Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Information Technology & Software Development


1. 

SignalR Real-time Application Cookbook

SignalR Real-time Application Cookbook

By: Roberto Vespa

Publisher: Packt Publishing

Publication Date: 23-APR-2014

Insert Date: 24-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Use SignalR to create real-time, bidirectional, and asynchronous applications based on standard web technologies Build high performance real-time web applications Broadcast messages from the server to many clients simultaneously Implement complex and reactive architectures In Detail SignalR is a recent addition to ASP.NET, which allows you to add real-time functionalities to your applications. SignalR enables bidirectional communication between client and server over HTTP, transparently, and ensures you're always provided with the experience of a persistent...

2. 

Getting Started with XenDesktop® 7.x

Getting Started with XenDesktop® 7.x

By: Craig Thomas Ellrod

Publisher: Packt Publishing

Publication Date: 22-APR-2014

Insert Date: 24-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Deliver desktops and applications to your end users, anywhere, anytime, with XenDesktop 7.x Build a complete and secure XenDesktop 7 site from the ground up Discover how to virtualize and deliver accessible desktops and applications to your end users Full of clear, step-by-step instructions with screenshots, which will walk you through the entire process of XenDesktop site creation In Detail Citrix is an established name in today's Bring Your Own Device (BYOD) era by virtue of their desktop and application virtualization platforms, with the capability to assign...

3. 

Mastering Object-oriented Python

Mastering Object-oriented Python

By: Steven Lott

Publisher: Packt Publishing

Publication Date: 22-APR-2014

Insert Date: 24-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Grasp the intricacies of object-oriented programming in Python in order to efficiently build powerful real-world applications Create applications with flexible logging, powerful configuration and command-line options, automated unit tests, and good documentation Use the Python special methods to integrate seamlessly with built-in features and the standard library Design classes to support object persistence in JSON, YAML, Pickle, CSV, XML, Shelve, and SQL In Detail Object-oriented programming involves challenges that transcend writing Python class statements. Designing...

4. 

C im 21. Jahrhundert, 2nd Edition

C im 21. Jahrhundert, 2nd Edition

By: 

Publisher: O'Reilly Verlag

Publication Date: 10-APR-2014

Insert Date: 24-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Werfen Sie Ihre Vorstellungen von C über Bord und lernen Sie eine Programmiersprache neu kennen, die ihren Wurzeln schon lange entwachsen ist. Mit C im 21. Jahrhundert werden Sie aktuelle Techniken entdecken, die in keinem anderen Buch über C zu finden sind. C ist nicht nur die Grundlage der modernen Programmiersprachen - C selbst ist eine moderne Sprache, ideal zum Schreiben effizienter Applikationen auf dem neuesten Stand der Technik. Trennen Sie sich von alten Angewohnheiten, die auf Mainframes sinnvoll waren, und entdecken Sie in diesem Buch die Tools, die Sie zur Arbeit mit dieser...

5. 

HTML5 kurz & gut, 5th Edition

HTML5 kurz & gut, 5th Edition

By: 

Publisher: O'Reilly Verlag

Publication Date: 22-APR-2014

Insert Date: 24-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Diese Kurzreferenz ist der optimale Begleiter für alle Web- und App-Entwickler, die Wert legen auf zeitgemäßes, standardkonformes Webdesign. Dieser Klassiker des O'Reilly-Programms wurde für die vorliegende 5. Auflage komplett überarbeitet und auf HTML5 umgestellt. Das Buch ist zum Nachschlagen bestens geeignet und bietet einen gut strukturierten Überblick über alle HTML-Elemente und ihre Attribute....

6. 

Google This!

Google This!

By: Terry Ballard

Publisher: Chandos Publishing

Publication Date: 18-MAY-2012

Insert Date: 24-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Many libraries and museums have adapted to the current information climate, working with Google, Facebook, Twitter and iTunes to deliver information for their users. Many have not. Google This! describes the variety of free or nearly free options for social media, and shows how libraries are adapting, from the Library of Congress to small public libraries. The author presents conversations with social media innovators to show how their experience can create success for your institution’s library. Chapters cover important aspects of social media for libraries including: how they relate to...

7. 

Data Clean-Up and Management

Data Clean-Up and Management

By: Margaret Hogarth; Kenneth Furuta

Publisher: Chandos Publishing

Publication Date: 22-OCT-2012

Insert Date: 24-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Data use in the library has specific characteristics and common problems. Data Clean-up and Management addresses these, and provides methods to clean up frequently-occurring data problems using readily-available applications. The authors highlight the importance and methods of data analysis and presentation, and offer guidelines and recommendations for a data quality policy. The book gives step-by-step how-to directions for common dirty data issues. Focused towards libraries and practicing librarians Deals with practical, real-life issues and addresses common problems that all...

8. 

Managed Code Rootkits

Managed Code Rootkits

By: Erez Metula

Publisher: Syngress

Publication Date: 25-NOV-2010

Insert Date: 24-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Imagine being able to change the languages for the applications that a computer is running and taking control over it. That is exactly what managed code rootkits can do when they are placed within a computer. This new type of rootkit is hiding in a place that had previously been safe from this type of attack—the application level. Code reviews do not currently look for back doors in the virtual machine (VM) where this new rootkit would be injected. An invasion of this magnitude allows an attacker to steal information on the infected computer, provide false information, and disable...

9. 

Python Tools for Visual Studio

Python Tools for Visual Studio

By: Martino Sabia; Cathy Wang

Publisher: Packt Publishing

Publication Date: 21-APR-2014

Insert Date: 23-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Leverage the power of the Visual Studio IDE to develop better and more efficient Python projects Learn how you can take advantage of IDE for debugging and testing Python applications Enhance your efficiency in Django development with Visual Studio IntelliSense Venture into the depths of Python programming concepts, presented in a detailed and clear manner In Detail Python Tools for Visual Studio is a free and open source plugin for Visual Studio 2010. It enables developers to use all the major productivity features of Visual Studio to build Python code using either...

10. 

Rake Task Management Essentials

Rake Task Management Essentials

By: Andrey Koleshko

Publisher: Packt Publishing

Publication Date: 21-APR-2014

Insert Date: 23-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Deploy, test, and build software using Rake Solve real-world automation challenges with human readable code Build or deploy an application package quickly Easy-to-follow instructions to speed up tasks and manage them efficiently In Detail Rake is a build automation tool written in Ruby. It allows you to specify tasks and describe dependencies as well as to group tasks in a namespace. Rake uses Ruby's anonymous function blocks to define various tasks, allowing the use of the Ruby syntax. It has a library of common tasks, for example, functions to do common...

11. 

Learning Veeam® Backup & Replication for VMware vSphere

Learning Veeam® Backup & Replication for VMware vSphere

By: Christian Mohn

Publisher: Packt Publishing

Publication Date: 21-APR-2014

Insert Date: 23-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Learn how to protect your data in your VMware vSphere infrastructure with Veeam® Backup and Replication Explore Veeam Backup and Replication v7 infrastructure and its components Create backup, replication, and restore strategies that protect data, your company's most valuable asset Includes advanced features like off-site replication and tape retention In Detail Veeam Backup and Replication for VMware is a backup and replication solution that provides data protection for virtualized VMware vSphere environments. This powerful and easy-to-use solution helps administrators...

12. 

Effective Methods for Software and Systems Integration

Effective Methods for Software and Systems Integration

By: Boyd Summers

Publisher: Auerbach Publications

Publication Date: 01-JUN-2012

Insert Date: 23-APR-2014

Slots: 1.0

Table of Contents • Start Reading

This book supplies the understanding needed to achieve continuous improvements in quality throughout the software life cycle. It defines time-tested methods for systems engineering, software design, software engineering informal/formal builds, software engineering installations, software and systems integration, delivery activities, and product evaluations. Complete with helpful forms, plans, and checklists, the book will help readers deliver projects that are on time and within budget constraints in military and aerospace programs as well as the software industry. ...

13. 

IT's All about the People: Technology Management That Overcomes Disaffected People, Stupid Processes, and Deranged Corporate Cultures

IT's All about the People: Technology Management That Overcomes Disaffected People, Stupid Processes, and Deranged Corporate Cultures

By: Stephen Andriole

Publisher: Auerbach Publications

Publication Date: 20-OCT-2011

Insert Date: 23-APR-2014

Slots: 1.0

Table of Contents • Start Reading

This book explains how to achieve dramatic improvements in service and agility by enhancing the people, processes, and culture within your organization. It details the various roles within the technology management process and supplies insight into the realities of human behavior—including the range of best and worst behaviors from managers, executives, and corporate culture. Industry veteran Stephen J. Andriole provides a fresh perspective on the old basics of IT management through a twenty-first-century lens. ...

14. 

Data Mining and Machine Learning in Cybersecurity

Data Mining and Machine Learning in Cybersecurity

By: Sumeet Dua; Xian Du

Publisher: Auerbach Publications

Publication Date: 25-APR-2011

Insert Date: 23-APR-2014

Slots: 1.0

Table of Contents • Start Reading

From basic concepts in machine learning and data mining to advanced problems in the machine learning domain, this book provides a unified reference for specific machine learning solutions to cybersecurity problems. It supplies a foundation in cybersecurity fundamentals, surveys contemporary challenges, and details cutting-edge machine learning and data mining techniques. This interdisciplinary resource includes technique review tables that allow for speedy access to common cybersecurity problems and associated data mining methods. Numerous illustrative figures and more than 40 case studies...

15. 

FISMA Principles and Best Practices: Beyond Compliance

FISMA Principles and Best Practices: Beyond Compliance

By: Patrick Howard

Publisher: Auerbach Publications

Publication Date: 29-MAR-2011

Insert Date: 23-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Detailing a proven approach for establishing and implementing a comprehensive information security program, this book integrates compliance review, technical monitoring, and remediation efforts to explain how to achieve and maintain compliance with Federal Information Security Management Act (FISMA) requirements. Based on the author’s experience developing, implementing, and maintaining enterprise FISMA-based information technology security programs at three major federal agencies, the book provides workable solutions for establishing and operating an effective security compliance program....

16. 

Rough Cuts
CCIE Routing and Switching v5.0 Official Cert Guide, Volume 1, Fifth Edition

CCIE Routing and Switching v5.0 Official Cert Guide, Volume 1, Fifth Edition

By: Narbik Kocharians; Peter Paluch

Publisher: Cisco Press

Publication Date: 21-JUL-2014

Insert Date: 23-APR-2014

Table of Contents • Start Reading

This is the Rough Cut version of the printed book. The first of two volumes, this is Cisco's official, complete self-study resource for the LAN switching, IP networking, and IGP routing areas of the new CCIE Routing and Switching 5.0 exam. Designed for experienced networking professionals, it covers every objective in these areas concisely and logically, with extensive teaching features designed to help you retain more and gain deeper insight. You'll find: A Getting Started Chapter and New Study Plan Template on DVD to help you organize and optimize your study plan so you won't waste...

17. 

Switched Networks Companion Guide

Switched Networks Companion Guide

By: Cisco Networking Academy

Publisher: Cisco Press

Publication Date: 20-MAY-2014

Insert Date: 23-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Switched Networks Companion Guide is the official supplemental textbook for the Switched Networks course in the Cisco® Networking Academy® CCNA® Routing and Switching curriculum. This course describes the architecture, components, and operations of a converged switched network. You will learn about the hierarchical network design model and how to configure a switch for basic and advanced functionality. By the end of this course, you will be able to troubleshoot and resolve common issues with Virtual LANs and inter-VLAN routing in a converged network. You will also develop the knowledge and...

18. 

Official (ISC)2® Guide to the ISSMP® CBK®

Official (ISC)2® Guide to the ISSMP® CBK®

By: (ISC)² Corporate; Harold Tipton

Publisher: Auerbach Publications

Publication Date: 11-APR-2011

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Preparing professionals for certification and job readiness, the Official (ISC)²<SUP>®</SUP> Guide to CISSP<SUP>®</SUP>-ISSMP<SUP>® </SUP>CBK<SUP>®</SUP> supplies a complete overview of the management topics related to information security. It provides for an expanded enterprise model of security and management that delves into project management, risk management, and continuity planning. Facilitating the mastery of the five ISSEP domains required for certification, this book will not only help you prepare for the CISSP-ISSMP certification exam, but also provide you with a solid foundation...

19. 

Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS

Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS

By: Tyson Macaulay; Bryan Singer

Publisher: Auerbach Publications

Publication Date: 13-DEC-2011

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

As industrial control systems (ICS) become Internet-facing, they expose crucial services to attack. Explaining how to develop and implement an effective cybersecurity program for ICS, this book provides the tools to ensure network security without sacrificing efficiency and functionality. Starting with an introduction to ICS, it discusses business, cost, competitive, and regulatory drivers and the conflicting priorities of convergence. It explains why security requirements differ from IT to ICS and explains when standard IT security solutions can be used and where SCADA practices are...

20. 

Mobile Opportunistic Networks: Architectures, Protocols and Applications

Mobile Opportunistic Networks: Architectures, Protocols and Applications

By: Mieso Denko

Publisher: Auerbach Publications

Publication Date: 26-MAY-2011

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

From fundamentals to advanced concepts, this book provides comprehensive technical coverage of this rapidly emerging communications technology. The first section focuses on modeling, networking architecture, and routing problems. The second section examines opportunistic networking technologies and applications. Supplying detailed discussions of key research challenges and open issues, this comprehensive resource provides a clear understanding of industrial and professional standards, communication architectures, network algorithms and protocols, emerging applications, and the latest...