Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Boston : Addison-Wesley  (36)
  • Boston, MA : Safari
  • Indianapolis, Indiana : Cisco Press
  • Application software ; Development  (37)
  • Computer networks ; Security measures  (24)
Datasource
Material
Language
Subjects(RVK)
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (61 pages)
    Edition: 1st edition
    DDC: 005.3
    Keywords: Application software Study guides Development ; Virtual computer systems Study guides ; Open source software ; Computer programmers Certification ; Electronic books ; local ; Electronic books ; Computer programmers ; Certification ; Open source software ; Virtual computer systems ; Application software ; Development ; Study guides
    Abstract: The ability to administer and monitor a Kubernetes cluster is in high demand today. To meet this need, the Cloud Native Computing Foundation developed a certification exam to establish a system administrator's credibility and value in the job market to confidently work in a Kubernetes environment. The Certified Kubernetes Administrator (CKA) certification exam is different from the typical multiple-choice format of other professional certifications. Instead, the CKA is a performance-based exam that requires deep knowledge of the tasks under immense time pressure. This study guide walks you through all the topics covered to fully prepare you for the exam. Author Benjamin Muschko also shares his personal experience with preparing for all aspects of the exam. Learn when and how to apply Kubernetes concepts to administrate a production-grade cluster Understand the objectives, abilities, and tips and tricks needed to pass the CKA exam Explore the ins and outs of the kubectl command-line tool Demonstrate competency to perform the responsibilities of a Kubernetes system administrator Solve real-world Kubernetes problems in a hands-on command-line environment Effectively navigate and solve questions during the CKA exam
    Note: Online resource; Title from title page (viewed November 25, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    ISBN: 9781098112448 , 109811244X
    Language: English
    Pages: 1 online resource (70 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als
    DDC: 006.7/6
    Keywords: Application software Development ; Quantum computing ; Electronic books ; local ; Electronic books ; Quantum computing ; Application software ; Development
    Abstract: Why is the quantum computing market expected to grow by nearly $1.3 billion over the next five years? Given their quantum mechanical nature, quantum computers can solve difficult problems in fields such as chemistry, optimization, finance, and machine learning that classical computers find impossible to unravel. This pocket guide provides software developers with a quick reference to Qiskit, an open source SDK for working with quantum computers. Packed with helpful programming examples, tables, figures, and lists, this handy book helps you find the information you need to develop and debug quantum programs. Whether you're focused on business, engineering, or scientific applications, you'll learn how to choose and apply the appropriate Qiskit classes, methods, and functions. You'll also learn how to use the latest version of the Open Quantum Assembly Language, OpenQASM 3.0.
    Note: Online resource; Title from title page (viewed November 25, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Language: English
    Pages: 1 online resource (544 pages)
    Edition: Third edition.
    DDC: 005.8
    Keywords: Computer networks Security measures ; Computer networks ; Security measures ; Electronic books
    Abstract: The classic guide to cryptography and network security -- now fully updated! "Alice and Bob are back!" Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important. This book explains sophisticated concepts in a friendly and intuitive manner. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the field's jargon. Network Security, Third Edition will appeal to a wide range of professionals, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level. Coverage includes * Network security protocol and cryptography basics * Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3) * First-generation public key algorithms (RSA, Diffie-Hellman, ECC) * How quantum computers work, and why they threaten the first-generation public key algorithms * Quantum computers: how they work, and why they threaten the first-generation public key algorithms * Multi-factor authentication of people * Real-time communication (SSL/TLS, SSH, IPsec) * New applications (electronic money, blockchains) * New cryptographic techniques (homomorphic encryption, secure multiparty computation).
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    ISBN: 9781098116279 , 1098116275 , 9781098116255 , 1098116259
    Language: English
    Pages: 1 online resource (24 pages)
    Edition: 3rd edition
    Parallel Title: Erscheint auch als
    DDC: 658.575
    Keywords: User-centered system design ; Human-computer interaction ; Application software Development ; Electronic books ; local ; Electronic books ; Conception participative (Conception de systèmes) ; Logiciels d'application ; Développement ; Application software ; Development ; Human-computer interaction ; User-centered system design
    Abstract: Lean UX is synonymous with modern product design and development. Designers, product managers, developers, and Scrum Masters around the world are combining human-centric design, Agile ways of working, and a strong business sense, making Lean UX the leading approach for digital product teams today. Inspired by Lean and Agile methods, this book helps you focus on the actual product experience rather than deliverables. Lean UX shows teams how to collaborate, gather feedback early and often, and focus on learning and user feedback. You'll be able to drive the design in short, iterative cycles to assess what works best for businesses and users. Lean UX guides you through this change--for the better. Facilitate the Lean UX process with your team Ensure every project starts with clear customer-centric success criteria Understand the role of the designer on a Scrum team Write and contribute design and experiment stories to the backlog Ensure design work takes place in every sprint Build product discovery into the team’s "velocity" Make sure the team is designing and building products that customers love
    Note: Online resource; Title from title page (viewed October 25, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Take Control Books | Boston, MA : Safari
    ISBN: 9781947282445
    Language: English
    Pages: 1 online resource (229 pages)
    Edition: 1st edition
    Keywords: Mac OS ; Application software Development ; Electronic books ; local ; Electronic books ; Mac OS ; Logiciels d'application ; Développement ; Application software ; Development
    Abstract: In macOS 10.15 Catalina, Apple finally did away with iTunes. In its place are three new apps-Music, TV, and Podcasts-with audiobooks now handled by the Books app and syncing of mobile devices handled by the Finder. Where once iTunes was an all-purpose media hub, now you may use up to five apps to accomplish the same things. The new apps also add more features (while, sadly, removing a few things too). Take Control of macOS Media Apps is your guide to this new, post-iTunes world. Kirk McElhearn, whose earlier books on iTunes 10, 11, and 12 collectively sold nearly 14,000 copies, is back with a new book that shows you how to manage your music, videos, podcasts, and audiobooks in Catalina. Whether you just want to play your media, or you want to go deeper with special features like Genius, Shuffle, Up Next, Apple Music, and iTunes Match, this comprehensive guide has the answers you need. Kirk also looks at various ways of bringing audio and video into Apple's media apps, tagging songs and videos so you can find them more easily later, creating playlists, sharing your library over a home network, and syncing media with your iPhone, iPad, or iPod. The book covers how to: Play Music: Learn the basics of playing audio (and even music videos) in the Music app. You'll also find tips on making quick playlists with Genius and Up Next, learn the best ways to search for the music you want to hear, stream music to other devices in your home, and view lyrics while tunes play. Stream Music: Use Apple Music, a paid service, to listen to any of 50 million tracks. Or listen to live broadcasts from Apple Music Radio (including Beats 1). View Your Music and Other Content: Learn how to use the sidebar, view your music library, and work with contextual menus in the Music app. Store Your Music Library in the Cloud: What are the pros and cons of Apple's Cloud Music Library? How do Music and iTunes Match figure out whether to upload your music when setting up your Cloud Music Library? You'll get answers to these questions and more. Use the iTunes Store: iTunes may be gone, but the iTunes Store is still open for business! Find tips on shopping in the iTunes Store, and get advice on sharing your purchases with family members and among your various Apple devices. Tag Your Music: Tags are bits of information (also known as "metadata") that can describe your media. Learn which tags to bother changing, the best ways to add lyrics and album art, how to rate songs with stars, ...
    Note: Online resource; Title from title page (viewed January 21, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781839214486 , 1839214481 , 9781839216992
    Language: English
    Pages: 1 online resource (330 pages)
    Edition: 1st edition
    DDC: 658.478
    Keywords: Cyberterrorism ; Business enterprises Computer networks ; Security measures ; Computer security ; Electronic books ; local ; Cyberterrorisme ; Sécurité informatique ; Cyberterrorism ; Computer security ; Business enterprises ; Computer networks ; Security measures ; Computer networks ; Security measures
    Abstract: Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat. Key Features Define and determine a cyber-defence strategy based on current and past real-life examples Understand how future technologies will impact cyber warfare campaigns and society Future-ready yourself and your business against any cyber threat Book Description The era of cyber warfare is now upon us. What we do now and how we determine what we will do in the future is the difference between whether our businesses live or die and whether our digital self survives the digital battlefield. Cyber Warfare - Truth, Tactics, and Strategies takes you on a journey through the myriad of cyber attacks and threats that are present in a world powered by AI, big data, autonomous vehicles, drones video, and social media. Dr. Chase Cunningham uses his military background to provide you with a unique perspective on cyber security and warfare. Moving away from a reactive stance to one that is forward-looking, he aims to prepare people and organizations to better defend themselves in a world where there are no borders or perimeters. He demonstrates how the cyber landscape is growing infinitely more complex and is continuously evolving at the speed of light. The book not only covers cyber warfare, but it also looks at the political, cultural, and geographical influences that pertain to these attack methods and helps you understand the motivation and impacts that are likely in each scenario. Cyber Warfare - Truth, Tactics, and Strategies is as real-life and up-to-date as cyber can possibly be, with examples of actual attacks and defense techniques, tools. and strategies presented for you to learn how to think about defending your own systems and data. What you will learn Hacking at scale - how machine learning (ML) and artificial intelligence (AI) skew the battlefield Defending a boundaryless enterprise Using video and audio as weapons of influence Uncovering DeepFakes and their associated attack vectors Using voice augmentation for exploitation Defending when there is no perimeter Responding tactically to counter-campaign-based attacks Who this book is for This book is for any engineer, leader, or professional with either a responsibility for cyber security within their organizations, or an interest in working in this ever-growing field.
    Note: Online resource; Title from title page (viewed February 25, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 1789534836 , 9781789534832 , 9781789530889
    Language: English
    Pages: 1 online resource (392 pages)
    Edition: 1st edition
    DDC: 005.13/3
    Keywords: iOS (Electronic resource) ; Swift (Computer program language) ; Application software Development ; Mobile apps ; Web applications ; Electronic books ; local ; iOS (Electronic resource) ; Swift (Langage de programmation) ; Logiciels d'application ; Développement ; Applications mobiles ; Applications Web ; Biology, life sciences ; Computer hardware ; Consumer advice ; Information technology: general issues ; Computers ; Buyer's Guides ; Computers ; Bioinformatics ; Computers ; General ; Application software ; Development ; Mobile apps ; Swift (Computer program language) ; Web applications
    Abstract: Learn to design and deploy fully functioning microservices for your applications from scratch using Swift, Docker, and AWS Key Features Understand server-side Swift development concepts for building your first microservice Build microservices using Vapor 4 and deploy them to the cloud using Docker Learn effective techniques for enhancing maintainability and stability of your Swift applications Book Description The capabilities of the Swift programming language are extended to server-side development using popular frameworks such as Vapor. This enables Swift programmers to implement the microservices approach to design scalable and easy-to-maintain architecture for iOS, macOS, iPadOS, and watchOS applications. This book is a complete guide to building microservices for iOS applications. You'll start by examining Swift and Vapor as backend technologies and compare them to their alternatives. The book then covers the concept of microservices to help you get started with developing your first microservice. Throughout this book, you'll work on a case study of writing an e-commerce backend as a microservice application. You'll understand each microservice as it is broken down into details and written out as code throughout the book. You'll also become familiar with various aspects of server-side development such as scalability, database options, and information flow for microservices that are unwrapped in the process. As you advance, you'll get to grips with microservices testing and see how it is different from testing a monolith application. Along the way, you'll explore tools such as Docker, Postman, and Amazon Web Services. By the end of the book, you'll be able to build a ready-to-deploy application that can be used as a base for future applications. What you will learn Grasp server-side Swift development concepts using practical examples Understand the microservices approach and why Swift is a great choice for building microservices Design and structure mobile and web applications using microservices architecture Discover the available database options and understand which one to choose Scale and monitor your microservices Use Postman to automate testing for your microservices API Who this book is for The book is for iOS, iPadOS, and macOS developers and Swift programmers who want to understand how Swift can be used for building microservices. The book assumes familiarity with Swift programming and the fundamentals of the web, including how AP...
    Note: Online resource; Title from title page (viewed March 2, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    ISBN: 9780135581360 , 0135581362
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Blockchains (Databases) ; Application software ; Development ; Business enterprises ; Technological innovations ; Data encryption (Computer science) ; Electronic funds transfers ; Electronic commerce ; Electronic books ; Electronic books ; local
    Abstract: The Pragmatic Guide to Driving Value and Disrupting Markets with Blockchain "Much has been written about blockchain in the past few years: what it is and what it is not (at various levels of detail), as well as the technology's long-term strategic value for companies, industries, and economies. However, what we've been missing is a practical, operational, 'how to' set of steps for creating, implementing, and operating a blockchain-based solution. This book aims to fill that gap. It's an invaluable tool for anyone ready to take the plunge and start taking advantage of this remarkable technology.' -Irving Wladawsky-Berger, research affiliate, MIT; columnist, WSJ CIO Journal; VP Emeritus, IBM Blockchain enables enterprises to reinvent processes and business models and to pursue radically disruptive applications. Blockchain for Business is a concise, accessible, and pragmatic guide to both the technology and the opportunities it creates. Authored by three experts from IBM's Enterprise Blockchain practice, it introduces industry-specific and cross-industry use cases, and reviews best-practice approaches to planning and delivering blockchain projects. With a relentless focus on real-world business outcomes, the authors reveal what blockchain can do, what it can't do yet, and where it's headed. Understand five elements that make blockchain so disruptive: transparency, immutability, security, consensus, and smart contracts Explore key use cases: cross-border payments, food and drug safety, provenance, trade finance, clinical trials, land registries, and more See how trusted blockchain networks are facilitating entirely new business models Compare blockchain types: permissioned, permissionless, private, public, federated, and hybrid Anticipate key technical, business, regulatory, and governance challenges Build blockchain financial models, investment rubrics, and risk frameworks Organize and manage teams to transform blockchain plans into reality Whether you're a senior decision maker, technical professional, customer, or investor, Blockchain for Business will help you cut through the hype and objectively assess blockchain's potential in your business. Register your product for convenient access to downloads, updates, and/or corrections as they become available.
    Note: Includes bibliographical references and index. - Description based on online resource; title from cover (Safari, viewed March 28, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    ISBN: 9780134097145 , 0134097149
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Second edition.
    Keywords: Computer security ; Computer networks ; Security measures ; Electronic books ; Electronic books ; local
    Abstract: The Comprehensive Guide to Computer Security, Extensively Revised with Newer Technologies, Methods, Ideas, and Examples In this updated guide, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern computer security. Reflecting dramatic growth in the quantity, complexity, and consequences of security incidents, Computer Security, Second Edition, links core principles with technologies, methodologies, and ideas that have emerged since the first edition's publication. Writing for advanced undergraduates, graduate students, and IT professionals, Bishop covers foundational issues, policies, cryptography, systems design, assurance, and much more. He thoroughly addresses malware, vulnerability analysis, auditing, intrusion detection, and best-practice responses to attacks. In addition to new examples throughout, Bishop presents entirely new chapters on availability policy models and attack analysis. Understand computer security goals, problems, and challenges, and the deep links between theory and practice Learn how computer scientists seek to prove whether systems are secure Define security policies for confidentiality, integrity, availability, and more Analyze policies to reflect core questions of trust, and use them to constrain operations and change Implement cryptography as one component of a wider computer and network security strategy Use system-oriented techniques to establish effective security mechanisms, defining who can act and what they can do Set appropriate security goals for a system or product, and ascertain how well it meets them Recognize program flaws and malicious logic, and detect attackers seeking to exploit them This is both a comprehensive text, explaining the most fundamental and pervasive aspects of the field, and a detailed reference. It will help you align security concepts with realistic policies, successfully implement your policies, and thoughtfully manage the trade-offs that inevitably arise. Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.
    Note: Includes bibliographical references and index. - Description based on online resource; title from title page (Safari, viewed January 11, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    ISBN: 9780132748544 , 0132748541
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Application software ; Testing ; Application software ; Development ; Teams in the workplace ; Management ; Agile software development ; Electronic books ; Electronic books ; local
    Abstract: Master BDD to deliver higher-value software more quickly To develop high-value products quickly, software development teams need better ways to collaborate. Agile methods like Scrum and Kanban are helpful, but they're not enough. Teams need better ways to work inside each sprint or work item. Behavior-driven development (BDD) adds just enough structure for product experts, testers, and developers to collaborate more effectively. Drawing on extensive experience helping teams adopt BDD, Richard Lawrence and Paul Rayner show how to explore changes in system behavior with examples through conversations, how to capture your examples in expressive language, and how to flow the results into effective automated testing with Cucumber. Where most BDD resources focus on test automation, this guide goes deep into how BDD changes team collaboration and what that collaboration looks like day to day. Concrete examples and practical advice will prepare you to succeed with BDD, whatever your context or role. · Learn how to collaborate better by using concrete examples of system behavior · Identify your project's meaningful increment of value so you're always working on something important · Begin experimenting with BDD slowly and at low risk · Move smoothly from informal examples to automated tests in Cucumber · Use BDD to deliver more frequently with greater visibility · Make Cucumber scenarios more expressive to ensure you're building the right thing · Grow a Cucumber suite that acts as high-value living documentation · Sustainably work with complex scenario data · Get beyond the "mini-waterfalls" that often arise on Scrum teams
    Note: Includes bibliographical references and index. - Description based on online resource; title from title page (Safari, viewed June 11, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    ISBN: 9780135159071 , 0135159075
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Addison Wesley data & analytics series
    Keywords: R (Computer program language) ; Application software ; Development ; Information visualization ; Machine learning ; Electronic books ; Electronic books ; local
    Abstract: The Foundational Hands-On Skills You Need to Dive into Data Science "Freeman and Ross have created the definitive resource for new and aspiring data scientists to learn foundational programming skills." -From the foreword by Jared Lander, series editor Using data science techniques, you can transform raw data into actionable insights for domains ranging from urban planning to precision medicine. Programming Skills for Data Science brings together all the foundational skills you need to get started, even if you have no programming or data science experience. Leading instructors Michael Freeman and Joel Ross guide you through installing and configuring the tools you need to solve professional-level data science problems, including the widely used R language and Git version-control system. They explain how to wrangle your data into a form where it can be easily used, analyzed, and visualized so others can see the patterns you've uncovered. Step by step, you'll master powerful R programming techniques and troubleshooting skills for probing data in new ways, and at larger scales. Freeman and Ross teach through practical examples and exercises that can be combined into complete data science projects. Everything's focused on real-world application, so you can quickly start analyzing your own data and getting answers you can act upon. Learn to Install your complete data science environment, including R and RStudio Manage projects efficiently, from version tracking to documentation Host, manage, and collaborate on data science projects with GitHub Master R language fundamentals: syntax, programming concepts, and data structures Load, format, explore, and restructure data for successful analysis Interact with databases and web APIs Master key principles for visualizing data accurately and intuitively Produce engaging, interactive visualizations with ggplot and other R packages Transform analyses into sharable documents and sites with R Markdown Create interactive web data science applications with Shiny Collaborate smoothly as part of a data science team Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.
    Note: Includes bibliographical references and index. - Description based on online resource; title from title page (Safari, viewed November 28, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    ISBN: 9781492047810 , 1492047813 , 9781492047797 , 1492047791
    Language: English
    Pages: 1 online resource (284 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als
    DDC: 005.1
    Keywords: Application software Development ; Computer architecture ; Distributed operating systems (Computers) ; Computer software Development ; Software patterns ; Electronic books ; local ; Logiciels d'application ; Développement ; Ordinateurs ; Architecture ; Systèmes d'exploitation répartis ; Logiciels ; Modèles de conception ; Application software ; Development ; Computer architecture ; Computer software ; Development ; Distributed operating systems (Computers) ; Software patterns
    Abstract: How do you detangle a monolithic system and migrate it to a microservices architecture? How do you do it while maintaining business-as-usual? As a companion to Sam Newman’s extremely popular Building Microservices , this new book details a proven method for transitioning an existing monolithic system to a microservice architecture. With many illustrative examples, insightful migration patterns, and a bevy of practical advice to transition your monolith enterprise into a microservice operation, this practical guide covers multiple scenarios and strategies for a successful migration, from initial planning all the way through application and database decomposition. You’ll learn several tried and tested patterns and techniques that you can use as you migrate your existing architecture. Ideal for organizations looking to transition to microservices, rather than rebuild Helps companies determine whether to migrate, when to migrate, and where to begin Addresses communication, integration, and the migration of legacy systems Discusses multiple migration patterns and where they apply Provides database migration examples, along with synchronization strategies Explores application decomposition, including several architectural refactoring patterns Delves into details of database decomposition, including the impact of breaking referential and transactional integrity, new failure modes, and more
    Note: Online resource; Title from title page (viewed November 25, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Manning Publications | Boston, MA : Safari
    ISBN: 9781617293641 , 1617293644
    Language: English
    Pages: 1 online resource (240 pages)
    Edition: 1st edition
    DDC: 005.2762
    Keywords: AngularJS (Software framework) ; Application software Testing ; Application software Development ; Electronic books ; local ; AngularJS (Software framework) ; Logiciels d'application ; Développement ; Application software ; Development ; Application software ; Testing
    Abstract: Testing Angular Applications teaches you how to make testing an essential part of your development and production processes. You'll start by setting up a simple unit testing system as you learn the fundamental practices. Then, you'll fine-tune it as you discover the best tests for Angular components, directives, pipes, services, and routing. Finally, you'll explore end-to-end testing, mastering the Protractor framework, and inserting Angular apps into your continuous integration pipeline.
    Note: Online resource; Title from title page (viewed January 5, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (677 pages)
    Edition: 1st edition
    Keywords: iOS (Electronic resource) ; Swift (Computer program language) ; Mobile computing Programming ; Application software Development ; Electronic books ; local ; IOS (Electronic resource) ; Swift (Langage de programmation) ; Informatique mobile ; Programmation ; Logiciels d'application ; Développement ; Application software ; Development ; Swift (Computer program language) ; Electronic books
    Abstract: Move into iOS development by getting a firm grasp of its fundamentals, including the Xcode 10 IDE, Cocoa Touch, and the latest version of Apple’s acclaimed programming language, Swift 5. With this thoroughly updated guide, you’ll learn the Swift language, understand Apple’s Xcode development tools, and discover the Cocoa framework. Explore Swift’s object-oriented concepts Become familiar with built-in Swift types Dive deep into Swift objects, protocols, and generics Tour the lifecycle of an Xcode project Learn how nibs are loaded Understand Cocoa’s event-driven design Communicate with C and Objective-C Once you master the fundamentals, you’ll be ready to tackle the details of iOS app development with author Matt Neuburg’s companion guide, Programming iOS 13 .
    Note: Online resource; Title from title page (viewed October 30, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    ISBN: 9780134679471 , 0134679474
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Computer networks ; Security measures ; Electronic books ; Electronic books ; local
    Abstract: The authoritative visual guide to Cisco Firepower Threat Defense (FTD) This is the definitive guide to best practices and advanced troubleshooting techniques for the Cisco flagship Firepower Threat Defense (FTD) system running on Cisco ASA platforms, Cisco Firepower security appliances, Firepower eXtensible Operating System (FXOS), and VMware virtual appliances. Senior Cisco engineer Nazmul Rajib draws on unsurpassed experience supporting and training Cisco Firepower engineers worldwide, and presenting detailed knowledge of Cisco Firepower deployment, tuning, and troubleshooting. Writing for cybersecurity consultants, service providers, channel partners, and enterprise or government security professionals, he shows how to deploy the Cisco Firepower next-generation security technologies to protect your network from potential cyber threats, and how to use Firepower's robust command-line tools to investigate a wide variety of technical issues. Each consistently organized chapter contains definitions of keywords, operational flowcharts, architectural diagrams, best practices, configuration steps (with detailed screenshots), verification tools, troubleshooting techniques, and FAQs drawn directly from issues raised by Cisco customers at the Global Technical Assistance Center (TAC). Covering key Firepower materials on the CCNA Security, CCNP Security, and CCIE Security exams, this guide also includes end-of-chapter quizzes to help candidates prepare. Understand the operational architecture of the Cisco Firepower NGFW, NGIPS, and AMP technologies Deploy FTD on ASA platform and Firepower appliance running FXOS Configure and troubleshoot Firepower Management Center (FMC) Plan and deploy FMC and FTD on VMware virtual appliance Design and implement the Firepower management network on FMC and FTD Understand and apply Firepower licenses, and register FTD with FMC Deploy FTD in Routed, Transparent, Inline, Inline Tap, and Passive Modes Manage traffic flow with detect-only, block, trust, and bypass operations Implement rate limiting and analyze quality of service (QoS) Blacklist suspicious IP addresses via Security Intelligence Block DNS queries to the malicious domains Filter URLs based on category, risk, and reputation Discover a network and implement application visibility and control (AVC) Control file transfers and block malicious files using advanced malware protection (AMP) Halt cyber attacks using Snort-based intrusion rule Masquerade an internal host...
    Note: Description based on online resource; title from title page (Safari, viewed October 12, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    ISBN: 9780134173337 , 0134173333
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Series Statement: Pearson open source software development series
    Keywords: Linux ; Computer security ; Computer networks ; Security measures ; Electronic books ; Electronic books ; local
    Abstract: Implement Industrial-Strength Security on Any Linux Server In an age of mass surveillance, when advanced cyberwarfare weapons rapidly migrate into every hacker's toolkit, you can't rely on outdated security methods-especially if you're responsible for Internet-facing services. In Linux® Hardening in Hostile Networks, Kyle Rankin helps you to implement modern safeguards that provide maximum impact with minimum effort and to strip away old techniques that are no longer worth your time. Rankin provides clear, concise guidance on modern workstation, server, and network hardening, and explains how to harden specific services, such as web servers, email, DNS, and databases. Along the way, he demystifies technologies once viewed as too complex or mysterious but now essential to mainstream Linux security. He also includes a full chapter on effective incident response that both DevOps and SecOps can use to write their own incident response plan. Each chapter begins with techniques any sysadmin can use quickly to protect against entry-level hackers and presents intermediate and advanced techniques to safeguard against sophisticated and knowledgeable attackers, perhaps even state actors. Throughout, you learn what each technique does, how it works, what it does and doesn't protect against, and whether it would be useful in your environment. Apply core security techniques including 2FA and strong passwords Protect admin workstations via lock screens, disk encryption, BIOS passwords, and other methods Use the security-focused Tails distribution as a quick path to a hardened workstation Compartmentalize workstation tasks into VMs with varying levels of trust Harden servers with SSH, use apparmor and sudo to limit the damage attackers can do, and set up remote syslog servers to track their actions Establish secure VPNs with OpenVPN, and leverage SSH to tunnel traffic when VPNs can't be used Configure a software load balancer to terminate SSL/TLS connections and initiate new ones downstream Set up standalone Tor services and hidden Tor services and relays Secure Apache and Nginx web servers, and take full advantage of HTTPS Perform advanced web server hardening with HTTPS forward secrecy and ModSecurity web application firewalls Strengthen email security with SMTP relay authentication, SMTPS, SPF records, DKIM, and DMARC Harden DNS servers, deter their use in DDoS attacks, and fully implement DNSSEC Systematically protect databases via network access control,...
    Note: Includes index. - Description based on online resource; title from title page (Safari, viewed September 22, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    Boston : Addison-Wesley
    ISBN: 9780134694849 , 0134694848
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Second edition.
    Keywords: Java (Computer program language) ; Computer programming ; Computing platforms ; Application software ; Development ; Electronic books ; Electronic books ; local
    Abstract: An Accessible Guide to the Java Language and Libraries Modern Java introduces major enhancements that impact the core Java technologies and APIs at the heart of the Java platform. Many old Java idioms are no longer needed and new features such as modularization make you far more effective. However, navigating these changes can be challenging. Core Java® SE 9 for the Impatient, Second Edition, is a complete yet concise guide that includes all the latest changes up to Java SE 9. Written by Cay S. Horstmann-author of the classic two-volume Core Java -this indispensable tutorial offers a faster, easier pathway for learning modern Java. Given Java SE 9's size and the scope of its enhancements, there's plenty to cover, but it's presented in small chunks organized for quick access and easy understanding. Horstmann's practical insights and sample code help you quickly take advantage of all that's new, from Java SE 9's long-awaited "Project Jigsaw" module system to the improvements first introduced in Java SE 8, including lambda expressions and streams. Use modules to simplify the development of well-performing complex systems Migrate applications to work with the modularized Java API and third-party modules Test code as you create it with the new JShell Read-Eval-Print Loop (REPL) Use lambda expressions to express actions more concisely Streamline and optimize data management with today's Streams API Leverage modern concurrent programming based on cooperating tasks Take advantage of a multitude of API improvements for working with collections, input/output, regular expressions, and processes Whether you're just getting started with modern Java or you're an experienced developer, this guide will help you write tomorrow's most robust, efficient, and secure Java code. Register your product at informit.com/register for convenient access to downloads, updates, and/or corrections as they become available.
    Note: Includes index. - Description based on online resource; title from title page (Safari, viewed September 29, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    ISBN: 9780134755885 , 013475588X
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; Electronic books ; local
    Abstract: Investigating the Cyber Breach The Digital Forensics Guide for the Network Engineer Understand the realities of cybercrime and today's attacks Build a digital forensics lab to test tools and methods, and gain expertise Take the right actions as soon as you discover a breach Determine the full scope of an investigation and the role you'll play Properly collect, document, and preserve evidence and data Collect and analyze data from PCs, Macs, IoT devices, and other endpoints Use packet logs, NetFlow, and scanning to build timelines, understand network activity, and collect evidence Analyze iOS and Android devices, and understand encryption-related obstacles to investigation Investigate and trace email, and identify fraud or abuse Use social media to investigate individuals or online identities Gather, extract, and analyze breach data with Cisco tools and techniques Walk through common breaches and responses from start to finish Choose the right tool for each task, and explore alternatives that might also be helpful The professional's go-to digital forensics resource for countering attacks right now Today, cybersecurity and networking professionals know they can't possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they occur. Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer is the first comprehensive guide to doing just that. Writing for working professionals, senior cybersecurity experts Joseph Muniz and Aamir Lakhani present up-to-the-minute techniques for hunting attackers, following their movements within networks, halting exfiltration of data and intellectual property, and collecting evidence for investigation and prosecution. You'll learn how to make the most of today's best open source and Cisco tools for cloning, data analytics, network and endpoint breach detection, case management, monitoring, analysis, and more. Unlike digital forensics books focused primarily on post-attack evidence gathering, this one offers complete coverage of tracking threats, improving intelligence, rooting out dormant malware, and responding effectively to breaches underway right now. This book is part of the Networking Technology: Security Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Note: Includes bibliographical references. - Description based on online resource; title from title page (viewed January 18, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    ISBN: 9780134756936 , 0134756932
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Internet of things ; Security measures ; Computer networks ; Security measures ; Electronic books ; Electronic books ; local
    Abstract: Discover high-value Azure security insights, tips, and operational optimizations Master powerful techniques and approaches for securing IoT systems of all kinds-current and emerging Internet of Things (IoT) technology adoption is accelerating, but IoT presents complex new security challenges. Fortunately, IoT standards and standardized architectures are emerging to help technical professionals systematically harden their IoT environments. In Orchestrating and Automating Security for the Internet of Things , three Cisco experts show how to safeguard current and future IoT systems by delivering security through new NFV and SDN architectures and related IoT security standards. The authors first review the current state of IoT networks and architectures, identifying key security risks associated with nonstandardized early deployments and showing how early adopters have attempted to respond. Next, they introduce more mature architectures built around NFV and SDN. You'll discover why these lend themselves well to IoT and IoT security, and master advanced approaches for protecting them. Finally, the authors preview future approaches to improving IoT security and present real-world use case examples. This is an indispensable resource for all technical and security professionals, business security and risk managers, and consultants who are responsible for systems that incorporate or utilize IoT devices, or expect to be responsible for them. · Understand the challenges involved in securing current IoT networks and architectures · Master IoT security fundamentals, standards, and modern best practices · Systematically plan for IoT security · Leverage Software-Defined Networking (SDN) and Network Function Virtualization (NFV) to harden IoT networks · Deploy the advanced IoT platform, and use MANO to manage and orchestrate virtualized network functions · Implement platform security services including identity, authentication, authorization, and accounting · Detect threats and protect data in IoT environments · Secure IoT in the context of remote access and VPNs · Safeguard the IoT platform itself · Explore use cases ranging from smart cities and advanced energy systems to the connected car · Preview evolving concepts that will shape the future of IoT security ..
    Note: Includes bibliographical references. - Description based on online resource; title from title page (viewed April 18, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    Boston : Addison-Wesley
    ISBN: 9780134668963 , 0134668960
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: iOS (Electronic resource) ; Swift (Computer program language) ; Application software ; Development ; Computer graphics ; Electronic books ; Electronic books ; local
    Abstract: Master Metal: The Next-Generation Graphics and GPU Programming Platform for Apple Developers Metal enables Apple developers to maximize performance in demanding tasks like 3D graphics, games, scientific programming, visualization, and GPU-accelerated machine learning. Metal® Programming Guide is the authoritative, practical guide to Metal for all iOS programmers who are interested in graphics programming but don't know where to start. Pioneering Apple developer Janie Clayton covers everything from basic draw calls to advanced parallel computing, combining easy-to-understand conceptual explanations with well-tested Swift 4/Xcode 9 sample code (available for download at GitHub). Clayton introduces the essential Metal, graphics, and math concepts every graphics programmer needs to know. She also discusses key graphics-specific libraries, concepts, and Metal Classes, presenting techniques and examples you'll find valuable for both graphics and data processing. Clayton also provides coverage of the Metal Compute Pipeline, demonstrating practical GPU programming applications ranging from image processing to neural networking. Quickly get a basic Metal project running Work with Metal resources and memory management Learn how shaders are compiled and accessed by the CPU Program both 2D and 3D graphics with Metal Import 3D models and assets from Blender, Maya, and other programs Apply imported textures to model objects Use multipass rendering to efficiently implement computationally expensive techniques Leverage tessellation to reduce mesh detail Use the GPU for a wide spectrum of general-purpose computing applications Get started with the Metal Performance Shaders Framework Register your product at informit.com/register for convenient access to downloads, updates, and/or corrections as they become available.
    Note: Includes index. - Description based on online resource; title from title page (Safari, viewed January 10, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    ISBN: 9780134807577 , 013480757X
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: CCIE professional development
    Keywords: Computer networks ; Security measures ; Computer security ; Firewalls (Computer security) ; Electronic books ; Electronic books ; local
    Abstract: The essential reference for security pros and CCIE Security candidates: policies, standards, infrastructure/perimeter and content security, and threat protection Integrated Security Technologies and Solutions - Volume I offers one-stop expert-level instruction in security design, deployment, integration, and support methodologies to help security professionals manage complex solutions and prepare for their CCIE exams. It will help security pros succeed in their day-to-day jobs and also get ready for their CCIE Security written and lab exams. Part of the Cisco CCIE Professional Development Series from Cisco Press, it is authored by a team of CCIEs who are world-class experts in their Cisco security disciplines, including co-creators of the CCIE Security v5 blueprint. Each chapter starts with relevant theory, presents configuration examples and applications, and concludes with practical troubleshooting. Volume 1 focuses on security policies and standards; infrastructure security; perimeter security (Next-Generation Firewall, Next-Generation Intrusion Prevention Systems, and Adaptive Security Appliance [ASA]), and the advanced threat protection and content security sections of the CCIE Security v5 blueprint. With a strong focus on interproduct integration, it also shows how to combine formerly disparate systems into a seamless, coherent next-generation security solution. Review security standards, create security policies, and organize security with Cisco SAFE architecture Understand and mitigate threats to network infrastructure, and protect the three planes of a network device Safeguard wireless networks, and mitigate risk on Cisco WLC and access points Secure the network perimeter with Cisco Adaptive Security Appliance (ASA) Configure Cisco Next-Generation Firewall Firepower Threat Defense (FTD) and operate security via Firepower Management Center (FMC) Detect and prevent intrusions with Cisco Next-Gen IPS, FTD, and FMC Configure and verify Cisco IOS firewall features such as ZBFW and address translation Deploy and configure the Cisco web and email security appliances to protect content and defend against advanced threats Implement Cisco Umbrella Secure Internet Gateway in the cloud as your first line of defense against internet threats Protect against new malware with Cisco Advanced Malware Protection and Cisco ThreatGrid
    Note: Includes bibliographical references and index. - Description based on online resource; title from title page (Safari, viewed May 8, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Ascent Audio | Boston, MA : Safari
    ISBN: 9781469098050
    Language: English
    Pages: 1 online resource (27662 pages)
    Edition: 1st edition
    DDC: 658.4/78
    Keywords: Computer networks Security measures ; Computer security ; Computer Security ; Audiobooks ; Sécurité informatique ; BUSINESS & ECONOMICS ; General ; Computer networks ; Security measures ; Computer security ; Downloadable audio books ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Audiobooks ; Livres audio
    Abstract: Fascinating and highly readable, Digital Resilience opens with the infamous 2013 Target attack, which compromised the credit card information of 40 million customers. In hindsight, the hack (like most today) was preventable. This book helps businesses: - Understand the threats they face - Assess the resilience of their networks against attacks - Identify and address weaknesses - Respond to exploits swiftly and effectively Data theft. Downed servers. Malware. Even human error can trigger cyber events anytime from anywhere around the globe. This powerful guide provides the resilience-building strategies you need to prevail-no matter what strikes.
    Note: Online resource; Title from title page (viewed April 18, 2018) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    Boston : Addison-Wesley
    ISBN: 9780134650449 , 0134650441
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Application software ; Development ; Software architecture ; Electronic books ; Electronic books ; local
    Abstract: The Most Complete, Practical, and Actionable Guide to Microservices Going beyond mere theory and marketing hype, Eberhard Wolff presents all the knowledge you need to capture the full benefits of this emerging paradigm. He illuminates microservice concepts, architectures, and scenarios from a technology-neutral standpoint, and demonstrates how to implement them with today's leading technologies such as Docker, Java, Spring Boot, the Netflix stack, and Spring Cloud. The author fully explains the benefits and tradeoffs associated with microservices, and guides you through the entire project lifecycle: development, testing, deployment, operations, and more. You'll find best practices for architecting microservice-based systems, individual microservices, and nanoservices, each illuminated with pragmatic examples. The author supplements opinions based on his experience with concise essays from other experts, enriching your understanding and illuminating areas where experts disagree. Readers are challenged to experiment on their own the concepts explained in the book to gain hands-on experience. Discover what microservices are, and how they differ from other forms of modularization Modernize legacy applications and efficiently build new systems Drive more value from continuous delivery with microservices Learn how microservices differ from SOA Optimize the microservices project lifecycle Plan, visualize, manage, and evolve architecture Integrate and communicate among microservices Apply advanced architectural techniques, including CQRS and Event Sourcing Maximize resilience and stability Operate and monitor microservices in production Build a full implementation with Docker, Java, Spring Boot, the Netflix stack, and Spring Cloud Explore nanoservices with Amazon Lambda, OSGi, Java EE, Vert.x, Erlang, and Seneca Understand microservices' impact on teams, technical leaders, product owners, and stakeholders Managers will discover better ways to support microservices, and learn how adopting the method affects the entire organization. Developers will master the technical skills and concepts they need to be effective. Architects will gain a deep understanding of key issues in creating or migrating toward microservices, and exactly what it will take to transform their plans into reality.
    Note: Includes index. - Description based on online resource; title from title page (Safari, viewed October 14, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    ISBN: 9780134465159 , 0134465156
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Addison-Wesley professional Ruby series
    Keywords: Ruby on rails (Electronic resource) ; Application software ; Development ; Geospatial data ; Electronic books ; Electronic books ; local
    Abstract: Create Beautiful Visualizations that Free Your Data to Tell Powerful Truths "The depth of Barrett Clark's knowledge shines through in his writing: clear, concise, and confident. Barrett has been practicing all of this stuff in his day job for many years-Postgres, D3, GIS, all of it. The knowledge in this book is real-world and hard-earned!" -From the Foreword by Obie Fernandez Data Visualization Toolkit is your hands-on, practical, and holistic guide to the art of visualizing data. You'll learn how to use Rails, jQuery, D3, Leaflet, PostgreSQL, and PostGIS together, creating beautiful visualizations and maps that give your data a voice and to make it "dance." Barrett Clark teaches through real-world problems and examples developed specifically to illuminate every technique you need to generate stunningly effective visualizations. You'll move from the absolute basics toward deep dives, mastering diverse visualizations and discovering when to use each. Along the way, you'll build three start-to-finish visualization applications, using actual real estate, weather, and travel datasets. Clark addresses every component of data visualization: your data, database, application server, visualization libraries, and more. He explains data transformations; presents expert techniques in JavaScript, Ruby, and SQL; and illuminates key concepts associated with both descriptive statistics and geospatial data. Throughout, everything is aimed at one goal: to help you cut through the clutter and let your data tell all it can. This guide will help you Explore and understand the data visualization technology stack Master the thought process and steps involved in importing data Extract, transform, and load data in usable, reliable form Handle spotty data, or data that doesn't line up with what your chart expects Use D3 to build pie and bar charts, scatter and box plots, and more Work effectively with time-series data Tweak Ruby and SQL to optimize performance with large datasets Use raw SQL in Rails: window functions, subqueries, and common table expressions Build chord diagrams and time-series aggregates Use separate databases or schema for reporting databases Integrate geographical data via geospatial SQL queries Construct maps with Leaflet and Rails Query geospatial data the "Rails way" and the "raw SQL way"
    Note: Includes index. - Description based on online resource; title from title page (Safari, viewed August 18, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    Indianapolis, Indiana : Cisco Press
    ISBN: 9780134423760 , 0134423763
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Computer networks ; Security measures ; Computer network protocols ; Database management ; Electronic books ; Electronic books ; local
    Abstract: The complete guide to Cisco ® IWAN: features, benefits, planning, and deployment Using Cisco Intelligent WAN (IWAN), businesses can deliver an uncompromised experience, security, and reliability to branch offices over any connection. Cisco IWAN simplifies WAN design, improves network responsiveness, and accelerates deployment of new services. Now, there's an authoritative single-source guide to Cisco IWAN: all you need to understand it, design it, and deploy it for maximum value. In Cisco Intelligent WAN (IWAN), leading Cisco experts cover all key IWAN technologies and components, addressing issues ranging from visibility and provisioning to troubleshooting and optimization. They offer extensive practical guidance on migrating to IWAN from your existing WAN infrastructure. This guide will be indispensable for all experienced network professionals who support WANs, are deploying Cisco IWAN solutions, or use related technologies such as DMVPN or PfR. Deploy Hybrid WAN connectivity to increase WAN capacity and improve application performance Overlay DMVPN on WAN transport to simplify operations, gain transport independence, and improve VPN scalability Secure DMVPN tunnels and IWAN routers Use Application Recognition to support QoS, Performance Routing (PfR), and application visibility Improve application delivery and WAN efficiency via PfR Monitor hub, transit, and branch sites, traffic classes, and channels Add application-level visibility and per-application monitoring to IWAN routers Overcome latency and bandwidth inefficiencies that limit application performance Use Cisco WAAS to customize each location's optimizations, application accelerations, and virtualization Smoothly integrate Cisco WAAS into branch office network infrastructure Ensure appropriate WAN application responsiveness and experience Improve SaaS application performance with Direct Internet Access (DIA) Perform pre-migration tasks, and prepare your current WAN for IWAN Migrate current point-to-point and multipoint technologies to IWAN
    Note: Includes bibliographical references and index. - Description based on online resource; title from title page (Safari, viewed November 30, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    Indianapolis, Indiana : Cisco Press
    ISBN: 9780134586656 , 0134586654
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Second edition.
    Keywords: Computer networks ; Security measures ; Computer network protocols ; Computer networks ; Access control ; Electronic books ; Electronic books ; local
    Abstract: Fully updated: The complete guide to Cisco Identity Services Engine solutions Using Cisco Secure Access Architecture and Cisco Identity Services Engine, you can secure and gain control of access to your networks in a Bring Your Own Device (BYOD) world. This second edition of Cisco ISE for BYOD and Secure Unified Access contains more than eight brand-new chapters as well as extensively updated coverage of all the previous topics in the first edition book to reflect the latest technologies, features, and best practices of the ISE solution. It begins by reviewing today's business case for identity solutions. Next, you walk through ISE foundational topics and ISE design. Then you explore how to build an access security policy using the building blocks of ISE. Next are the in-depth and advanced ISE configuration sections, followed by the troubleshooting and monitoring chapters. Finally, we go in depth on the new TACACS+ device administration solution that is new to ISE and to this second edition. With this book, you will gain an understanding of ISE configuration, such as identifying users, devices, and security posture; learn about Cisco Secure Access solutions; and master advanced techniques for securing access to networks, from dynamic segmentation to guest access and everything in between. Drawing on their cutting-edge experience supporting Cisco enterprise customers, the authors offer in-depth coverage of the complete lifecycle for all relevant ISE solutions, making this book a cornerstone resource whether you're an architect, engineer, operator, or IT manager. Review evolving security challenges associated with borderless networks, ubiquitous mobility, and consumerized IT Understand Cisco Secure Access, the Identity Services Engine (ISE), and the building blocks of complete solutions Design an ISE-enabled network, plan/distribute ISE functions, and prepare for rollout Build context-aware security policies for network access, devices, accounting, and audit Configure device profiles, visibility, endpoint posture assessments, and guest services Implement secure guest lifecycle management, from WebAuth to sponsored guest access Configure ISE, network access devices, and supplicants, step by step Apply best practices to avoid the pitfalls of BYOD secure access Set up efficient distributed ISE deployments Provide remote access VPNs with ASA and Cisco ISE Simplify administration with self-service onboarding and registration Deploy security group acc...
    Note: Previous edition published: 2013. - Includes index. - Description based on online resource; title from title page (Safari, viewed August 1, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    ISBN: 9780133085501 , 0133085503
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: iOS (Electronic resource) ; Mac OS ; Cocoa (Application development environment) ; Objective-C (Computer program language) ; Swift (Computer program language) ; Application software ; Development ; Mobile computing ; Electronic books ; Electronic books ; local
    Abstract: In iOS and macOS™ Performance Tuning, Marcel Weiher drills down to the code level to help you systematically optimize CPU, memory, I/O, graphics, and program responsiveness in any Objective-C, Cocoa, or CocoaTouch program. This up-to-date guide focuses entirely on performance optimization for macOS and iOS. Drawing on more than 25 years of experience optimizing Apple device software, Weiher identifies concrete performance problems that can be discovered empirically via measurement. Then, based on a deep understanding of fundamental principles, he presents specific techniques for solving them. Weiher presents insights you won't find anywhere else, most of them applying to both macOS and iOS development. Throughout, he reveals common pitfalls and misconceptions about Apple device performance, explains the realities, and helps you reflect those realities in code that performs beautifully. Understand optimization principles, measurement, tools, pitfalls, and techniques Recognize when to carefully optimize, and when it isn't worth your time Balance performance and encapsulation to create efficient object representations, communication, data access, and computation Avoid mistakes that slow down Objective-C programs and hinder later optimization Fix leaks and other problems with memory and resource management Address I/O issues associated with drives, networking, serialization, and SQLite Code graphics and UIs that don't overwhelm limited iOS device resources Learn what all developers need to know about Swift performance This book's source code can be downloaded at github.com/mpw/iOS-macOS-performance. Register your product at informit.com/register for convenient access to downloads, updates, and corrections as they become available.
    Note: Includes index. - Description based on online resource; title from title page (Safari, viewed March 21, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    ISBN: 9780134464312 , 0134464311
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Computer network architectures ; Computer networks ; Security measures ; Cloud computing ; Electronic books ; Electronic books ; local
    Abstract: Network Functions Virtualization (NFV) will drive dramatic cost reductions while also accelerating service delivery. Using NFV with SDN, network owners can provision new functions rapidly on demand, improve scalability, and leverage microservices. Benefits like these will make NFV indispensable for service providers, mobile operators, telcos, and enterprises alike. Network Functions Virtualization (NFV) with a Touch of SDN is the first practical introduction to NFV's fundamental concepts, techniques, and use cases. Written for wide audiences of network engineers, architects, planners, and operators, it assumes no previous knowledge of NFV architecture, deployment, or management. The authors first explain how virtualization, VMs, containers, and related technologies establish the foundation for the NFV transformation. Next, they show how these concepts and technologies can be applied to virtualize network functions in the cloud, data centers, routing, security, and the mobile packet core. You'll discover new tools and techniques for managing and orchestrating virtualized network devices, and gain new clarity on how SDN and NFV interact and interrelate. By the time you're done, you'll be ready to assess vendor claims, evaluate architectures, and plan NFV's role in your own networks. Understand NFV's key benefits and market drivers Review how virtualization makes NFV possible Consider key issues associated with NFV network design and deployment Integrate NFV into existing network designs Orchestrate, build, and deploy NFV networks and cloud services Maximize operational efficiency by building more programmable, automated networks Understand how NFV and SDN work together Address security, programmability, performance, and service function chaining Preview evolving concepts that will shape NFV's future
    Note: Includes bibliographical references and index. - Description based on online resource; title from title page (Safari, viewed November 15, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    Boston : Addison-Wesley
    ISBN: 9780134691626 , 0134691628
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Application software ; Development ; Software architecture ; Electronic books ; Electronic books ; local
    Abstract: Using Continuous Delivery, you can bring software into production more rapidly, with greater reliability. A Practical Guide to Continuous Delivery is a 100% practical guide to building Continuous Delivery pipelines that automate rollouts, improve reproducibility, and dramatically reduce risk. Eberhard Wolff introduces a proven Continuous Delivery technology stack, including Docker, Chef, Vagrant, Jenkins, Graphite, the ELK stack, JBehave, and Gatling. He guides you through applying these technologies throughout build, continuous integration, load testing, acceptance testing, and monitoring. Wolff's start-to-finish example projects offer the basis for your own experimentation, pilot programs, and full-fledged deployments. A Practical Guide to Continuous Delivery is for everyone who wants to introduce Continuous Delivery, with or without DevOps. For managers, it introduces core processes, requirements, benefits, and technical consequences. Developers, administrators, and architects will gain essential skills for implementing and managing pipelines, and for integrating Continuous Delivery smoothly into software architectures and IT organizations. Understand the problems that Continuous Delivery solves, and how it solves them Establish an infrastructure for maximum software automation Leverage virtualization and Platform as a Service (PAAS) cloud solutions Implement build automation and continuous integration with Gradle, Maven, and Jenkins Perform static code reviews with SonarQube and repositories to store build artifacts Establish automated GUI and textual acceptance testing with behavior-driven design Ensure appropriate performance via capacity testing Check new features and problems with exploratory testing Minimize risk throughout automated production software rollouts Gather and analyze metrics and logs with Elasticsearch, Logstash, Kibana (ELK), and Graphite Manage the introduction of Continuous Delivery into your enterprise Architect software to facilitate Continuous Delivery of new capabilities
    Note: Includes bibliographical references and index. - Description based on online resource; title from title page (Safari, viewed March 21, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    ISBN: 9781439845790 , 1439845794
    Language: English
    Pages: 1 online resource (388 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als
    Keywords: Transportation Security measures ; Terrorism Prevention ; Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local ; Homeland Security ; Computing & IT Security ; Supply Chain Management ; Transport ; Sécurité ; Mesures ; États-Unis ; Terrorism ; Prevention ; Transportation ; Security measures ; United States
    Abstract: Transportation is the lifeline of any nation, connecting people, supporting the economy, and facilitating the delivery of vital goods and services. The 9/11 attacks—and other attacks on surface transportation assets, including the bombings in Madrid, London, Moscow, and Mumbai—demonstrate the vulnerability of the open systems to disruption and the consequences of the attacks on people, property, and the economy. Now more than ever, it has become imperative for businesses operating in the transportation and transit sectors to develop comprehensive security programs accounting for both natural and man-made hazards and safeguarding people, places, and equipment—while at the same time ensuring operations continuity. Providing transportation managers with the knowledge, skills, and abilities to effectively manage the security of transportation assets, Introduction to Transportation Security examines: Basic theories of security and emergency management The integrated nature of the nation’s critical infrastructure and the threats to transportation in each surface mode Federal agencies working in emergency management and transportation security and their intelligence and response requirements and capabilities The types of disasters that have occurred in the U.S. and selected nations, and their significant economic impacts Cost-beneficial security strategies aimed at preventing catastrophic failures in each transportation mode Effective methods for organizing, testing, and evaluating transportation security across modes and professions The book covers all transportation modes and their interconnectivity—including highway, air cargo, freight and passenger rail, transit, and maritime. It presents learning objectives and discussion questions to test assimilation of the material and case studies to facilitate a practical understanding of the concepts. Introduction to Transportation Security provides essential information for students in transportation management programs and professionals charged with safeguarding the movement of assets within our interconnected transportation network.
    Note: Online resource; Title from title page (viewed April 19, 2016) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    ISBN: 9780134389653 , 0134389654
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Fifth edition.
    Parallel Title: Erscheint auch als
    Keywords: Android (Electronic resource) ; Application software ; Development ; Mobile computing ; Electronic books ; Electronic books ; local
    Abstract: What Every Android App Developer Should Know Today: Android 6 Tools, App/UI Design, Testing, Publishing, and More Introduction to Android ™ Application Development, Fifth Edition , is the most useful real-world guide to building robust, commercial-grade Android apps with the new Android 6 SDK, Android Studio, and latest development best practices. Bigger, better, and more comprehensive than ever, this book covers everything you need to start developing professional apps for modern Android devices. If you're serious about Android development, this guide will prepare you to build virtually any app you can imagine! Three well-respected experts guide you through setting up your development environment, designing user interfaces, developing for diverse devices, and optimizing your entire app-development process. Up-to-date code listings support in-depth explanations of key API features, and many chapters contain multiple sample apps. This fifth edition adds brand-new chapters on material design, styling applications, design patterns, and querying with SQLite. You'll find a treasure trove of Android Studio tips, plus a brand-new appendix on the Gradle build system. This edition also offers Updated coverage of the latest Android 5.1 and 6 APIs, tools, utilities, and best practices New coverage of the Android 6.0 permission model Powerful techniques for integrating material design into your apps An all-new chapter on using styles and reusing common UI components Extensive new coverage of app design, architecture, and backward compatibility A full chapter on using SQLite with persistent database-backed app data Revised quiz questions and exercises to test your knowledge Download this book's source code at informit.com/title/9780134389455 or introductiontoandroid.blogspot.com.
    Note: "Covers Android 6"--Cover. - Includes index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    ISBN: 9780134218229 , 0134218221
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Addison-Wesley Microsoft technology series
    Keywords: Windows Azure ; Application software ; Development ; Cloud computing ; Electronic books ; Electronic books ; local
    Abstract: "Beyond just describing the basics, this book dives into best practices every aspiring microservices developer or architect should know." -Foreword by Corey Sanders, Partner Director of Program Management, Azure Microservice-based applications enable unprecedented agility and ease of management, and Docker containers are ideal for building them. Microsoft Azure offers all the foundational technology and higher-level services you need to develop and run any microservices application. Microservices with Docker on Microsoft Azure brings together essential knowledge for creating these applications from the ground up, or incrementally deconstructing monolithic applications over time. The authors draw on their pioneering experience helping to develop Azure's microservices features and collaborating with Microsoft product teams who've relied on microservices architectures for years. They illuminate the benefits and challenges of microservices development and share best practices all developers and architects should know. You'll gain hands-on expertise through a detailed sample application, downloadable at github.com/flakio/flakio.github.io. Step by step, you'll walk through working with services written in Node.js, Go, and ASP.NET 5, using diverse data stores (mysql, elasticsearch, block storage). The authors guide you through using Docker Hub as a service registry, and Microsoft Azure Container service for cluster management and service orchestration. Coverage includes: Recognizing how microservices architectures are different, and when they make sense Understanding Docker containers in the context of microservices architectures Building, pulling, and layering Docker images Working with Docker volumes, containers, images, tags, and logs Using Docker Swarm, Docker Compose, and Docker Networks Creating Docker hosts using the Azure portal, Azure Resource Manager, the command line, docker-machine, or locally via Docker toolbox Establishing development and DevOps environments to support microservices applications Making the most of Docker's continuous delivery options Using Azure's cluster and container orchestration capabilities to operate and scale containerized microservices applications with maximum resilience Monitoring microservices applications with Azure Diagnostics, Visual Studio Application Insights, and Microsoft Operations Management Suite Developing microservices applications faster and more effectively with Azure Service Fabric An extensiv...
    Note: Includes index. - Description based on online resource; title from title page (Safari, viewed September 2, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    Indianapolis, Indiana : Cisco Press
    ISBN: 9780134033549 , 013403354X
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Computer networks ; Security measures ; Computer networks ; Management ; Computer networks ; Monitoring ; Electronic books ; Electronic books ; local
    Abstract: A comprehensive guide for deploying, configuring, and troubleshooting NetFlow and learning big data analytics technologies for cyber security Today's world of network security is full of cyber security vulnerabilities, incidents, breaches, and many headaches. Visibility into the network is an indispensable tool for network and security professionals and Cisco NetFlow creates an environment where network administrators and security professionals have the tools to understand who, what, when, where, and how network traffic is flowing. Network Security with NetFlow and IPFIX is a key resource for introducing yourself to and understanding the power behind the Cisco NetFlow solution. Omar Santos, a Cisco Product Security Incident Response Team (PSIRT) technical leader and author of numerous books including the CCNA Security 210-260 Official Cert Guide, details the importance of NetFlow and demonstrates how it can be used by large enterprises and small-to-medium-sized businesses to meet critical network challenges. This book also examines NetFlow's potential as a powerful network security tool. Network Security with NetFlow and IPFIX explores everything you need to know to fully understand and implement the Cisco Cyber Threat Defense Solution. It also provides detailed configuration and troubleshooting guidance, sample configurations with depth analysis of design scenarios in every chapter, and detailed case studies with real-life scenarios. You can follow Omar on Twitter: santosomar NetFlow and IPFIX basics Cisco NetFlow versions and features Cisco Flexible NetFlow NetFlow Commercial and Open Source Software Packages Big Data Analytics tools and technologies such as Hadoop, Flume, Kafka, Storm, Hive, HBase, Elasticsearch, Logstash, Kibana (ELK) Additional Telemetry Sources for Big Data Analytics for Cyber Security Understanding big data scalability Big data analytics in the Internet of everything Cisco Cyber Threat Defense and NetFlow Troubleshooting NetFlow Real-world case studies
    Note: "Security"--Cover. - Includes index. - Description based on online resource; title from title page (Safari, viewed September 25, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    ISBN: 9780134052083 , 0134052080
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Cyberinfrastructure ; Security measures ; Cyberterrorism ; Prevention ; Computer networks ; Security measures ; Electronic books ; Electronic books ; local
    Abstract: This is the Rough Cut version of the printed book. This is the first complete guide to building, operating, managing, and operating Security Operations Centers in any business or organizational environment. Three leading IT security experts review the characteristics, strengths, and weaknesses of each SOC model (including virtual SOCs) -- thereby helping you select the right strategic option for your organization. Next, they walk you through every phase required to establish and operate an effective SOC, including all significant people, process and technology issues. You'll also find complete configuration examples covering the open source, Cisco, and non-Cisco components most likely to be found in modern, fully operational SOCs. Coverage includes: An up-to-date review of modern security operations and challenges, from information assurance and risk management to incident response How SOCs emerged and have evolved: what SOCs can do that other security approaches can't A New SOC Maturity Model: evaluating where you stand and where you need to go Planning your SOC: strategy, mission, functions, services, and more Designing infrastructure, facilities, networks, and physical security Comparing dedicated and virtualized SOC environments Collecting and analyzing security data Integrating vulnerability and risk management Organizing effective incident response teams, and measuring their performance Building out your SOC infrastructure: network, security, systems, storage, and collaboration Developing an SOC handbook your people can use (including a practical example) Best practice operations: maintenance, reviews, metrics, and continuous enhancement
    Note: Includes bibliographical references and index. - Description based on online resource; title from cover page (Safari, viewed November 5, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    Boston : Addison-Wesley
    ISBN: 9780134431642 , 0134431642
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Second edition.
    Keywords: iOS (Electronic resource) ; iPhone OS ; Programming languages (Electronic computers) ; Application software ; Development ; Electronic books ; Electronic books ; local
    Abstract: Get started fast with Swift 2 programming for iOS and OS X Learning Swift 2 Programming is a fast-paced, hands-on introduction to writing production-quality iOS and OS X apps with Apple's programming language. Written for developers with experience in any modern language, this book explains Swift simply and clearly, using relevant examples that solve realistic problems. Author Jacob Schatz's popular YouTube video tutorials have already helped thousands of Apple developers get started with Swift. Now, he helps you take full advantage of Swift's advanced design, remarkable performance, and streamlined development techniques. Step by step, you'll move from basic syntax through advanced features such as closures and generics-discovering helpful tips and tricks along the way. After you've mastered Swift's building blocks and learned about its key innovations, a full section of case studies walks you through building complete apps from scratch. Learn how to: Compare Swift with Objective-C, JavaScript, Python, Ruby, and C Collect data with arrays and dictionaries, and store it with variables and constants Group commonly used code into functions for easy reuse Structure your code with enums, structs, and classes Use generics to get more done with less code Write closures to share small blocks of functionality Use optionals to write more robust, crash-resistant, and cleaner code Integrate existing Objective-C code into new Swift apps Program on the bit and byte levels with advanced operators Implement efficient design patterns with protocols and delegates Create animated 2D games with SpriteKit, and apps with UIKit
    Note: Includes index. - Description based on online resource; title from title page (viewed January 8, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    ISBN: 9780134399164 , 0134399161
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Second edition.
    Keywords: Mac OS ; iOS (Electronic resource) ; Macintosh (Computer) ; Programming ; Mobile apps ; Wearable computers ; Programming ; Application software ; Development ; Electronic books ; Electronic books ; local
    Abstract: Create Breakthrough Apple Watch Apps with the New watchOS 2 and the Updated WatchKit Framework! Apple Watch is improving quickly: Using Apple's new watchOS 2 operating system and the updated WatchKit framework, you can create tomorrow's hottest wearable apps. Learning WatchKit Programming, Second Edition, will help you master these technologies and gain the same "early mover" advantage that early iPhone developers enjoyed. Leading iOS development trainer and author Wei-Meng Lee guides you step by step through architecting, designing, and building cutting-edge Apple Watch apps. You'll learn how to make the most of the newest platform improvements, including direct programmatic access to key hardware features; support for new Watch Connectivity Framework APIs; and new ways to use location, consume web services, and persist data. Using practical Swift code examples designed for clarity and simplicity, Lee guides you through building apps from the ground up. You'll learn how to build native watch apps that perform exceptionally well on their own and how to integrate your apps with iPhones to do even more. Coverage includes Writing high-performance, native watch apps that run independently of the iPhone Accessing hardware, including Digital Crown, microphone, and Taptic Engine Storyboarding apps and testing them on the Apple Watch Simulator Mastering Apple Watch's multiple-screen navigation Building efficient interfaces with Apple Watch UI controls Creating and programming "complications"-apps that display data on the watch face, such as alarms, tachymeters, chronographs, and calendars Displaying information via labels, images, or tables Passing and returning data to Interface Controllers Integrating location services into Apple Watch apps Using Watch Connectivity Framework APIs to link watch and iOS apps Calling and consuming web services Persisting data on the watch Displaying short- and long-look notifications Implementing glances to help users gather information faster This guide will help you extend your existing iOS skills, build apps that solve a whole new set of problems, and reach millions of people in the fast-growing Apple Watch marketplace. All of this book's sample Swift code is available for download at informit.com/title/9780134398983. (Register your book to gain access.)
    Note: Includes index. - Description based on online resource; title from title page (Safari, viewed December 4, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    Boston : Addison-Wesley
    ISBN: 9780133924022 , 0133924025
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Android (Electronic resource) ; Application software ; Development ; Mobile computing ; Electronic books ; Electronic books ; local
    Abstract: "A must read for all developers that want to begin serious Android development." - Justin Anderson , Freelance Android Developer "From start to finish, this book contains a variety of great tips and insight into the most important attributes of Android design. This book will definitely be required reading for any of our future Android engineers." - Cameron Banga , Cofounder, 9magnets, LLC There's a downside to Android's amazing openness and versatility: it's easy for developers to write code that's inefficient, unreliable, insecure, or hard to maintain. In Android Development Patterns , enterprise Android developer Phil Dutson helps you leverage Android 5.0+'s amazing power without falling victim to those pitfalls. Dutson presents today's most comprehensive set of patterns and procedures for building optimized, robust apps with Android 5.0+. First, Dutson guides you through establishing a highly efficient development environment and workflow, and testing your app to ensure that your code works just as you expect. Then, he walks through the modern best practices for structuring apps, using widgets and components, and working with views. You learn how to build apps that are easy to manage and update, deliver accurate and up-to-date information without wasting precious battery power, and take advantage of new hardware, such as Android Wear and Android TV. Dutson concludes by presenting powerful strategies for optimizing your apps and packaging them for distribution. Coverage includes Using testing to build more trustworthy, dependable, maintainable apps Understanding subtle but critical differences between Android and traditional Java programming Building consistent, modern user interfaces with views and layouts Leveraging the proven MVC pattern to cleanly organize logic Creating rich visual experiences with 3D graphics, animation, and media Simplifying capture and use of location data with the new Locations API Integrating optional hardware, such as Bluetooth, NFC, or USB Building better apps with Google Play Services Creating Android Wear notifications and apps Tuning and improving apps with Google Analytics Designing Android TV apps for the "ten foot view" informit.com/aw https://github.com/dutsonpa/adp-files
    Note: Includes index. - Description based on online resource; title from title page (Safari, viewed February 29, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (447 pages)
    Edition: 1st edition
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Abstract: Financial market reform has focused chiefly on the threats to stability arising from the risky, uncontrolled activity of the leaders of financial institutions. Nevertheless, organized crime, white-collar crime, and corruption have a huge impact on financial systems worldwide and must also be confronted if true reform is to be achieved. A collection of articles written by experts in their fields of study, Financial Crimes: A Threat to Global Security spotlights the importance of addressing the problem of illegal financial activity as part of a greater comprehensive plan for reforming the financial sector. Drawn from the 23rd Annual Meeting of the Academic Council on the United Nations System (ACUNS) held in Vienna, the book explores the major themes discussed at this elite symposium. In the first section, the contributors examine changing concepts in security over the course of history and across nations. They discuss how an event in Austria led to the implementation of a new security philosophy that is now followed by the majority of the European Union. The book examines the diverse models of preventing security threats that have grown from that idea as well as the gradual expansion of the role of the security council of the United Nations. The next section analyzes the present state of security worldwide and examines the wide array of criminal activity that plagues the financial sector. Expert contributors reveal methods to identify certain types of behavior and criminals as well as efforts to combat illegal activity—including the role of the media. The final section investigates alternative approaches to preventing another worldwide financial disaster through investigative reporting, human factors analysis, legislative initiatives, and other methods. Filled with insight from international experts, the book highlights both the warning signs to illegal activity as well as the most effective methods for combating the invidious corruption that, if unchecked, puts all nations at risk. Maximilian Edelbacher will be appearing at three upcoming events: June 28, 2012: Roundtable in the House of the European Union in Vienna on the topic "Financial Crimes: A Threat to European Security?" October 8, 2012: Roundtable in Joannneum, Austria on the topic "Financial Crimes: A Threat to Global Security" October 9, 2012: Book presentation at the Hans Gross Museum in Graz, Austria
    Note: Online resource; Title from title page (viewed April 19, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : mitp Verlag | Boston, MA : Safari
    ISBN: 9783826676536
    Language: English , German
    Pages: 1 online resource (440 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als
    DDC: 005.3
    Keywords: Android (Electronic resource) ; Application software Development ; Mobile computing ; Smartphones ; Electronic books ; local ; Android (Electronic resource) ; Logiciels d'application ; Développement ; Informatique mobile ; Téléphones intelligents ; Application software ; Development ; Mobile computing ; Smartphones
    Abstract: Schritt für Schritt eigene Apps entwickeln Viel Spaß mit selbst programmiertem Code und Smartphone-Spielen Mit Fragen und Aufgaben am Ende jedes Kapitels Hattest du auch schon selbst einen tollen Geistesblitz für eine Smartphone-App, aber keinen blassen Schimmer, wie sich solch eine Idee in ein kleines Programm umsetzen lässt? »… für Kids«-Autor Hans-Georg Schumann programmiert in diesem Buch zusammen mit dir lustige Spiele-Apps mit Android Studio und der Programmiersprache Java. Du lernst, mit Komponenten zu arbeiten und traust dich auch an komplexere Projekte heran. Das hört sich schwieriger an, als es ist, doch du lernst alles Schritt für Schritt und findest am Ende jedes Kapitels Zusammenfassungen, Übungen und Aufgaben. So kannst du alles Gelernte noch einmal in Ruhe sacken lassen. Du erhältst eine genaue Anleitung, wie du eine kleine Wanzenjagd-App in den verschiedensten Varianten programmierst, die nebenbei noch richtig Spaß macht! Mit einem Anhang für Eltern und Lehrer. Systemvoraussetzungen: ab Windows 7, ggf. Smartphone oder Tablet mit Android Ab 12 Jahre, aber auch für Erwachsene, die eine wirklich einfache Einführung suchen. Auf der DVD: Android Studio zusammen mit Java als komplette Entwicklungsumgebung für Windows, Beispiele aus dem Buch, die Lösungen zu den Fragen und Aufgaben sowie drei ausführliche Bonuskapitel. Aus dem Inhalt Ein neues Projekt erzeugen Von Hello zu Hallo Variablen verknüpfen Ressourcen-Strings benutzen Rechnen mit dem Zufall Bedingungen while oder do-while? Animation-XML Buttons mit Bild Bug oder Käfer? Das Spiel-Objekt einsetzen Das richtige Layout Kontaktvermeidung Eigene View-Objekte erzeugen Für Eltern…und für Lehrer Apps für den Play Store (AKP)
    Note: Online resource; Title from title page (viewed March 30, 2015) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (418 pages)
    Edition: 1st edition
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Abstract: The CRC Press Terrorism Reader assembles the insight of an unrivaled pool of author experts to provide the ultimate comprehensive resource on terrorism. With information drawn from premier titles in the CRC Press collection, the book begins by discussing the origins and definitions of terrorism as well as its motivations and psychology. It goes on to explore a range of issues, providing readers with an understanding of what the terrorist threat is, the history behind it, and strategies to detect, mitigate, and prevent attacks. Topics include: Terrorist organizations and cells Phases of the terrorist cycle, including target selection, planning and preparation, escape and evasion, and media exploitation Weapons of mass destruction (WMDs), including chemical, biological, radiological, and nuclear (CBRN) Methods for deterrence and intelligence-driven counterterrorism The terrorist threat from Latin America, Europe, the Middle East, and Asia The impact of the Arab Spring Why suicide bombings are the ultimate terrorist tool The crime-terror nexus and terrorist funding Technology in terrorism and counterterrorism Providing real-world insight and solutions to terrorist threats and acts at home and abroad, the book goes beyond theory to deliver practitioner knowledge from the field straight into the reader’s hands.
    Note: Online resource; Title from title page (viewed November 11, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Auerbach Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (261 pages)
    Edition: 1st edition
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Abstract: The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your overall intrusion detection accuracy. Intrusion Detection Networks: A Key to Collaborative Security focuses on the design of IDNs and explains how to leverage effective and efficient collaboration between participant IDSs. Providing a complete introduction to IDSs and IDNs, it explains the benefits of building IDNs, identifies the challenges underlying their design, and outlines possible solutions to these problems. It also reviews the full-range of proposed IDN solutions—analyzing their scope, topology, strengths, weaknesses, and limitations. Includes a case study that examines the applicability of collaborative intrusion detection to real-world malware detection scenarios Illustrates distributed IDN architecture design Considers trust management, intrusion detection decision making, resource management, and collaborator management The book provides a complete overview of network intrusions, including their potential damage and corresponding detection methods. Covering the range of existing IDN designs, it elaborates on privacy, malicious insiders, scalability, free-riders, collaboration incentives, and intrusion detection efficiency. It also provides a collection of problem solutions to key IDN design challenges and shows how you can use various theoretical tools in this context. The text outlines comprehensive validation methodologies and metrics to help you improve efficiency of detection, robustness against malicious insiders, incentive-compatibility for all participants, and scalability in network size. It concludes by highlighting open issues and future challenges.
    Note: Online resource; Title from title page (viewed November 19, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (954 pages)
    Edition: 2nd edition
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Abstract: The concept of Crime Prevention Through Environmental Design (CPTED) has undergone dramatic changes over the last several decades since C. Ray Jeffery coined the term in the early 1970s, and Tim Crowe wrote the first CPTED applications book. The second edition of 21st Century Security and CPTED includes the latest theory, knowledge, and practice of CPTED as it relates to the current security threats facing the modern world: theft, violent crime, terrorism, gang activity, and school and workplace violence. This significantly expanded edition includes the latest coverage of proper lighting, building design-both the interior and exterior-physical security barriers, the usage of fencing, bollards, natural surveillance, landscaping, and landscape design. Such design concepts and security elements can be applied to address a wide variety of threats including crime prevention, blast mitigation, and CBRNE threat protection. Authored by one of the U.S.'s renowned security experts-and a premiere architect and criminologist-the book is the most comprehensive examination of CPTED and CPTED principles available. This edition includes a complete update of all chapters in addition to five new chapters, over 700 figure illustrations and photos, numerous tables and checklists, and a 20-page color plate section. This latest edition: Features five new chapters including green and sustainable buildings, infrastructure protection, and premises liability Presents step-by-step guidelines and real-world applications of CPTED concepts, principles and processes-from risk assessment to construction and post-occupancy evaluation Outlines national building security codes and standards Examines architectural surety from the perspective of risk analysis and premises liability Demonstrates CPTED implementation in high-security environments, such as hospitals, parks, ATMs, schools, and public and private sector buildings A practical resource for architects, urban planners and designers, security managers, law enforcement, CPTED practitioners, building and property managers, homeland security professionals, and students, 21st Century Security and CPTED, Second Edition continues to serve as the most complete and up-to-date reference available on next-generation CPTED practices today.
    Note: Online resource; Title from title page (viewed June 25, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    ISBN: 0738438464 , 9780738438467
    Language: English
    Pages: 1 online resource (638 pages)
    Series Statement: IBM Redbooks
    Parallel Title: Erscheint auch als
    DDC: 005.376
    Keywords: WebSphere ; Computational grids (Computer systems) ; Application software Development ; Client/server computing ; Web servers Computer programs ; Electronic books ; local ; WebSphere ; WebSphere ; Electrical & Computer Engineering ; Engineering & Applied Sciences ; Telecommunications ; Grilles informatiques ; Logiciels d'application ; Développement ; Architecture client-serveur (Informatique) ; Serveurs Web ; Logiciels ; Application software ; Development ; Client/server computing ; Computational grids (Computer systems) ; Web servers ; Computer programs
    Abstract: This IBM® Redbooks® publication provides information about the concepts, planning, and design of IBM WebSphere® Application Server V8.5 environments. The target audience of this book is IT architects and consultants who want more information about the planning and design of application-serving environments, from small to large, and complex implementations. This book addresses the packaging and features in WebSphere Application Server V8.5, and highlights the most common implementation topologies. It provides information about planning for specific tasks and components that conform to the WebSphere Application Server environment. Also in this book are planning guidelines for Websphere Application Server V8.5 and Websphere Application Server Network Deployment V8.5 on distributed platforms. It also includes guidelines for WebSphere Application Server for IBM z/OS® V8.5. This book contains information about migration considerations when moving from previous releases. Please note that the additional material referenced in the text is not available from IBM.
    Note: Online resource; Title from title page (viewed June 25, 2012) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321463425 , 0321463420
    Language: English
    Pages: xxiii, 403 p , ill. , 24 cm
    Keywords: Mobile computing ; Application software ; Development ; Smartphones ; Pocket computers ; Electronic books ; local
    Abstract: The release of MIDP 2.0 and the introduction of the new Mobile Service Architecture (MSA) are generating momentum for the Java ME platform. As more and more Java-enabled mobile devices become available and more service providers become open to third-party development, the demand for customized applications will grow dramatically. Now, there's a practical, realistic guide to building MIDP 2.0/MSA applications that are robust, responsive, maintainable, and fun. Long-time Java ME author Jonathan Knudsen offers real solutions for the complex challenges of coding efficiency, application design, and usability in constrained mobile environments. Experienced Java developers will master MIDP 2.0 and MSA programming through clear, carefully designed examples. Downloadable code is available for both NetBeans Mobility Pack and the Sun Java Wireless Toolkit. Kicking Butt with MIDP and MSA 's wide-ranging content covers: Pushing MIDP's limits, and exploiting MSA's full power Using MIDlets, Forms, commands, core classes, and invocation Building effective mobile user interfaces Designing graphics with the Canvas, the Game API, SVG, and 3D Providing storage and resources: record stores, FileConnection, and PDA PIM Internationalizing mobile applications Networking via WMA, Bluetooth, Web services, and SIP Parsing XML documents Implementing audio and advanced multimedia Securing mobile applications with SATSA and the Payment API Building advanced location-based applications Designing applications for multiple devices Creating end-to-end mobile application architectures
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxiv, 798 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: "The book you are about to read will arm you with the knowledge you need to defend your network from attackers-both the obvious and the not so obvious.... If you are new to network security, don't put this book back on the shelf! This is a great book for beginners and I wish I had access to it many years ago. If you've learned the basics of TCP/IP protocols and run an open source or commercial IDS, you may be asking 'What's next?' If so, this book is for you." -Ron Gula, founder and CTO, Tenable Network Security, from the Foreword "Richard Bejtlich has a good perspective on Internet security-one that is orderly and practical at the same time. He keeps readers grounded and addresses the fundamentals in an accessible way." -Marcus Ranum, TruSecure "This book is not about security or network monitoring: It's about both, and in reality these are two aspects of the same problem. You can easily find people who are security experts or network monitors, but this book explains how to master both topics." -Luca Deri, ntop.org "This book will enable security professionals of all skill sets to improve their understanding of what it takes to set up, maintain, and utilize a successful network intrusion detection strategy." -Kirby Kuehl, Cisco Systems Every network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen? Network security monitoring (NSM) equips security staff to deal with the inevitable consequences of too few resources and too many responsibilities. NSM collects the data needed to generate better assessment, detection, and response processes-resulting in decreased impact from unauthorized activities. In The Tao of Network Security Monitoring , Richard Bejtlich explores the products, people, and processes that implement the NSM model. By focusing on case studies and the application of open source tools, he helps you gain hands-on knowledge of how to better defend networks and how to mitigate damage from security incidents. Inside, you will find in-depth information on the following areas. The NSM operational framework and deployment considerations. How to use a variety of open-source tools-including Sguil, Argus, and Ethereal-to mine network traffic for full content, session, statistical, and ale...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 702 p. , ill. ; , 25 cm
    Edition: 2nd ed.
    DDC: 005.1
    Keywords: Linux ; Application software ; Development ; Electronic books ; local
    Abstract: "The first edition of this book has always been kept within arm's reach of my desk due to the wonderful explanations of all areas of the Linux userspace API. This second edition greatly overshadows the first one, and will replace it." --Greg Kroah-Hartman, Linux kernel programmer Develop Software that Leverages the Full Power of Today's Linux Linux Application Development, Second Edition, is the definitive reference for Linux programmers at all levels of experience, including C programmers moving from other operating systems. Building on their widely praised first edition, leading Linux programmers Michael Johnson and Erik Troan systematically present the key APIs and techniques you need to create robust, secure, efficient software or to port existing code to Linux. This book has been fully updated for the Linux 2.6 kernel, GNU C library version 2.3, the latest POSIX standards, and the Single Unix Specification, Issue 6. Its deep coverage of Linux-specific extensions and features helps you take advantage of the full power of contemporary Linux. Along the way, the authors share insights, tips, and tricks for developers working with any recent Linux distribution, and virtually any version of Unix. Topics include Developing in Linux: understanding the operating system, licensing, and documentation The development environment: compilers, linker and loader, and unique debugging tools System programming: process models, file handling, signal processing, directory operations, and job control Terminals, sockets, timers, virtual consoles, and the Linux console Development libraries: string matching, terminal handling, command-line parsing, authentication, and more Hundreds of downloadable code samples New to this edition The GNU C library (glibc), underlying standards, and test macros Writing secure Linux programs, system daemons, and utilities Significantly expanded coverage of memory debugging, including Valgrind and mpr Greatly improved coverage of regular expressions IPv6 networking coverage, including new system library interfaces for using IPv6 and IPv4 interchangeably Coverage of strace, ltrace, real-time signals, poll and epoll system calls, popt library improvements, Pluggable Authentication Modules (PAM), qdbm, and much more Improved index and glossary, plus line-numbered code examples
    Note: Includes bibliographical references (p. 679-682) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxix, 412 p. , ill. ; , 23 cm
    DDC: 005.8
    Keywords: Computer crimes ; Prevention ; Computer hackers ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: Stories about hacking, stolen credit card numbers, computer viruses, and identity theft are all around us, but what do they really mean to us? The goal of this book, quite simply, is to help educate people on the issues with high-tech crimes. High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front demystifies the risks and realities of high-tech crimes. Demystifying these crimes and raising the awareness of users of technology will make people smarter and safer, and that will make all of us safer in the long run. Steven Branigan shares the inside details of real cases he worked on in his various roles in law-enforcement, information technology, and security. The result is a comprehensive, accessible look at how digital crimes are discovered, what techniques the criminals use and why, and (in some cases) how they can be brought to justice. Inside, you'll find extensive information on Actual hacker investigations, including the harm caused and how the criminals were tracked and caught The ins and outs of identity theft, a rapidly growing crime with potential for serious damage Using the criminology and psychology of hackers to detect and deter attacks The risks associated with various technologies Do's and don'ts for high-tech criminal investigations This easily understandable book will take you beyond hearing about high-tech crimes to actually understanding how and why they happen-and what can be done to protect yourself. "Most books on this topic impart knowledge in the form of techniques and methods. This book differs in that it imparts Steven Branigan's experience in the field, and real case studies in which problems are framed and effective solutions are crafted. In this respect this book imparts not only knowledge, but Steve's experience and wisdom as well." -Mike Tarrani, Independent Consultant "Steven Branigan provides a gripping account of what's involved in investigating computer crime. I strongly recommend this book to any security practitioner or anyone with an interest in computer security." -Michael Nickle, Lead Consultant, VeriSign "Being on the inside of several high-tech busts has given Steven Branigan the ability to make this book intriguing enough to keep high-tech types interested, while also doing a superb job of demystifying these real-life cases in a way that anyone can read and enjoy." -David Kensiski, Director of Operations, InfiniRoute Networks "The modern high-tech industry brought new things to our lives. B...
    Note: Includes bibliographical references (p. [389]-395) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 418 p. , ill. ; , 23 cm. +
    DDC: 005.13/3
    Keywords: Application software ; Development ; Internet programming ; Java (Computer program language) ; Web servers ; Web site development ; Java (Langage de programmation) ; Logiciels d'application ; Développement ; Programmation sur Internet ; Serveurs Web ; Sites Web ; Développement ; Electronic books ; local
    Abstract: Written by Sun Microsystems' Java™ BluePrints team, Designing Web Services with the J2EE™ 1.4 Platform is the authoritative guide to the best practices for designing and integrating enterprise-level Web services using the Java 2 Platform, Enterprise Edition (J2EE) 1.4. This book provides the guidelines, patterns, and real-world examples architects and developers need in order to shorten the learning curve and start building robust, scalable, and portable solutions. The authors use the Java Adventure Builder application to bring the design process to life and help illustrate the use of Java APIs for XML Processing (JAXP), Java APIs for XML-Based RPC (JAX-RPC), and other Web service and Java-XML technologies. Key topic coverage includes: Web service requirements and design issues Support for Web services provided by the J2EE 1.4 platform Designing and implementing Web service end points Writing efficient Web service client applications Designing and developing XML-based applications Integrating applications and data using Web services The J2EE platform security model as it applies to Web services A coherent programming model for designing and developing Web service endpoints and clients Designing Web Services with the J2EE™ 1.4 Platform provides the insight, advice, and detail that make it easier to create effective Web service applications using the J2EE 1.4 platform.
    Note: Includes bibliographical references (p. xx-xxii) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 006.7/6
    Keywords: Application software ; Development ; Internet programming ; Web site development ; XML (Document markup language) ; Electronic books ; local
    Abstract: Praise for XForms: XML Powered Web Forms "XForms is an exciting new technology for designing Web forms in an elegant and accessible way. Raman's book provides strong motivations for flexibility in the design of human-machine interactions, and explains how to use XForms to this end in crystal-clear prose." - Eve Maler XML Standards Architect, Sun Microsystems "Interactive forms technology is the logical evolution of Web user interface design. XForms represents a significant leap forward in that evolution." - Sean McGrath CTO, Propylon "The greatest strength of this book is the skill with which T. V. Raman links the XForms technology with the larger context of the Web. The limitations of HTML forms, the ways in which XForms provides a better foundation for Web and Web service user interfaces, and the opportunities for an XForms-powered Web that is accessible to all users and devices are outlined and brought together in a compelling way." - Michael Champion Advisory Research and Development Specialist, Software AG "Raman's book gives the reader an excellent explanation of the emerging W3C XForms recommendation. It's a well-organized and well-written book that begins with a gentle introduction to the concepts that motivated the development of XForms and then provides a reasonable overview of the relevant XML technology related to XForms. Most of the book covers XForms components: user interface controls, model properties, functions, actions, and events. It concludes with XForms as a Web service, offering multi-modal access and accessibility. In light of the October 2003 deadline for U.S. federal agencies to comply with the mandate of the Government Paperwork Elimination Act (GPEA) to give citizens the opportunity to provide information online, this important technical work comes none too soon. As T. V. masterfully elucidates, XForms provides the 'last mile' in 'connecting users to their data.' Insightfully, he also observes 'the document is the human interface' to data-an understanding without which the challenge to make eGov services 'citizen-centered' simply cannot and will not be met." - Owen Ambur Cofounder and Cochair, XML Working Group, U.S. CIO Council "I found the author's straightforward style quite comfortable and informative. I heartily recommend this book, especially for government XML developers interested in the broader area of E-Forms. Understanding XForms is key to developing robust and flexible E-Forms solutions that separate cont...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 488 p. , ill. ; , 24 cm
    DDC: 005.2/76
    Keywords: Application software ; Development ; Business enterprise ; Data processing ; Web services ; Electronic books ; local
    Abstract: "Linthicum provides an insightful overview of the services-integration issues that will enable you to capitalize on current and future integration technologies. He also dives deep into the key Web services technologies for implementing the next generation integration architecture. Highly recommended for those thinking of moving from traditional EAI to Web services." --Dr. Ravi Kalakota, CEO, E-Business Strategies Author of Services Blueprint: Roadmap for Execution For a majority of businesses, application integration is an outright failure. Most companies' computer systems are labyrinthine at best and self-destructive at worst. With the arrival of Web services, the new service-oriented middleware technology standard, and increasingly complex and challenging problem domains, it's time to take application integration to the next level. In Next Generation Application Integration distributed computing and application-integration expert David S. Linthicum describes the effect that this new generation of middleware will have on traditional application-integration efforts. Using key industry examples and case studies, Linthicum reveals the techniques and practices that are necessary to revolutionize data-sharing for any company--from sole-proprietorship to Fortune 500. In this book you'll find a thorough discussion of today's most advanced application-integration concepts, approaches, technologies, and solutions. Written with the technical manager and enterprise architect in mind, this book addresses essential application integration issues such as: Strategies for dealing with complex problem domains Forward-looking approaches to ensure long-term solutions that are right for your company Techniques for implementation of new Web services middleware Introductions to the appropriate technologies for next generation application integration Scenarios for Web services integration Support concepts outlined by case studies and real-world examples Descriptions and analyses of the different types of Web service integration--standards, implementation, and enabling technology Full analysis of Web services and integration, including the relationship between EAI and Web services How to leverage both vertical and horizontal application-integration standards If you're responsible for managing or implementing application-integration middleware, Next Generation Application Integration will prove to be an indispensable resource. 0201844567B07142003
    Note: Includes bibliographical references (p. 463-470) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 349 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: "Ajay and Scott take an interesting approach in filling Defend I.T. with case studies and using them to demonstrate important security principles. This approach works well and is particularly valuable in the security space, where companies and consultants are often hesitant to discuss true security incidents for potential embarrassment and confidentiality reasons. Defend I.T. is full of engaging stories and is a good read." --Fyodor, author of the Nmap Security Scanner and Insecure.Org " Defend I.T. answers reader demand for scenario-driven examples. Security professionals will be able to look at these case studies and relate them to their own experiences. That sets this book apart." --Lance Hayden, Cisco Systems "This is an exciting book! It's like reading several mysteries at once from different viewpoints, with the added benefit of learning forensic procedures along the way. Readers will benefit from the procedures, and the entertaining presentation is a real plus." --Elizabeth Zinkann, Equilink Consulting The battle between IT professionals and those who use the Internet for destructive purposes is raging--and there is no end in sight. Reports of computer crime and incidents from the CERT Coordination Center at Carnegie Mellon University more than double each year and are expected to rise. Meanwhile, viruses and worms continue to take down organizations for days. Defend I.T.: Security by Example draws on detailed war stories to identify what was done right and what was done wrong in actual computer-security attacks, giving you the opportunity to benefit from real experiences. Approaches to securing systems and networks vary widely from industry to industry and organization to organization. By examining a variety of real-life incidents companies are too embarrassed to publicly share, the authors explain what could have been done differently to avoid the losses incurred--whether creating a different process for incident response or having better security countermeasures in place to begin with. Inside, you'll find in-depth case studies in a variety of categories: Basic Hacking: Blackhat bootcamp, including mapping a network, exploiting vulnerable architecture, and launching denial-of-service attacks Current Methods: The latest in malicious deeds, including attacks on wireless networks, viruses and worms, and compromised Web servers Additional Items on the Plate: Often overlooked security measures such as developing a security policy, intrusio...
    Note: Includes bibliographical references (p. 321-326) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 492 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Web sites ; Security measures ; Electronic books ; local
    Abstract: "Both novice and seasoned readers will come away with an increased understanding of how Web hacking occurs and enhanced skill at developing defenses against such Web attacks. Technologies covered include Web languages and protocols, Web and database servers, payment systems and shopping carts, and critical vulnerabilities associated with URLs. This book is a virtual battle plan that will help you identify and eliminate threats that could take your Web site off line..." --From the Foreword by William C. Boni, Chief Information Security Officer, Motorola "Just because you have a firewall and IDS sensor does not mean you aresecure; this book shows you why." --Lance Spitzner, Founder, The Honeynet Project Whether it's petty defacing or full-scale cyber robbery, hackers are moving to the Web along with everyone else. Organizations using Web-based business applications are increasingly at risk. Web Hacking: Attacks and Defense is a powerful guide to the latest information on Web attacks and defense. Security experts Stuart McClure (lead author of Hacking Exposed ), Saumil Shah, and Shreeraj Shah present a broad range of Web attacks and defense. Features include: Overview of the Web and what hackers go after Complete Web application security methodologies Detailed analysis of hack techniques Countermeasures What to do at development time to eliminate vulnerabilities New case studies and eye-opening attack scenarios Advanced Web hacking concepts, methodologies, and tools "How Do They Do It?" sections show how and why different attacks succeed, including: Cyber graffiti and Web site defacements e-Shoplifting Database access and Web applications Java™ application servers; how to harden your Java™ Web Server Impersonation and session hijacking Buffer overflows, the most wicked of attacks Automated attack tools and worms Appendices include a listing of Web and database ports, cheat sheets for remote command execution, and source code disclosure techniques. Web Hacking informs from the trenches. Experts show you how to connect the dots--how to put the stages of a Web hack together so you can best defend against them. Written for maximum brain absorption with unparalleled technical content and battle-tested analysis, Web Hacking will help you combat potentially costly security threats and attacks. 0201761769B07192002
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 533 p. , ill. ; , 24 cm
    DDC: 005.1
    Keywords: Application software ; Development ; Business ; Data processing ; Computer architecture ; System design ; Electronic books ; local
    Abstract: The practice of enterprise application development has benefited from the emergence of many new enabling technologies. Multi-tiered object-oriented platforms, such as Java and .NET, have become commonplace. These new tools and technologies are capable of building powerful applications, but they are not easily implemented. Common failures in enterprise applications often occur because their developers do not understand the architectural lessons that experienced object developers have learned. Patterns of Enterprise Application Architecture is written in direct response to the stiff challenges that face enterprise application developers. The author, noted object-oriented designer Martin Fowler, noticed that despite changes in technology--from Smalltalk to CORBA to Java to .NET--the same basic design ideas can be adapted and applied to solve common problems. With the help of an expert group of contributors, Martin distills over forty recurring solutions into patterns. The result is an indispensable handbook of solutions that are applicable to any enterprise application platform. This book is actually two books in one. The first section is a short tutorial on developing enterprise applications, which you can read from start to finish to understand the scope of the book's lessons. The next section, the bulk of the book, is a detailed reference to the patterns themselves. Each pattern provides usage and implementation information, as well as detailed code examples in Java or C#. The entire book is also richly illustrated with UML diagrams to further explain the concepts. Armed with this book, you will have the knowledge necessary to make important architectural decisions about building an enterprise application and the proven patterns for use when building them. The topics covered include · Dividing an enterprise application into layers · The major approaches to organizing business logic · An in-depth treatment of mapping between objects and relational databases · Using Model-View-Controller to organize a Web presentation · Handling concurrency for data that spans multiple transactions · Designing distributed object interfaces
    Note: Includes bibliographical references (p. 511-516) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxi, 468 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.7/2
    Keywords: Application software ; Development ; UML (Computer science) ; Web site development ; Electronic books ; local
    Abstract: This is a new edition of the widely acclaimed Building Web Applications with UML . Based on the author's extensive experience as a Web developer, it incorporates helpful reader feedback, identifies and addresses modeling problems unique to page-based Web applications, and offers practical advice and straightforward solutions. This thoroughly revised Second Edition reflects the latest techniques and issues surrounding the development of software and systems for the Web. You will find: Updated, expanded examples and diagrams Enhanced coverage of the latest Web application security concerns Detailed coverage of proven object technology concepts as applied to the development of Web applications Robust, scalable, and feature-rich Web applications are attainable. Using the industry-standard Unified Modeling Language (UML) to create designs allows Web application developers to easily integrate them with other systems modeled in UML. Written for project managers, architects, analysts, designers, and implementers, Building Web Applications with UML, Second Edition , demystifies the challenging aspects of modeling with the Web Application Extension (WAE) for the Unified Modeling Language. Because UML has been widely accepted as the standard language for modeling software systems, it is without question the best option for modeling Web application designs. The WAE extends the UML notation with semantics and constructs that empower you to model Web-specific architectural elements using the Rational Unified Process or an alternative methodology. Furthermore, using UML allows the modeling of Web applications as a part of the complete system and the integration of the business logic that must be reflected in each application. With this book as your guide, you will be able to gain a clear understanding of how to address the unique problems of modeling the design of page-based Web applications, and more important, how to take your model directly into working code. 0201730383B08282002
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.268
    Keywords: Microsoft foundation class library ; Application software ; Development ; Microsoft .NET Framework ; Electronic books ; local
    Abstract: "To anyone looking to augment their existing MFC code base and knowledge with the powerful .NET classes-which provide such capabilities as disconnected data, in-memory database (IMDB), regular expressions, and data encryption-Tom Archer's book has it all." - Erik Westermann, Lead Architect, Eidenai Innovations Extending MFC Applications with the .NET Framework is the first book to show MFC developers how to boost productivity by incorporating .NET functionality into existing MFC applications. Tom Archer clearly illustrates how using the .NET Base Class Library (BCL)-to complement or replace MFC classes when there is a clear advantage-enables MFC developers to create elegant and robust Windows applications in the most efficient way possible. Each chapter begins with an introduction that explains the technology, outlines its benefits, lists its pragmatic business uses, and summarizes the required syntax. As is an Archer trademark, this information is solidified with hands-on, practical demo applications. This book answers the questions MFC developers have about .NET, including: What are the key issues when combining MFC and Managed Extensions? Page 15 How can Regular Expressions be used to parse a document for multiple complex pattern types, such as email addresses? Page 84 How can hash codes be used to validate users without storing passwords? Page 161 How can MFC applications maintain data stored in XML format? Page 274 Once an ADO.NET DataSet is filled, how can the data be searched, sorted, and filtered? Page 336 What technique is used for reading image data from a database using ADO.NET classes? Page 363 What are the options for handling disconnected data concurrency issues? Page 396 How can Remoting be used to pass MFC objects between applications? Page 460 The CD-ROM supplies the complete downloadable source code, working samples, and test code from the book, as well as several productivity-enhancing utilities such as a Visual Studio .NET Custom AppWizard. 032117352XB11142003
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxii, 236 p. , ill. ; , 24 cm
    DDC: 005.1
    Keywords: Application software ; Development ; Software patterns ; Use cases (Systems engineering) ; Electronic books ; local
    Abstract: Use cases have become an integral part of modeling software requirements, but many software developers are discovering that writing effective use cases is more difficult than they had anticipated. An understanding of the basic principles of use cases is not enough. Software developers need a source of objective criteria by which to judge quality and effectiveness. Patterns for Effective Use Cases provides this set of objective criteria. Written by experienced use case practitioners, this book fills a critical information gap by presenting a pattern language that contains over thirty patterns, providing simple, elegant, and proven solutions to the most common problems in use case development. These patterns distill and define the properties and characteristics of quality use cases. As such, they facilitate the development of original use cases and provide a diagnostic tool for evaluating existing ones. The book opens with a review of use cases and pattern fundamentals, along with a discussion of the requirements-gathering team. These patterns address the use case development process, the internal structure of use cases, and the relationships among use cases within the system as a whole. Examples of patterns include: BreadthBeforeDepth VisibleBoundary EverUnfoldingStory IntentionRevealingName PreciseAndReadable LeveledSteps InterruptsAsExtensions RedistributeTheWealth Each pattern discussion includes at least one example demonstrating its real-world application, highlighting both the benefits of using the pattern and the consequences of not doing so. In addition, the book presents guidelines for the effective use of UML with relevant patterns. Anyone involved in use case writing or requirements gathering will find Patterns for Effective Use Cases an indispensable handbook and reference. 0201721848B07302002
    Note: Includes bibliographical references (p. 217-218) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Language: English
    Pages: xxviii, 322 p. , ill. ; , 25 cm
    Edition: 2nd ed.
    DDC: 005.8
    Keywords: Business enterprises ; Computer networks ; Security measures ; Computer networks ; Security measures ; Public key infrastructure (Computer security) ; Electronic books ; local
    Abstract: PKI (public-key infrastructure) enables the secure exchange of data over otherwise unsecured media, such as the Internet. PKI is the underlying cryptographic security mechanism for digital certificates and certificate directories, which are used to authenticate a message sender. Because PKI is the standard for authenticating commercial electronic transactions, Understanding PKI, Second Edition , provides network and security architects with the tools they need to grasp each phase of the key/certificate life cycle, including generation, publication, deployment, and recovery.
    Note: Revised ed. of: Understanding public-key infrastructure. 1999. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    Boston : Addison-Wesley | [Erscheinungsort nicht ermittelbar] : HathiTrust Digital Library
    ISBN: 9780201708523 , 0201708523 , 0201708523
    Language: English
    Pages: 1 online resource (xxi, 800 pages) , illustrations.
    Series Statement: DevelopMentor series
    Parallel Title: Erscheint auch als
    DDC: 005.276
    RVK:
    RVK:
    Keywords: Microsoft Visual studio ; Microsoft .NET Framework ; Application software Development ; Web sites Design ; Microsoft Visual Studio (Computer file) ; Microsoft Visual studio ; Microsoft .NET Framework ; Logiciels d'application ; Développement ; Sites Web ; Conception ; Application software ; Development ; Web sites ; Design ; Visual Studio.NET
    Note: Includes index. - Print version record , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Language: English
    Pages: vii, 394 p. , ill. ; , 24 cm
    DDC: 005.2/768
    Keywords: Microsoft Visual BASIC ; Application software ; Development ; BASIC (Computer program language) ; Web site development ; Electronic books ; local
    Abstract: Get on the fast track of what is becoming a required skill for software developers--the ability to create Web Services and clients that consume them. Web Services leverage standards such as XML, XSD, SOAP, and WSDL to enable interoperability across programming languages and platforms. They work well to integrate applications on an intranet and on the Internet. Visual Basic .NET, coupled with the .NET Framework, is an attractive environment for Web Services architecture because it provides for rapid development and easy maintenance. This book explains each of the standard protocols needed for Web Service interaction on the client or server. These protocols include SOAP, Web Services Description Language (WSDL), and Universal Description Discovery and Integration (UDDI). Creating and Consuming Web Services in Visual Basic ® also includes Information on how to shape SOAP messages and the data they contain Explanations of how to create applications that consume Web Services Detailed case studies that explore how to use Web Services to help solve real-world B2B and B2C problems Thorough coverage of development concerns such as security and availability Instructions for how to create and consume Web services in earlier versions of VB and convert legacy applications to a Web Services platform 0672321564B06072002
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xi, 575 p. , ill. ; , 23 cm
    DDC: 005.7/2
    Keywords: JavaServer pages ; Application software ; Development ; Web sites ; Design ; XML (Document markup language) ; Electronic books ; local
    Abstract: The first Internet revolution was all about delivering information to people. We are now in the second revolution, which focuses on delivering information to systems. XML is the tool that makes this new revolution a reality, and Web services are the methods by which businesses will drive system-to-system communication. JSP(TM) and XML takes you beyond the basics, giving you practical advice and in-depth coverage. In the book, you'll learn the technologies and techniques needed to create your own Web services for use in JSP applications. Written by programmers for programmers, the book will help you successfully utilize these exciting technologies with minimal hassle and maximum speed. In JSP™ and XML you will: Learn how to use XML, XSLT, and XPath in your JSP site Program SAX to speed up your XML document processing Understand DOM to learn the W3C standard method of working with XML Coordinate cross-browser client-side XML utilization Understand the Web services alphabet Learn how to leverage Web services to simplify access to your data Learn how SOAP, WSDL, and UDDI integrate into Web Services Use JDOM and dom4J to easily work with XML files Design a balanced JSP site using XML Expand your knowledge of JSP to add new functionality to your Web pages Learn how to practically apply Servlet filters and listeners to a Web site Build dynamic JSP pages that can self- modify, making sites easier to maintain Understand how the new JSP XML syntax works Review the basics of database access within JSP Learn JSP tag library design and how tag libraries simplify using XML and Web Services
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    ISBN: 9780672334023 , 067233402X
    Language: English
    Pages: 1 online resource (xvi, 245 p.) , ill.
    Edition: 2nd ed.
    Series Statement: Addison-Wesley object technology series
    Parallel Title: Erscheint auch als
    Keywords: Application software ; Development ; Use cases (Systems engineering) ; Electronic books ; local
    Abstract: Use case analysis is a methodology for defining the outward features of a software system from the user's point of view. Applying Use Cases, Second Edition, offers a clear and practical introduction to this cutting-edge software development technique. Using numerous realistic examples and a detailed case study, you are guided through the application of use case analysis in the development of software systems. This new edition has been updated and expanded to reflect the Unified Modeling Language (UML) version 1.3. It also includes more complex and precise examples, descriptions of the pros and cons of various use case documentation techniques, and discussions on how other modeling approaches relate to use cases. Applying Use Cases, Second Edition, walks you through the software development process, demonstrating how use cases apply to project inception, requirements and risk analysis, system architecture, scheduling, review and testing, and documentation. Key topics include: Identifying use cases and describing actors Writing the flow of events, including basic and alternative paths Reviewing use cases for completeness and correctness Diagramming use cases with activity diagrams and sequence diagrams Incorporating user interface description and data description documents Testing architectural patterns and designs with use cases Applying use cases to project planning, prototyping, and estimating Identifying and diagramming analysis classes from use cases Applying use cases to user guides, test cases, and training material An entire section of the book is devoted to identifying common mistakes and describing their solutions. Also featured is a handy collection of documentation templates and an abbreviated guide to UML notation. You will come away from this book with a solid understanding of use cases, along with the skills you need to put use case analysis to work.
    Note: Description based on print version record. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...