Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Information Technology & Software Development


41. 

The Well-Grounded Rubyist, Second Edition

The Well-Grounded Rubyist, Second Edition

By: David A. Black

Publisher: Manning Publications

Publication Date: 24-JUN-2014

Insert Date: 24-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

This is a good time for Ruby! It’s powerful like Java or C++, and has dynamic features that let your code react gracefully to changes at runtime. And it’s elegant, so creating applications, development tools, and administrative scripts is easier and more straightforward. With the long-awaited Ruby 2, an active development community, and countless libraries and productivity tools, Ruby has come into its own. The Well-Grounded Rubyist, Second Edition is a beautifully written tutorial that begins with your first Ruby program and goes on to explore sophisticated topics like callable...

42. 

Pro Linux High Availability Clustering

Pro Linux High Availability Clustering

By: Sander van Vugt

Publisher: Apress

Publication Date: 28-JUL-2014

Insert Date: 24-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

"Pro Linux High Availability Clustering teaches you how to implement this fundamental Linux add-on into your business. Linux High Availability Clustering is needed to ensure the availability of mission critical resources. The technique is applied more and more in corporate datacenters around the world. While lots of documentation about the subject is available on the internet, it isn't always easy to build a real solution based on that scattered information, which is often oriented towards specific tasks only. Pro Linux High Availability Clustering explains essential high-availability...

43. 

Exam Ref 70-481: Essentials of Developing Windows Store Apps Using HTML5 and JavaScript

Exam Ref 70-481: Essentials of Developing Windows Store Apps Using HTML5 and JavaScript

By: Wouter de Kort

Publisher: Microsoft Press

Publication Date: 18-JUL-2014

Insert Date: 24-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

Fully updated! Prepare for Microsoft Exam 70-481 - and help demonstrate your real-world mastery of Windows Store app development using HTML5 and JavaScript. Designed for experienced developers ready to advance their status, Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the MCSD level. Focus on the expertise measured by these objectives: Design Windows Store apps Develop Windows Store apps Create the user interface Program user interaction Manage security and data This Microsoft Exam Ref: Is fully updated for Windows...

44. 

Exam Ref 70-688 Supporting Windows 8.1

Exam Ref 70-688 Supporting Windows 8.1

By: Joli Ballew

Publisher: Microsoft Press

Publication Date: 22-JUL-2014

Insert Date: 24-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

Fully updated for Windows 8.1! Prepare for Microsoft Exam 70-688—and help demonstrate your real-world mastery of managing and maintaining Windows 8.1 in the enterprise. Designed for experienced IT professionals ready to advance their status, Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the MCSA or MCSE level. Focus on the expertise measured by these objectives: Design an installation and application strategy Maintain resource access Maintain Windows clients and devices Manage Windows 8.1 using cloud services and Microsoft...

45. 

Cyber Crime and Cyber Terrorism Investigator's Handbook

Cyber Crime and Cyber Terrorism Investigator's Handbook

By: Babak Akhgar; Andrew Staniforth; Francesca Bosco

Publisher: Syngress

Publication Date: 26-NOV-2014

Insert Date: 24-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

Cyber Crime and Cyber Terrorism Investigator’s Handbook is a vital tool in the arsenal of today’s computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today’s security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator’s Handbook describes and...

46. 

Exam Ref 70-414: Implementing an Advanced Server Infrastructure

Exam Ref 70-414: Implementing an Advanced Server Infrastructure

By: Steve Suehring

Publisher: Microsoft Press

Publication Date: 22-JUL-2014

Insert Date: 23-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

Prepare for Exam 70-414—and help demonstrate your real-world mastery of advanced server design, planning, and implementation. Designed for experienced, MCSA-certified professionals ready to advance their status—Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the MCSE level. Optimize your exam-prep by focusing on the expertise needed to: Manage and Maintain a Server Infrastructure Plan and Implement a Highly Available Enterprise Infrastructure Plan and Implement a Server Virtualization Infrastructure Design and Implement Identity and...

47. 

Joomla! 3 Beginner's Guide Second Edition

Joomla! 3 Beginner's Guide Second Edition

By: Eric Tiggeler

Publisher: Packt Publishing

Publication Date: 22-JUL-2014

Insert Date: 23-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

Build, develop, and manage a fully functioning, professional looking, and feature-rich website with the Joomla! CMS Build and maintain your own website quickly, easily, and efficiently, getting the most out of the fully revised Joomla content management system Learn all the necessary web building skills: from organizing your content to completely changing the site design Learn by doing: follow step-by-step instructions on how to create an example website that meets real-life requirements In Detail Taking full advantage of all the new features and enhancements added to...

48. 

Die elektronische Welt mit Arduino entdecken, 2nd Edition

Die elektronische Welt mit Arduino entdecken, 2nd Edition

By: Erik Bartmann

Publisher: O'Reilly Verlag

Publication Date: 21-JUL-2014

Insert Date: 23-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

Die elektronische Welt mit Arduino entdecken hat bereits in der ersten Auflage alle Rekorde und Superlativen geschafft, die in diesem Bereich möglich sind. Und jetzt legt der Autor mit seiner zweiten Auflage noch ordentlich einen drauf: Er hat sein Buch auf über 1.000 Seiten erweitert, stellt zahlreiche neue Projekte vor und beschreibt die Interaktion mit anderen Boards wie dem Raspberry Pi. Die einzige Voraussetzung, die man für Die elektronische Welt mit Arduino entdecken mitbringen muss, ist Neugierde. Für den Rest sorgt der Autor Erik Bartmann, der den Leser Schritt für Schritt in die...

49. 

Multiple Imputation of Missing Data Using SAS

Multiple Imputation of Missing Data Using SAS

By: Patricia Berglund; Steven G. Heeringa

Publisher: SAS Institute

Publication Date: 01-JUL-2014

Insert Date: 23-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

Find guidance on using SAS for multiple imputation and solving common missing data issues. Multiple Imputation of Missing Data Using SAS provides both theoretical background and constructive solutions for those working with incomplete data sets in an engaging example-driven format. It offers practical instruction on the use of SAS for multiple imputation and provides numerous examples that use a variety of public release data sets with applications to survey data. Written for users with an intermediate background in SAS programming and statistics, this book is an excellent resource for...

50. 

Introduction to Information Systems, 5th Edition International Student Version

Introduction to Information Systems, 5th Edition International Student Version

By: 

Publisher: John Wiley & Sons

Publication Date: 21-APR-2014

Insert Date: 23-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

The goal of Rainer, Introduction to Information Systems 5e is to teach all business majors, especially undergraduate ones, how to use information technology to master their current or future jobs and to help ensure the success of their organization. To accomplish this goal, this text helps students to become informed users; that is, persons knowledgeable about information systems and information technology. The focus is not on merely learning the concepts of IT but rather on applying those concepts to facilitate business processes. The content concentrate on placing information systems in...

51. 

Suchmaschinenoptimierung mit Google Webmaster Tools

Suchmaschinenoptimierung mit Google Webmaster Tools

By: Stephan Czysch

Publisher: O'Reilly Verlag

Publication Date: 18-JUL-2014

Insert Date: 22-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

Die kostenlos von Google bereitgestellten Webmaster-Tools helfen Websiteinhabern dabei, ihre Webseiten zu konfigurieren, zu analysieren und zu optimieren. Sie bieten ihnen unter anderem Antworten auf die Fragen “Zu welchen Suchanfragen wird meine Website gefunden?“, “Wer verlinkt auf meine Website?“, “Wie viele Seiten meines Webauftritts werden von Google tatsächlich indexiert?“ und “Welche Optimierung kann ich vornehmen?”. Unverzichtbar sind die Tools u.a. für die Suchmaschinenoptimierung. Wer eine umfassende Anleitung zum Einsatz der Google Webmaster-Tools sucht, ist bei diesem Buch genau...

52. 

Cloudera Administration Handbook

Cloudera Administration Handbook

By: Rohit Menon

Publisher: Packt Publishing

Publication Date: 18-JUL-2014

Insert Date: 22-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

A complete, hands-on guide to building and maintaining large Apache Hadoop clusters using Cloudera Manager and CDH5 Understand the CDH architecture and its components and successfully set up a Hadoop cluster Maintain, troubleshoot, and secure your cluster using Cloudera Manager Easy-to-follow administrator’s guide with step-by-step explanations to help you master Apache Hadoop In Detail Apache Hadoop is an open source distributed computing technology that assists users in processing large volumes of data with relative ease, helping them to generate tremendous insights...

53. 

Migrating to Android for iOS Developers

Migrating to Android for iOS Developers

By: Sean Liao

Publisher: Apress

Publication Date: 20-JUL-2014

Insert Date: 22-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

Migrating to Android for iOS Developers gives you—as an experienced native iOS app developer—the skills to learn native Android apps development from scratch. Starting with preparing your Android integrated development environment and introducing just enough Android application framework fundamentals, you'll understand how to create a simple but meaningful HelloAndroid project immediately. This book provides the guidelines and tutorial projects to show you how to translate your existing iOS app to the Android platform. You'll use your mobile app knowledge to structure your Android apps...

54. 

Automation through Chef Opscode

Automation through Chef Opscode

By: Navin Sabharwal; Manak Wadhwa

Publisher: Apress

Publication Date: 20-JUL-2014

Insert Date: 22-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

Automation through Chef Opscode provides an in-depth understanding of Chef, which is written in Ruby and Erlang for configuration management, cloud infrastructure management, system administration, and network management. Targeted at administrators, consultants, and architect, the book guides them through the advanced features of the tool which are necessary for infrastructure automation, devops automation, and reporting. The book presumes knowledge of Ruby and Erlang which are used as reference languages for creating recipes and cookbooks and as a refresher on them to help the reader...

55. 

Rough Cuts
Django Unleashed

Django Unleashed

By: Andrew Pinkham

Publisher: Sams

Publication Date: 21-APR-2015

Insert Date: 22-JUL-2014

Table of Contents • Start Reading

This is the rough cut version of the printed book This book provides a step-by-step, beginner-friendly example which demonstrates both Django's core and contributed library. At each step of the process, the reader will be introduced to a new Django feature. By following all of the instructions within the book, the reader will have completed a fully-functional website hosted online. Rather than chapters of reference materials, the book reveals Django's underlying architecture. The work also examines Django's source code, discussing common web patterns. By understanding how Django works, the...

56. 

PostgreSQL 9 High Availability Cookbook

PostgreSQL 9 High Availability Cookbook

By: Shaun M. Thomas

Publisher: Packt Publishing

Publication Date: 17-JUL-2014

Insert Date: 19-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

Over 100 recipes to design and implement a highly available server with the advanced features of PostgreSQL Create a PostgreSQL cluster that stays online even when disaster strikes Avoid costly downtime and data loss that can ruin your business Perform data replication and monitor your data with hands-on industry-driven recipes and detailed step-by-step explanations In Detail PostgreSQL, often known as simply "Postgres", is an object-relational database management system (ORDBMS) with an emphasis on extensibility and standards-compliance. From hardware selection to...

57. 

Agile Governance and Audit

Agile Governance and Audit

By: Christopher Wright

Publisher: IT Governance Ltd

Publication Date: 19-JUN-2014

Insert Date: 19-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

“There are many things that I liked about this book, in particular the author's ability to energise the (sometimes dry) topics of auditing and software development with entertaining real-life examples and refreshing humour.” Jamie Lynn Cooke,  Agile expert and author of Agile Productivity Unleashed “The author is an auditor writing about Agile from an expert’s point of view. This brings structure to a methodology which many assume is anarchic and potentially prone to descent into chaos at a moment’s notice ... I can see many organisations using this book as an extra...

58. 

Information Security Breaches: Avoidance and Treatment Based on ISO27001, 2nd Edition

Information Security Breaches: Avoidance and Treatment Based on ISO27001, 2nd Edition

By: Michael Krausz

Publisher: IT Governance Ltd

Publication Date: 27-MAY-2014

Insert Date: 19-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

What if you suffer an information security breach? Many titles explain how to reduce the risk of information security breaches. Nevertheless breaches do occur, even to organisations that have taken all reasonable precautions.  Information Security Breaches - Avoidance and treatment based on ISO27001:2013  helps you to manage this threat by detailing what to do as soon as you discover a breach. Be prepared, be prompt, be decisive When your organisation’s security is compromised, you cannot afford to waste time deciding how to resolve the issue. You must be ready to take prompt and...

59. 

Penetration Testing Services Procurement Guide

Penetration Testing Services Procurement Guide

By: CREST

Publisher: IT Governance Ltd

Publication Date: 15-MAY-2014

Insert Date: 19-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

Helping you to conduct effective, value-for-money penetration testing, this guide is designed to enable your organisation to plan for a penetration test, select an appropriate third party provider and manage all important related activities.It presents a useful overview of the key concepts you will need to understand to conduct a well-managed penetration test, explaining what a penetration test is (and is not), outlining its strengths and limitations, and describing why an organisation would typically choose to employ an external provider of penetration testing services. ...

60. 

Procuring Penetration Testing Services

Procuring Penetration Testing Services

By: CREST

Publisher: IT Governance Ltd

Publication Date: 15-MAY-2014

Insert Date: 19-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

Organisations like yours have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat to key systems is ever increasing and the probability of a security weakness being accidentally exposed or maliciously exploited needs to be continually assessed – such as via a penetration test – to ensure that the level of risk is at an acceptable level to the business. A penetration test involves the use of a variety of manual and automated techniques to simulate an attack on an organisation’s information security arrangements –...