The Tao of Network Security Monitoring: Beyond Intrusion Detection


Richard Bejtlich - 2004
    This book reducesthe investigative workload of computer security incident response teams(CSIRT) by posturing organizations for incident response success.Firewalls can fail. Intrusion-detection systems can be bypassed. Networkmonitors can be overloaded. These are the alarming but true facts aboutnetwork security. In fact, too often, security administrators' tools can serve asgateways into the very networks they are defending.Now, a novel approach to network monitoring seeks to overcome theselimitations by providing dynamic information about the vulnerability of allparts of a network. Called network security monitoring (NSM), it draws on acombination of auditing, vulnerability assessment, intrusion detection andprevention, and incident response for the most comprehensive approach tonetwork security yet. By focusing on case studies and the application of opensourcetools, the author helps readers gain hands-on knowledge of how tobetter defend networks and how to mitigate damage from security incidents.

MongoDB Applied Design Patterns


Rick Copeland - 2013
    You’ll learn how to apply MongoDB design patterns to several challenging domains, such as ecommerce, content management, and online gaming. Using Python and JavaScript code examples, you’ll discover how MongoDB lets you scale your data model while simplifying the development process.Many businesses launch NoSQL databases without understanding the techniques for using their features most effectively. This book demonstrates the benefits of document embedding, polymorphic schemas, and other MongoDB patterns for tackling specific big data use cases, including:Operational intelligence: Perform real-time analytics of business dataEcommerce: Use MongoDB as a product catalog master or inventory management systemContent management: Learn methods for storing content nodes, binary assets, and discussionsOnline advertising networks: Apply techniques for frequency capping ad impressions, and keyword targeting and biddingSocial networking: Learn how to store a complex social graph, modeled after Google+Online gaming: Provide concurrent access to character and world data for a multiplayer role-playing game

Beneath a Surface


Brad Sams - 2018
    The company was forced to write-down $900 million in inventory and Surface’s future was in jeopardy.Beneath A Surface tells the inside story of how Microsoft turned its hardware dreams into a reality with new details about the challenges Panos and his team had to overcome as well as the internal politics that nearly killed the brand.For fans of Microsoft and those who are interested in the business of building brands, Beneath A Surface is a must read that tells the inside story of how Microsoft turned a failure into a fortune.

Higher-Order Perl: Transforming Programs with Programs


Mark Jason Dominus - 2005
    However, Perl incorporates many features that have their roots in other languages such as Lisp. These advanced features are not well understood and are rarely used by most Perl programmers, but they are very powerful. They can automate tasks in everyday programming that are difficult to solve in any other way. One of the most powerful of these techniques is writing functions that manufacture or modify other functions. For example, instead of writing ten similar functions, a programmer can write a general pattern or framework that can then create the functions as needed according to the pattern. For several years Mark Jason Dominus has worked to apply functional programming techniques to Perl. Now Mark brings these flexible programming methods that he has successfully taught in numerous tutorials and training sessions to a wider audience.• Introduces powerful programming methods—new to most Perl programmers—that were previously the domain of computer scientists• Gradually builds up confidence by describing techniques of progressive sophistication• Shows how to improve everyday programs and includes numerous engaging code examples to illustrate the methods

Practical Object Oriented Design in Ruby


Sandi Metz - 2012
    The Web is awash in Ruby code that is now virtually impossible to change or extend. This text helps you solve that problem by using powerful real-world object-oriented design techniques, which it thoroughly explains using simple and practical Ruby examples. Sandi Metz has distilled a lifetime of conversations and presentations about object-oriented design into a set of Ruby-focused practices for crafting manageable, extensible, and pleasing code. She shows you how to build new applications that can survive success and repair existing applications that have become impossible to change. Each technique is illustrated with extended examples, all downloadable from the companion Web site, poodr.info. The first title to focus squarely on object-oriented Ruby application design, Practical Object-Oriented Design in Ruby will guide you to superior outcomes, whatever your previous Ruby experience. Novice Ruby programmers will find specific rules to live by; intermediate Ruby programmers will find valuable principles they can flexibly interpret and apply; and advanced Ruby programmers will find a common language they can use to lead development and guide their colleagues. This guide will help you Understand how object-oriented programming can help you craft Ruby code that is easier to maintain and upgrade Decide what belongs in a single Ruby class Avoid entangling objects that should be kept separate Define flexible interfaces among objects Reduce programming overhead costs with duck typing Successfully apply inheritance Build objects via composition Design cost-effective tests Solve common problems associated with poorly designed Ruby code

Agile Data Warehouse Design: Collaborative Dimensional Modeling, from Whiteboard to Star Schema


Lawrence Corr - 2011
    This book describes BEAM✲, an agile approach to dimensional modeling, for improving communication between data warehouse designers, BI stakeholders and the whole DW/BI development team. BEAM✲ provides tools and techniques that will encourage DW/BI designers and developers to move away from their keyboards and entity relationship based tools and model interactively with their colleagues. The result is everyone thinks dimensionally from the outset! Developers understand how to efficiently implement dimensional modeling solutions. Business stakeholders feel ownership of the data warehouse they have created, and can already imagine how they will use it to answer their business questions. Within this book, you will learn: ✲ Agile dimensional modeling using Business Event Analysis & Modeling (BEAM✲) ✲ Modelstorming: data modeling that is quicker, more inclusive, more productive, and frankly more fun! ✲ Telling dimensional data stories using the 7Ws (who, what, when, where, how many, why and how) ✲ Modeling by example not abstraction; using data story themes, not crow's feet, to describe detail ✲ Storyboarding the data warehouse to discover conformed dimensions and plan iterative development ✲ Visual modeling: sketching timelines, charts and grids to model complex process measurement - simply ✲ Agile design documentation: enhancing star schemas with BEAM✲ dimensional shorthand notation ✲ Solving difficult DW/BI performance and usability problems with proven dimensional design patterns Lawrence Corr is a data warehouse designer and educator. As Principal of DecisionOne Consulting, he helps clients to review and simplify their data warehouse designs, and advises vendors on visual data modeling techniques. He regularly teaches agile dimensional modeling courses worldwide and has taught dimensional DW/BI skills to thousands of students. Jim Stagnitto is a data warehouse and master data management architect specializing in the healthcare, financial services, and information service industries. He is the founder of the data warehousing and data mining consulting firm Llumino.

802.11 Wireless Networks: The Definitive Guide


Matthew S. Gast - 2002
    Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain.The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware available everywhere you turn, the choice seems simple, and many people dive into wireless computing with less thought and planning than they'd give to a wired network. But it's wise to be familiar with both the capabilities and risks associated with the 802.11 protocols. And 802.11 Wireless Networks: The Definitive Guide, 2nd Edition is the perfect place to start.This updated edition covers everything you'll ever need to know about wireless technology. Designed with the system administrator or serious home user in mind, it's a no-nonsense guide for setting up 802.11 on Windows and Linux. Among the wide range of topics covered are discussions on:deployment considerationsnetwork monitoring and performance tuningwireless security issueshow to use and select access pointsnetwork monitoring essentialswireless card configurationsecurity issues unique to wireless networksWith wireless technology, the advantages to its users are indeed plentiful. Companies no longer have to deal with the hassle and expense of wiring buildings, and households with several computers can avoid fights over who's online. And now, with 802.11 Wireless Networks: The Definitive Guide, 2nd Edition, you can integrate wireless technology into your current infrastructure with the utmost confidence.

Hacking Linux Exposed: Linux Security Secrets & Solutions


Brian Hatch - 2001
    Hacking Exposed Linux provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks.Secure Linux by using attacks and countermeasures from the latest OSSTMM researchFollow attack techniques of PSTN, ISDN, and PSDN over LinuxHarden VoIP, Bluetooth, RF, RFID, and IR devices on LinuxBlock Linux signal jamming, cloning, and eavesdropping attacksApply Trusted Computing and cryptography tools for your best defenseFix vulnerabilities in DNS, SMTP, and Web 2.0 servicesPrevent SPAM, Trojan, phishing, DoS, and DDoS exploitsFind and repair errors in C code with static analysis and Hoare Logic

Build APIs You Won't Hate


Phil Sturgeon - 2013
    Everyone and their dog wants an API, so you should probably learn how to build them.Tasked with building an API for your company but don't have a clue where to start? Taken over an existing API and hate it? Built your own API and still hate it? This book is for you.

Fintech in a Flash: Financial Technology Made Easy


Agustin Rubini - 2017
    There are more than 5000 fintech startups operating, and 50 of them have already reached a billion-dollar valuation. The scope of this market goes way beyond online payments. Financial technology promises to change the way we manage our money online, disrupting the landscape of the financial services industry is being disrupted. Understanding its many facets is the key to navigating the complex nuances of this global industry.Fintech in a Flash is your comprehensive guide to the future of banking and insurance. The book aims to break down the key concepts in a way that will help you understand every aspect so that you can take advantage of new technologies. Inside you’ll find an array of hot topics such as online payments, crowdfunding, challenger banks, online insurance, digital lending, big data, and digital commerce. It will make you rethink the way that you manage your money online, and even find new ways of making online payments. Comprehensive, organized, and detailed, this guide is your go-to source for everything you need to confidently navigate the ever-changing scene of this booming industry.If you decide to buy this book now, you'll get: Easy to understand explanations of the 14 main areas of fintech The author's view on the future of each of these areas Insight into the main fintech hubs in the world Insight into the so called Unicorns, the fintech firms that have made it past a $1 billion valuation More than 100 upcoming fintech companies to watch About the Author: Agustín Rubini is an argentinean-born economist, master in international business, and Director at Banking Innovations. Passionate about building the future of financial services, Agustín spends much of his time speaking and writing on financial technology and advising businesses on innovation and digital transformation. He is a specialist in driving changes in top class banks that want to lead in how customers manage their money online. Tags: fintech, financial technology, financial services technology, money online, online payment, online insurance, insurtech, investing online, wealth management online, wealthtech, regtech, cybercrime, digital lending, digital commerce, ecommerce, e-commerce. Get started immediately Download now and take the first step on your very own road to mastering fintech. Scroll to the top of the page and hit the buy button.

Linux Administration Handbook


Evi Nemeth - 2006
    Several things make this one stand out. Here's the most important: Linux Administration Handbook is designed for administrators working in industrial-strength production environments. It never glosses over the "subtleties" that can get you in big trouble. It doesn't stint on technical detail. It's never satisfied with restating the man pages. And it's full of war stories from folks who've been there. Evi Nemeth and her coauthors: Boy, have they ever been there. (Just ask any gray-bearded Unix sysadmin about their earlier, legendary Unix System Administration Handbook.) There's only been one downside to Linux Administration Handbook: It's been nearly five years since it was written. Well, that flaw's just been remedied. The new Second Edition has been systematically revised for the latest administration tools (think Nagios and LVM). It's carefully targeted at today's five most widely used distributions: Red Hat Enterprise Linux 4.3, Fedora Core 5, SUSE Linux 10.2, Debian 3.2 "Etch," and Ubuntu 6.06. The result: a book you can rely on for the next five years. Rely on to do what? Just about everything. You'll find chapters on booting and shutting down; "rootly" powers; controlling processes; the Linux filesystem; on adding new users. You'll learn the most efficient ways to perform backups. How to make sense of syslogs and log files. Everything you need to know about drivers, the kernel, networking, NFS -- and Internet services, from web hosting to email. Nemeth & Company bring their experience to bear on troubleshooting, performance optimization, print management, security, Windows interoperability, even "policies and politics." Whatever Linux books you already own, if you depend on Linux to run efficiently and reliably, you need this one, too. Bill Camarda, from the December 2006 href="http://www.barnesandnoble.com/newslet... Only

The Adobe Photoshop Lightroom 3 Book for Digital Photographers


Scott Kelby - 2010
    In this latest version for Lightroom 3, Scott uses his same step-by-step, plain-English style and layout to make learning Lightroom easy and fun. Scott doesn't just show you which sliders do what. Instead, by using the following three simple, yet brilliant, techniques that make it just an incredible learning tool, this book shows you how to create your own photography workflow using Lightroom:1) Scott shares his own personal settings and studio-tested techniques. He trains thousands of Lightroom users at his "Lightroom Live!" tour and knows first hand what really works and what doesn't.2) The entire book is laid out in a real workflow order with everything step by step, so you can begin using Lightroom like a pro from the start.3) What really sets this book apart are the last two chapters. This is where Scott dramatically answers his #1 most-asked Lightroom question, which is: "Exactly what order am I supposed to do things in, and where does Photoshop fit in?" Plus, this is the first version of the book that includes his famous "7-Point System for Lightroom," which lets you focus on mastering just the seven most important editing techniques.The Adobe Photoshop Lightroom 3 Book for Digital Photographers is the first and only book to bring the whole process together in such a clear, concise, and visual way.

Data Structures: A Pseudocode Approach with C


Richard F. Gilberg - 1998
    A new four-part organizational structure increases the flexibility of the text, and all material is presented in a straightforward manner accompanied by an array of examples and visual diagrams.

Fuzzy Logic: The Revolutionary Computer Technology That Is Changing Our World


Daniel McNeill - 1993
    Professor Lofti Zadeh masterminded "fuzzy logic"--a way of programming computers to "make decisions" bases on imprecise data and complex situations. In "Fuzzy Logic," Daniel McNeill and Paul Freiberger relate the compelling tale of this remarkable new technology, the genius who brought it to life, and how it will soon affect the lives of every one of us.

Catia V5 R17 For Designers


Sham Tickoo - 2005
    The textbook covers all-important workbenches of CATIA V5R17 with a thorough explanation of all commands, options, and their applications to create real-world products. About 55 mechanical engineering industry examples are used as tutorials and an additional 35 as exercises to ensure that the user can relate their knowledge and understand the design techniques used in the industry to design a product. After reading the textbook, the user will be able to create solid parts, assemblies, drawing views with bill of materials, surface models, and Sheet metal components. Also, the user will learn the editing techniques that are essential to make a successful design. In this book, the author emphasizes on the solid modeling techniques that improve the productivity and efficiency of the user. Salient Features of the Textbook Consists of 15 chapters that are organized in a pedagogical sequence. These chapters cover the Sketching, Modeling, Assembly, Drafting, Wireframe and Surface Design, and Generative Sheetmetal workbenches of CATIA V5R17. The first page of every chapter summarizes the topics that will be covered in it. Additional information is provided throughout the book in the form of tips and notes. Self-evaluation test and review questions are provided at the end of each chapter so that the users can assess their knowledge.Free Teaching and Learning Resources Online technical support by contacting techsupport@cadcim.com. All programs used in exercises and examples. Customizable PowerPoint presentations of all chapters in the textbook li>Instructor s Guide with solutions to all review questions and exercises in the textbook. Student projects to enhance the skills Class tests that can be used by faculty in the class To access these free teaching resources, please send your contact information to sales@cadcim.com, mentioning clearly your name, designation, university/college, street street address, city, state, zip, and country.