Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Information Technology & Software Development


1. 

Python Tools for Visual Studio

Python Tools for Visual Studio

By: Martino Sabia; Cathy Wang

Publisher: Packt Publishing

Publication Date: 21-APR-2014

Insert Date: 23-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Leverage the power of the Visual Studio IDE to develop better and more efficient Python projects Learn how you can take advantage of IDE for debugging and testing Python applications Enhance your efficiency in Django development with Visual Studio IntelliSense Venture into the depths of Python programming concepts, presented in a detailed and clear manner In Detail Python Tools for Visual Studio is a free and open source plugin for Visual Studio 2010. It enables developers to use all the major productivity features of Visual Studio to build Python code using either...

2. 

Rake Task Management Essentials

Rake Task Management Essentials

By: Andrey Koleshko

Publisher: Packt Publishing

Publication Date: 21-APR-2014

Insert Date: 23-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Deploy, test, and build software using Rake Solve real-world automation challenges with human readable code Build or deploy an application package quickly Easy-to-follow instructions to speed up tasks and manage them efficiently In Detail Rake is a build automation tool written in Ruby. It allows you to specify tasks and describe dependencies as well as to group tasks in a namespace. Rake uses Ruby's anonymous function blocks to define various tasks, allowing the use of the Ruby syntax. It has a library of common tasks, for example, functions to do common...

3. 

Learning Veeam® Backup & Replication for VMware vSphere

Learning Veeam® Backup & Replication for VMware vSphere

By: Christian Mohn

Publisher: Packt Publishing

Publication Date: 21-APR-2014

Insert Date: 23-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Learn how to protect your data in your VMware vSphere infrastructure with Veeam® Backup and Replication Explore Veeam Backup and Replication v7 infrastructure and its components Create backup, replication, and restore strategies that protect data, your company's most valuable asset Includes advanced features like off-site replication and tape retention In Detail Veeam Backup and Replication for VMware is a backup and replication solution that provides data protection for virtualized VMware vSphere environments. This powerful and easy-to-use solution helps administrators...

4. 

Effective Methods for Software and Systems Integration

Effective Methods for Software and Systems Integration

By: Boyd Summers

Publisher: Auerbach Publications

Publication Date: 01-JUN-2012

Insert Date: 23-APR-2014

Slots: 1.0

Table of Contents • Start Reading

This book supplies the understanding needed to achieve continuous improvements in quality throughout the software life cycle. It defines time-tested methods for systems engineering, software design, software engineering informal/formal builds, software engineering installations, software and systems integration, delivery activities, and product evaluations. Complete with helpful forms, plans, and checklists, the book will help readers deliver projects that are on time and within budget constraints in military and aerospace programs as well as the software industry. ...

5. 

IT's All about the People: Technology Management That Overcomes Disaffected People, Stupid Processes, and Deranged Corporate Cultures

IT's All about the People: Technology Management That Overcomes Disaffected People, Stupid Processes, and Deranged Corporate Cultures

By: Stephen Andriole

Publisher: Auerbach Publications

Publication Date: 20-OCT-2011

Insert Date: 23-APR-2014

Slots: 1.0

Table of Contents • Start Reading

This book explains how to achieve dramatic improvements in service and agility by enhancing the people, processes, and culture within your organization. It details the various roles within the technology management process and supplies insight into the realities of human behavior—including the range of best and worst behaviors from managers, executives, and corporate culture. Industry veteran Stephen J. Andriole provides a fresh perspective on the old basics of IT management through a twenty-first-century lens. ...

6. 

Data Mining and Machine Learning in Cybersecurity

Data Mining and Machine Learning in Cybersecurity

By: Sumeet Dua; Xian Du

Publisher: Auerbach Publications

Publication Date: 25-APR-2011

Insert Date: 23-APR-2014

Slots: 1.0

Table of Contents • Start Reading

From basic concepts in machine learning and data mining to advanced problems in the machine learning domain, this book provides a unified reference for specific machine learning solutions to cybersecurity problems. It supplies a foundation in cybersecurity fundamentals, surveys contemporary challenges, and details cutting-edge machine learning and data mining techniques. This interdisciplinary resource includes technique review tables that allow for speedy access to common cybersecurity problems and associated data mining methods. Numerous illustrative figures and more than 40 case studies...

7. 

FISMA Principles and Best Practices: Beyond Compliance

FISMA Principles and Best Practices: Beyond Compliance

By: Patrick Howard

Publisher: Auerbach Publications

Publication Date: 29-MAR-2011

Insert Date: 23-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Detailing a proven approach for establishing and implementing a comprehensive information security program, this book integrates compliance review, technical monitoring, and remediation efforts to explain how to achieve and maintain compliance with Federal Information Security Management Act (FISMA) requirements. Based on the author’s experience developing, implementing, and maintaining enterprise FISMA-based information technology security programs at three major federal agencies, the book provides workable solutions for establishing and operating an effective security compliance program....

8. 

Rough Cuts
CCIE Routing and Switching v5.0 Official Cert Guide, Volume 1, 5/e

CCIE Routing and Switching v5.0 Official Cert Guide, Volume 1, 5/e

By: Narbik Kocharians; Peter Paluch

Publisher: Cisco Press

Publication Date: 21-JUL-2014

Insert Date: 23-APR-2014

Table of Contents • Start Reading

This is the Rough Cut version of the printed book. The first of two volumes, this is Cisco's official, complete self-study resource for the LAN switching, IP networking, and IGP routing areas of the new CCIE Routing and Switching 5.0 exam. Designed for experienced networking professionals, it covers every objective in these areas concisely and logically, with extensive teaching features designed to help you retain more and gain deeper insight. You'll find: A Getting Started Chapter and New Study Plan Template on DVD to help you organize and optimize your study plan so you won't waste...

9. 

Switched Networks Companion Guide

Switched Networks Companion Guide

By: Cisco Networking Academy

Publisher: Cisco Press

Publication Date: 20-MAY-2014

Insert Date: 23-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Switched Networks Companion Guide is the official supplemental textbook for the Switched Networks course in the Cisco® Networking Academy® CCNA® Routing and Switching curriculum. This course describes the architecture, components, and operations of a converged switched network. You will learn about the hierarchical network design model and how to configure a switch for basic and advanced functionality. By the end of this course, you will be able to troubleshoot and resolve common issues with Virtual LANs and inter-VLAN routing in a converged network. You will also develop the knowledge and...

10. 

Official (ISC)2® Guide to the ISSMP® CBK®

Official (ISC)2® Guide to the ISSMP® CBK®

By: (ISC)² Corporate; Harold Tipton

Publisher: Auerbach Publications

Publication Date: 11-APR-2011

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Preparing professionals for certification and job readiness, the Official (ISC)²<SUP>®</SUP> Guide to CISSP<SUP>®</SUP>-ISSMP<SUP>® </SUP>CBK<SUP>®</SUP> supplies a complete overview of the management topics related to information security. It provides for an expanded enterprise model of security and management that delves into project management, risk management, and continuity planning. Facilitating the mastery of the five ISSEP domains required for certification, this book will not only help you prepare for the CISSP-ISSMP certification exam, but also provide you with a solid foundation...

11. 

Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS

Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS

By: Tyson Macaulay; Bryan Singer

Publisher: Auerbach Publications

Publication Date: 13-DEC-2011

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

As industrial control systems (ICS) become Internet-facing, they expose crucial services to attack. Explaining how to develop and implement an effective cybersecurity program for ICS, this book provides the tools to ensure network security without sacrificing efficiency and functionality. Starting with an introduction to ICS, it discusses business, cost, competitive, and regulatory drivers and the conflicting priorities of convergence. It explains why security requirements differ from IT to ICS and explains when standard IT security solutions can be used and where SCADA practices are...

12. 

Mobile Opportunistic Networks: Architectures, Protocols and Applications

Mobile Opportunistic Networks: Architectures, Protocols and Applications

By: Mieso Denko

Publisher: Auerbach Publications

Publication Date: 26-MAY-2011

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

From fundamentals to advanced concepts, this book provides comprehensive technical coverage of this rapidly emerging communications technology. The first section focuses on modeling, networking architecture, and routing problems. The second section examines opportunistic networking technologies and applications. Supplying detailed discussions of key research challenges and open issues, this comprehensive resource provides a clear understanding of industrial and professional standards, communication architectures, network algorithms and protocols, emerging applications, and the latest...

13. 

Information Security Governance Simplified: From the Boardroom to the Keyboard

Information Security Governance Simplified: From the Boardroom to the Keyboard

By: Todd Fitzgerald

Publisher: CRC Press

Publication Date: 20-DEC-2011

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Security practitioners must be able to build a cost-effective security program while at the same time meet the requirements of government regulations. This book lays out these regulations in simple terms and explains how to use the control frameworks to build an effective information security program and governance structure. It discusses how organizations can best ensure that the information is protected and examines all positions from the board of directors to the end user, delineating the role each plays in protecting the security of the organization. ...

14. 

Distributed Systems Architecture

Distributed Systems Architecture

By: Arno Puder; Kay Römer; Frank Pilhofer

Publisher: Morgan Kaufmann

Publication Date: 18-APR-2011

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Middleware is the bridge that connects distributed applications across different physical locations, with different hardware platforms, network technologies, operating systems, and programming languages. This book describes middleware from two different perspectives: from the viewpoint of the systems programmer and from the viewpoint of the applications programmer. It focuses on the use of open source solutions for creating middleware and the tools for developing distributed applications. The design principles presented are universal and apply to all middleware platforms, including CORBA...

15. 

Information Security Management Handbook, Sixth Edition, Volume 5

Information Security Management Handbook, Sixth Edition, Volume 5

By: Nozaki, Krause; Harold Tipton

Publisher: Auerbach Publications

Publication Date: 13-SEP-2011

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Updated annually to keep up with the increasingly fast pace of change in the field, the <EM>Information Security Management Handbook</EM> is the single most comprehensive and up-to-date resource on information security and assurance. Compiling the fundamental skills, techniques, tools, and understanding required of IT security professionals, the Information Security Management Handbook, <EM>Sixth Edition, Volume 5</EM> reflects the latest changes to information security and the CISSP<SUP>® </SUP>Common Body of Knowledge (CBK<SUP>®</SUP>). This edition updates the benchmark Volume 1 with a...

16. 

COSMIC Function Points: Theory and Advanced Practices

COSMIC Function Points: Theory and Advanced Practices

By: Reiner Dumke; Alain Abran

Publisher: Auerbach Publications

Publication Date: 03-FEB-2011

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Designed to conform to the ISO/IEC standard 14143, the Common Software Measurement International Consortium (COSMIC) Function Point method has become the major estimation technique based on international standards for building software-intensive systems. This book supplies a cutting-edge look at current and emerging practices in the international software measurement community. An international panel of experts details the steps for measuring the functional size of software and developing project estimates with improved accuracy. ...

17. 

CCNA Routing and Switching Review Guide: Exams 100-101, 200-101, and 200-120

CCNA Routing and Switching Review Guide: Exams 100-101, 200-101, and 200-120

By: 

Publisher: Sybex

Publication Date: 13-JAN-2014

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Todd Lammle's focused, concise review guide, updated for the latest CCNA exams CCNA is one of the most sought after certifications for IT professionals. If you're preparing for the CCNA Routing and Switching certification, this Sybex review guide offers the best quick review available. Organized by exam objective, it's the perfect supplement to other learning tools, including the Sybex CCNA Routing and Switching Study Guide (ISBN: 9781118749616). All exam topics from exams 100-101, 200-101, and 200-120 are thoroughly covered, and additional study materials including bonus exams,...

18. 

Teach Yourself VISUALLY Raspberry Pi

Teach Yourself VISUALLY Raspberry Pi

By: 

Publisher: Visual

Publication Date: 10-FEB-2014

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Full-color, step-by-step guidance for learning to use Raspberry Pi! Raspberry Pi is an inexpensive, single-board computer that serves as an introductory board for students and developing computer professionals. This image-driven, visual guide shows you how the Raspberry Pi can be easily used as a stand-alone computer, a media center, a web server, and much more. Vivid, full-color images bring Raspberry Pi projects to life, while well-illustrated circuit diagrams and step-by-step practical advice cover everything from working with the included software to branching out into typical but...

19. 

Mastering XPages: A Step-by-Step Guide to XPages Application Development and the XSP Language, Second Edition

Mastering XPages: A Step-by-Step Guide to XPages Application Development and the XSP Language, Second Edition

By: Martin Donnelly; Mark Wallace; Tony McGuckin

Publisher: IBM Press

Publication Date: 25-APR-2014

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

IBM's Best-Selling Guide to XPages Development–Now Updated and Expanded for Lotus Notes/Domino 9.0.1 XPages instantly revolutionized Notes/Domino application development, and the newest versions deliver unprecedented performance and flexibility. Now, the popular insider's guide to XPages development has been updated and expanded to reflect all these improvements, through IBM Notes/Domino 9.0.1 and beyond. Three key members of the IBM XPages team have brought together comprehensive knowledge for delivering outstanding solutions. They have added several hundred pages of new content,...

20. 

Targeted Cyber Attacks

Targeted Cyber Attacks

By: Aditya Sood; Richard Enbody

Publisher: Syngress

Publication Date: 18-APR-2014

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve intelligence-gathering and planning to a degree that drastically changes its profile. Individuals, corporations, and even governments are facing new threats from targeted attacks. Targeted Cyber Attacks examines real-world examples of directed...