Programmer's Guide to Apache Thrift
Programmer's Guide to Apache Thrift provides comprehensive coverage of the Apache Thrift framework along with a developer's-eye view of modern distributed application architecture.
Programmer's Guide to Apache Thrift provides comprehensive coverage of distributed application communication using the Thrift framework. Packed with code examples and useful insight, this book presents best practices for multi-language distributed development. You'll take a guided tour through transports, protocols, IDL, and servers as you explore programs in C++, Java, and Python. You'll also learn how to work with pl ...
Applied Cryptography in .NET and Azure Key Vault
Benefit from Microsoft's robust suite of security and cryptography primitives to create a complete, hybrid encryption scheme that will protect your data against breaches. This highly practical book teaches you how to use the .NET encryption APIs and Azure Key Vault, and how they can work together to produce a robust security solution.
Applied Cryptography in .NET and Azure Key Vault begins with an introduction to the dangers of data breaches and the basics of cryptography. It then takes you through important cryptographic techniques and practices, from hashing and symmetric/asymmetric encryption, to key storage mechanisms. By the end of the book, you'll know how to combine these cryptographic primitives into a hybrid encryption scheme that you can use in your applications.
Author Stephen Haunts brings 25 years of software development and security experience to the table to give you the concrete skills, knowledge, and code you need to implement the latest encryption standards in yo ...
Scaling Your Startup
Know how your company can accelerate growth by not only tapping into new growth vectors, but also by adapting its organization, culture, and processes.
To oversee growth from an idea to a company with billions in revenue, CEOs must reinvent many aspects of their company in anticipation of it reaching ever-higher revenues. Author Peter Cohan takes you through the four stages of scaling: winning the first customers, building a scalable business model, sprinting to liquidity, and running the marathon.
Discover how founders keep their CEO positions by managing the organizational change needed to reach the next stage of scaling; Read case studies that illustrate how CEOs craft growth strategies, raise capital, create culture, build their organizations, set goals, and manage processes to achieve them; Discover principles of successful scaling through comparisons of successful and less successful companies; Use the Scaling Quotient to assess your startup's readiness to grow; Follow a ro ...
Building Digital Experience Platforms
Use digital experience platforms (DXP) to improve your development productivity and release timelines. Leverage the pre-integrated feature sets of DXPs in your organization's digital transformation journey to quickly develop a personalized, secure, and robust enterprise platform.
In this book the authors examine various features of DXPs and provide rich insights into building each layer in a digital platform. Proven best practices are presented with examples for designing and building layers. A special focus is provided on security and quality attributes needed for business-critical enterprise applications. The authors cover modern and emerging digital trends such as Blockchain, IoT, containers, chatbots, artificial intelligence, and more.
The book is divided into five parts related to requirements/design, development, security, infrastructure, and case study. The authors employ proven real-world methods, best practices, and security and integration techniques derived from ...
Windows 10 Inside Out, 3rd Edition
Dive into Windows 10 - and really put your Windows expertise to work. Focusing on Windows 10's newest, most powerful, and most innovative features, this supremely organized reference packs hundreds of timesaving solutions, up-to-date tips, and workarounds. From the new Timeline to key improvements in Microsoft Edge, Cortana, security, and virtualization, you'll discover how experts tackle today's essential tasks. Adapt to faster change in today's era of “Windows as a service,” as you challenge yourself to new levels of mastery.
Install, configure, and personalize the latest versions of Windows 10; Manage Windows reliability, security, and feature updates in any environment; Maximize your productivity with Windows 10's growing library of built-in apps; Pinpoint information fast with advanced Windows Search and Cortana techniques; Discover major Microsoft Edge enhancements, from extensions to accessibility; Use Cortana to perform tasks, set reminders, retrieve data, and get instan ...
Modern C Quick Syntax Reference, 2nd Edition
Discover how C's efficiency makes it a popular choice in a wide variety of applications and operating systems with special applicability to wearables, game programming, system level programming, embedded device/firmware programming and in Arduino and related electronics hobbies in this condensed code and syntax guide. This book presents the essential C syntax in a well-organized format that can be used as a quick and handy reference.
In this book, you will find short, simple, and focused code examples; and a well laid out table of contents and a comprehensive index allowing easy review. You won't find any technical jargon, bloated samples, drawn out history lessons, or witty stories. What you will find is a language reference that is concise, to the point and highly accessible. The book is packed with useful information and is a must-have for any C programmer.
Code for some of today's modern and popular firmware and systems; How to do embedded programming found in Arduino ...
Python Continuous Integration and Delivery
Gain the techniques and tools that enable a smooth and efficient software development process in this quick and practical guide on Python continuous integration (CI) and continuous delivery (CD). Based on example applications, this book introduces various kinds of testing and shows you how to set up automated systems that run these tests, and install applications in different environments in controlled ways. Python Continuous Integration and Delivery tackles the technical problems related to software development that are typically glossed over in pure programming texts.
After reading this book, you'll see that in today's fast-moving world, no software project can afford to go through development, then an integration phase of unpredictable length and complexity, and finally be shipped to the customer - just to find out that the resulting application didn't quite fill their need. Instead, you'll discover that practicing continuous integration and continuous delivery reduces the ...
Pro Spring Boot 2
Quickly and productively develop complex Spring applications and microservices out of the box, with minimal concern over things like configurations. This revised book will show you how to fully leverage the Spring Boot 2 technology and how to apply it to create enterprise ready applications that just work. It will also cover what's been added to the new Spring Boot 2 release, including Spring Framework 5 features like WebFlux, Security, Actuator and the new way to expose Metrics through Micrometer framework, and more.
This book is your authoritative hands-on practical guide for increasing your enterprise Java and cloud application productivity while decreasing development time. It's a no nonsense guide with case studies of increasing complexity throughout the book. The author, a senior solutions architect and Principal Technical instructor with Pivotal, the company behind the Spring Framework, shares his experience, insights and first-hand knowledge about how Spring Bo ...
An Executive's Guide to Software Quality in an Agile Organization
Utilize a set of practical guidelines to help your Agile organization elevate software design quality as an important business driver to achieve customer satisfaction and, ultimately, higher revenue for your company. This is the first book to focus on a holistic quality view—what it is and how it links to overall business enhancements.
The real-world examples used in this book allow you to learn and apply similar strategies and guidelines to help create a quality blueprint for your organization. Five pillars of quality are defined that can be used for any industry and, once internalized, can serve as a set of tools to continuously improve and measure the key factors impacting quality.
Be aware of the key elements in any transformation that involves culture; Link quality and business outcomes; Understand quality and its holistic definition and why continuous improvement is still a relevant approach in enhancing quality; Follow guidelines with specific examples that can be applie ...
PMP in Depth
Use this study guide to prepare for the Project Management Professional (PMP) exam administered by the Project Management Institute (PMI).
The revised third edition of the best-selling PMP in Depth, updated to the sixth edition of PMBOK, has a laser-sharp focus on the exam objectives for project managers and others who want to pass the PMP exam. No prior knowledge of project management is assumed.
The chapters and the sections within each chapter are presented in a logical learning sequence. The concepts and topics, both simple and complex, are clearly explained when they appear for the first time. This facilitates step-wise learning, prevents confusion, and makes this book useful for those who want to get up to speed quickly to pass the PMP exam, even if you are new to the discipline of project management.
This book tells the story of project management in a cohesive, concise, yet comprehensive fashion. Unlike most PMP exam books, PMP in Depth covers the material in th ...
Quick Start Guide to Penetration Testing
Get started with NMAP, OpenVAS, and Metasploit in this short book and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. You will begin by working with NMAP and ZENMAP and learning the basic scanning and enumeration process. After getting to know the differences between TCP and UDP scans, you will learn to fine tune your scans and efficiently use NMAP scripts. This will be followed by an introduction to OpenVAS vulnerability management system. You will then learn to configure OpenVAS and scan for and report vulnerabilities.
The next chapter takes you on a detailed tour of Metasploit and its basic commands and configuration. You will then invoke NMAP and OpenVAS scans from Metasploit. Lastly, you will take a look at scanning services with Metasploit and get to know more about Meterpreter, an advanced, dynamically extensible payload that is extended over the network at runtime.
The final part of the book concludes ...