogger, a small company, a well-known global enterprise, or an aspiring queen of the Internet, Mac shows how to make the most of social networking tools, including: -Targeting the right networks -Feeding and seeding a community -Authentically engaging with customers and fans -Managing your online friendships on a daily basis and on a budget This isn't a book of abstract theories or complicated strategies. Mac writes from personal experience: she built a huge fan base through social networking. She also draws on real-life and up-to-date examples to give you the information you really need in order to establish and maintain credibility and meaningful relationships online.