SOA Design Patterns


Thomas Erl - 2008
    More than three years in development and subjected to numerous industry reviews, the 85 patterns in this full-color book provide the most successful and proven design techniques to overcoming the most common and critical problems to achieving modern-day SOA. Through numerous examples, individually documented pattern profiles, and over 400 color illustrations, this book provides in-depth coverage of:• Patterns for the design, implementation, and governance of service inventories–collections of services representing individual service portfolios that can be independently modeled, designed, and evolved.• Patterns specific to service-level architecture which pertain to a wide range of design areas, including contract design, security, legacy encapsulation, reliability, scalability, and a variety of implementation and governance issues.• Service composition patterns that address the many aspects associated with combining services into aggregate distributed solutions, including topics such as runtime messaging and message design, inter-service security controls, and transformation.• Compound patterns (such as Enterprise Service Bus and Orchestration) and recommended pattern application sequences that establish foundational processes. The book begins by establishing SOA types that are referenced throughout the patterns and then form the basis of a final chapter that discusses the architectural impact of service-oriented computing in general. These chapters bookend the pattern catalog to provide a clear link between SOA design patterns, the strategic goals of service-oriented computing, different SOA types, and the service-orientation design paradigm.This book series is further supported by a series of resources sites, including soabooks.com, soaspecs.com, soapatterns.org, soamag.com, and soaposters.com.

OAuth 2 in Action


Justin Richer - 2017
    You'll learn how to confidently and securely build and deploy OAuth on both the client and server sides. Foreword by Ian Glazer.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.About the TechnologyThink of OAuth 2 as the web version of a valet key. It is an HTTP-based security protocol that allows users of a service to enable applications to use that service on their behalf without handing over full control. And OAuth is used everywhere, from Facebook and Google, to startups and cloud services.About the BookOAuth 2 in Action teaches you practical use and deployment of OAuth 2 from the perspectives of a client, an authorization server, and a resource server. You'll begin with an overview of OAuth and its components and interactions. Next, you'll get hands-on and build an OAuth client, an authorization server, and a protected resource. Then you'll dig into tokens, dynamic client registration, and more advanced topics. By the end, you'll be able to confidently and securely build and deploy OAuth on both the client and server sides.What's InsideCovers OAuth 2 protocol and designAuthorization with OAuth 2OpenID Connect and User-Managed AccessImplementation risksJOSE, introspection, revocation, and registrationProtecting and accessing REST APIsAbout the ReaderReaders need basic programming skills and knowledge of HTTP and JSON.About the AuthorJustin Richer is a systems architect and software engineer. Antonio Sanso is a security software engineer and a security researcher. Both authors contribute to open standards and open source.Table of ContentsPart 1 - First stepsWhat is OAuth 2.0 and why should you care?The OAuth dance Part 2 - Building an OAuth 2 environmentBuilding a simple OAuth clientBuilding a simple OAuth protected resourceBuilding a simple OAuth authorization serverOAuth 2.0 in the real world Part 3 - OAuth 2 implementation and vulnerabilitiesCommon client vulnerabilitiesCommon protected resources vulnerabilitiesCommon authorization server vulnerabilitiesCommon OAuth token vulnerabilities Part 4 - Taking OAuth furtherOAuth tokensDynamic client registrationUser authentication with OAuth 2.0Protocols and profiles using OAuth 2.0Beyond bearer tokensSummary and conclusions

Code Complete


Steve McConnell - 1993
    Now this classic book has been fully updated and revised with leading-edge practices--and hundreds of new code samples--illustrating the art and science of software construction. Capturing the body of knowledge available from research, academia, and everyday commercial practice, McConnell synthesizes the most effective techniques and must-know principles into clear, pragmatic guidance. No matter what your experience level, development environment, or project size, this book will inform and stimulate your thinking--and help you build the highest quality code. Discover the timeless techniques and strategies that help you: Design for minimum complexity and maximum creativity Reap the benefits of collaborative development Apply defensive programming techniques to reduce and flush out errors Exploit opportunities to refactor--or evolve--code, and do it safely Use construction practices that are right-weight for your project Debug problems quickly and effectively Resolve critical construction issues early and correctly Build quality into the beginning, middle, and end of your project

Between the Lies


A.J. Wills - 2018
     But in a moment of panic he lost control. He ought to call 999 and confess his crime. But his girlfriend, Alice has other ideas. She wants him to get rid of the body. She says no one will ever find out. But when Alice vanishes without a trace, Jez finds his nightmare has only just begun. What was her connection to the mysterious stranger in the house? And where has she gone? As Jez begins to unravel Alice’s tangled web of lies, he discovers a past littered with dark secrets that threatens everything he holds dear. Between the Lies is a taut, psychological thriller that twists and turns through a gripping plot guaranteed to keep you awake at night. Remember: Somewhere between the lies, hides the truth. Perfect for fans of Gillian Flynn's Gone Girl, BA Paris and Clare Mackintosh.

The Psychology of Computer Programming


Gerald M. Weinberg - 1971
    Weinberg adds new insights and highlights the similarities and differences between now and then. Using a conversational style that invites the reader to join him, Weinberg reunites with some of his most insightful writings on the human side of software engineering.Topics include egoless programming, intelligence, psychological measurement, personality factors, motivation, training, social problems on large projects, problem-solving ability, programming language design, team formation, the programming environment, and much more.Dorset House Publishing is proud to make this important text available to new generations of programmers -- and to encourage readers of the first edition to return to its valuable lessons.

Practical Django Projects


James Bennett - 2008
    You'll work through the development of each project, implementing and running the applications while learning new features along the way.Web frameworks are playing a major role in the creation of today's most compelling web applications, because they automate many of the tedious tasks, allowing developers to instead focus on providing users with creative and powerful features. Python developers have been particularly fortunate in this area, having been able to take advantage of Django, a very popular open source web framework whose stated goal is to make it easier to build better web applications more quickly with less code.Practical Django Projects is the first book to introduce this popular framework by way of a series of realworld projects. What you'll learn Capitalize upon Django's welldefined framework architecture to build web applications faster than ever before Learn by doing by working through the creation of three realworld projects, including a content management system, blog, and social networking site Build userfriendly web sites with wellstructured URLs, session tracking, and syndication options Let Django handle tedious tasks such as database interaction while you focus on building compelling applications Who this book is forWeb developers seeking to use the powerful Django framework to build powerful web sites. "

Parked


Anna Land - 2014
    Left alone with Jubalee, her cold, resentful grandmother, Teenie takes what comfort she can from others, freely giving back what little she has to offer on her way to discover sometimes it’s not blood that makes us family—it’s love.Parked is the griping, unforgettable story of a young girl whose path in life is lonely and heartbreaking but also strengthened with humor, hope, irreplaceable characters and tender moments of true happiness.

Mastering Blockchain: Distributed Ledgers, Decentralization and Smart Contracts Explained


Imran Bashir - 2017
    Get to grips with the underlying technical principles and implementations of blockchainBuild powerful applications using Ethereum to secure transactions and create smart contractsExplore cryptography, mine cryptocurrencies, and solve scalability issues with this comprehensive guide

From Word to Kindle: Self Publishing Your Kindle Book with Microsoft Word, or Tips on Formatting Your Document So Your Ebook Won't Look Terrible


Aaron Shepard - 2011
    It's not hard to find instructions for converting from Word to Kindle -- but these instructions are usually less helpful than they could be. Many, for example, proclaim that Word's HTML output requires extensive alteration and cleanup before submission. This advice is misguided. Some who offer it have drawn their conclusions after simply choosing the wrong export option. Others fuss about a moderate amount of excess code, not realizing that it doesn't increase file size enough to matter or that the Kindle ignores it anyway. Other instructions will imply the opposite: that conversion is straightforward and just what you would expect. Supposedly, as long as you start with a properly formatted Word document, you'll wind up with a well-formatted ebook. Well, it doesn't really work that way -- not without a few techniques for tricking or bullying the Kindle into doing what you want. In this book, Aaron Shepard offers his own tips for moving your document from Word to Kindle, with a focus on desktop Word versions from 2003/2004 to 2010/2011. ///////////////////////////////////////////////// Aaron Shepard is a foremost proponent of the new business of profitable self publishing, which he has practiced and helped develop since 1998. He is the author of -Aiming at Amazon, - -POD for Profit, - and -Perfect Pages, - as well as two other books on Kindle formatting. ///////////////////////////////////////////////// CONTENTS Getting Started 1 FIRST STEPS Working with Word Document Setup Text Cleanup 2 KINDLE FORMATTING Special Characters Font Formatting Paragraph Styles Paragraph Spacing Paragraph Justification Line Breaking Page Layout 3 SPECIAL ELEMENTS Other Paragraphs Lists Tables Text Boxes and Sidebars Footnotes and Endnotes Pictures 4 NAVIGATION Web Links Internal Links Tables of Contents Menu Items 5 FINAL STEPS HTML Export Book Covers Book Data Submitting and Previewing ///////////////////////////////////////////////// SAMPLE By default, Word will apply the Normal style to your paragraphs. Amazon knows this, so for some Kindles, it hijacks that style, changing its formatting to what Amazon prefers. This can lead, for example, to unwanted space above or below a paragraph. If you want control of your own formatting, then, you'll have to avoid the Normal style and apply something different. There's no problem, though, with applying styles based on Normal, or even with applying a duplicate of Normal under a completely different name. In regard to this, watch out for manual page breaks in recent versions of Word. Unless you're in Compatibility Mode, each break is now placed in a paragraph of its own, and the Normal style is assigned automatically. That in itself isn't a problem -- but if you then hit Return and start typing, your new paragraph will be in Normal as well. (This is another reason to stick to the paragraph format setting -Page break before- to start a new page.) You can change all paragraphs already in Normal style to a different one by using the Format menu in the Find and Replace dialog. Don't enter any text, but place your cursor in first the Find box and then the Replace while choosing a style for each.

Booked: The digital marketing and social media appointment setting system for anyone looking for a steady stream of leads, appointments, and new clients.


Josh Turner - 2016
    But using traditional methods can be expensive and time-consuming. You don’t have the luxury of spending thousands or taking the next couple years to position yourself as a market leader. You need it now. Booked is a 5-step process that helps you quickly position yourself as an expert in your industry, directly connect you with an unlimited supply of prospects, and work them through processes that will generate a predictable number of leads and appointments. When you have that predictable number of appointments, you’ll have a predictable stream of new clients. While the system does leverage LinkedIn, Facebook, and email, it is not about the platform. It’s about the process. No matter where your clients can be found, the process can work for you.

Google Hacking for Penetration Testers, Volume 1


Johnny Long - 2004
    What many users don't realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hacker's search. Penetration Testing with Google Hacks explores the explosive growth of a technique known as "Google Hacking." When the modern security landscape includes such heady topics as "blind SQL injection" and "integer overflows," it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target Borrowing the techniques pioneered by malicious "Google hackers," this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of informationleakage. *First book about Google targeting IT professionals and security leaks through web browsing. *Author Johnny Long, the authority on Google hacking, will be speaking about "Google Hacking" at the Black Hat 2004 Briefing. His presentation on penetrating security flaws with Google is expected to create a lot of buzz and exposure for the topic. *Johnny Long's Web site hosts the largest repository of Google security exposures and is the most popular destination for security professionals who want to learn about the dark side of Google.

Concurrent Programming in Java(tm): Design Principles and Pattern


Doug Lea - 1996
    Thread programming enables developers to design applications that are more responsive to user demands, faster, and more easily controlled. This book offers comprehensive coverage of this vital aspect of the Java language. The book is completely up-to-date with the new thread model that is now incorporated into the most recent version of the Java Virtual Machine. All Java programmers interested in doing concurrent programming must understand these new concepts. The book approaches the topic from a design pattern point of view. It introduces and summarizes Java's concurrency support, shows readers how to initiate, control, and coordinate concurrent activities, and offers numerous recipe-like techniques for designing and implementing Java structures that solve common concurrent programming challenges. Specifically, the book presents important strategies for avoiding the inconsistencies that can crop up in multi-threaded programs, addresses the concept of liveness-how to ensure that all threads in use are kept active simultaneously, examines state-dependent action, and demonstrates effective methods for handling user requests in a multi-threaded environment.

An Introduction to Enterprise Architecture


Scott A. Bernard - 2005
    I wrote this book for three major reasons: (1) to help move business and technology planning from a systems and process-level view to a more strategy-driven enterprise-level view, (2) to promote and explain the emerging profession of EA, and (3) to provide the first textbook on the subject of EA, which is suitable for graduate and undergraduate levels of study. To date, other books on EA have been practitioner books not specifically oriented toward a student who may be learning the subject with little to no previous exposure. Therefore, this book contains references to related academic research and industry best practices, as well as my own observations about potential future practices and the direction of this emerging profession.

Return to Dungeon (Kobold's Quest #1)


M.J. Kaltenbrunner - 2018
     Kek has spent his life being treated like a dog, but he's only dog-like in appearance. You see, he's a kobold who originally came from a dungeon. And he's spent most of his life enslaved to a gang of exiled mercenaries hiding out in a deadly jungle. When Kek gains the power to see the hidden mechanics of reality and learns to "game" them to expand his skills and find hidden meanings, he is soon entrusted with a noble quest. He must return to the dungeon where he came from and rescue his people from servitude to the dungeon lord! Faced with untold dangers, Kek is going to need allies—such as a sweet muck fairy with a killer streak, a deadly-beautiful siren who fights best au natural, and a sensual cat woman with lightning quick moves. They are sure going to keep this lone kobold on his toes. Throughout this quest, Kek will learn the hard way that one of the greatest opponents a hero confronts is his own self-doubt. This is a LitRPG with a twist. There is no VR. The fantasy world is real. The game mechanics are part of a unique magical power that only the lucky few obtain. If you're not into this sort of thing, maybe it's time you give it a go. There's also a fun and adventure-packed story that will keep any fantasy reader engrossed right up until the end. Book two in the series is planned for launch early 2018!

Modern Technical Writing: An Introduction to Software Documentation


Andrew Etter - 2016
    Written by the lead technical writer at one of Silicon Valley's most exciting companies, Modern Technical Writing is a set of guiding principles and thoughtful recommendations for new and experienced technical writers alike. Not a reference manual, and not comprehensive, it instead serves as an introduction to a sensible writing and publishing process, one that has eluded the profession for too long.