KnockoutJS EssentialsKnockoutJS is a Model View ViewModel (MVVM) framework that allows you to simplify the design of complex user. Knockout makes data manipulation simple and leads to maintainable web applications.
KnockoutJS Essentials gives you an insight into the best practices when designing and building MVVM web applications using the KnockoutJS framework. Packed with real-world tasks, this book starts with an introduction to the Knockout library, helping you make organizational and design decisions. You get a walk-through of the key concepts and terms that are common to development of Knockout applications. Finally, you will learn about the full-stack Knockout framework DurandalJS, which will give you all the tools you need to write complete single-page applications. ...
Neo4j EssentialsWith a rise in the popularity of NoSQL databases, Neo4j provides a viable alternative for storage, processing, and querying highly connected data natively in the form of graphs. It saves you the trouble of tabular data formats and join operations while providing a fast querying language called Cypher, which is declarative and works on the principle of pattern matching. It is an open source database and has been tailored to be integrated into a wide variety of scenarios, platforms, and tools.
This book will guide you from the phase where you have to choose the appropriate license towards the deployment phase, instilling good design practices along the way. It will cover every required phase needed by a successful project. Using a fictitious project as a case study, you will learn the various implementation details and concepts of Neo4j that will help you develop your use cases quickly. ...
Lo-Dash EssentialsLo-Dash Essentials walks you through the Lo-Dash utility library, which promises consistency and performance in JavaScript development. This book looks into the most common functions and the various contexts in which they're used. You'll first start with object types and their properties, then you'll dive into larger development patterns, such as MapReduce, and how to chain functionality together. Following this, you'll learn how to make suitable builds for various environments, and discover how high-level patterns complement one another and how they lead to reusable building blocks for applications. Finally, you will gain some practical exposure to Lo-Dash by working alongside other libraries, and learn some useful techniques for improving performance. ...
OpenLayers 3: Beginner's GuideThis book is a practical, hands-on guide that provides you with all the information you need to get started with mapping using the OpenLayers 3 library.
The book starts off by showing you how to create a simple map. Through the course of the book, we will review each component needed to make a map in OpenLayers 3, and you will end up with a full-fledged web map application. You will learn the key role of each OpenLayers 3 component in making a map, and important mapping principles such as projections and layers. You will create your own data files and connect to backend servers for mapping. A key part of this book will also be dedicated to building a mapping application for mobile devices and its specific components. ...
OpenCV for Secret AgentsOpenCV is a grand collection of image processing functions and computer vision algorithms. It is open source, it supports many programming languages and platforms, and it is fast enough for many real-time applications. What a lot of gadgets we can build with such a handy library!
Taking inspiration from the world of James Bond, this book adds a spark of adventure and computer vision to your daily routine. Protect your home and car with intelligent camera systems that analyze people, cats, and obstacles. Let your search engine praise or criticize the images that it finds. Hear a voice from your phone that responds to your body language. Attune yourself to another person's rhythm by glancing at a display that magnifies a heartbeat or a breath. Learn OpenCV and see your world as never before. ...
Managing Virtual Infrastructure with Veeam ONEVeeam ONE virtual system monitoring applications enable IT support teams to proactively discover system issues before they arise, helping companies to sustain their current business needs and predict growth opportunities. Veeam ONE provides effective protection and management of the entire virtual infrastructure that any major company needs in order to protect their hosts, management servers, and failover clusters.
This book will provide you with the skills to quickly dive into how to monitor your Veeam ONE interface and get clients' data and adjust tasks and events, as well as viewing each dashboard user interface and monitoring notification settings. We will also see how to access Veeam ONE reporter and use dashboards to view reports at a glance, and learn how to handle reports. Also covered is application deployment, automation of virtual infrastructure data collection, and e-mail notifications. This book will also equip you with knowledge on how to use alert mechanisms in Veeam ...
VMware vRealize Operations Performance and Capacity ManagementVMware vRealize Operations is a suite of products that automates operations management using patented analytics and an integrated approach to performance, capacity, and configuration management. vRealize Operations Manager is the most important component of this suite that helps administrators to maintain and troubleshoot their VMware environment as well as their physical environment.
This book takes you through the fundamental differences between a Software-Defined Data Center and a classic physical data center, and how these differences impact both architecture and operations. From a strategic point of view, you will come across the most common challenges associated with performance management in a Software-Defined Data Center. Furthermore, you will learn all the key counters in vSphere and vRealize Operations, understand their dependencies, and acquaint yourself with practical solutions to configure them for a healthy virtual environment. ...
Mastering Gephi Network VisualizationMastering Gephi Network Visualization will take you through an overview of Gephi and network behavior, followed by detailed chapters addressing layouts, filtering, graph statistics, dynamic graphs, and more. You will begin with a concise overview of working with the Gephi interface. You will then see how to create your own graphs and understand the graph layouts to arrange a sample dataset. You will understand the theory behind Dynamic Network Analysis, followed by sample applications on how Gephi can be used to model these networks. You will also learn about the plugins that are most critical for network analysis and graph creation. Finally, you will put together all the previously learned concepts and gain insight on the future state of network graph analysis.
After reading this book and following the examples provided, you will have the confidence and expertise to create your own compelling graphs. ...
Learning Internet of ThingsThis book starts by exploring the popular HTTP, UPnP, CoAP, MQTT, and XMPP protocols. You will learn how protocols and patterns can put limitations on network topology and how they affect the direction of communication and the use of firewalls. Thing registries and delegation of trust are introduced as important tools to secure the life cycle of Things on the Internet. Once the fundamentals have been mastered, your focus will move to the Internet of Things architecture. A secure architecture is proposed that will take full advantage of the power of Internet of Things and at the same time protect end user integrity and private personal data without losing flexibility and interoperability.
This book provides you with a practical overview of the existing protocols, communication patterns, architectures, and security issues important to Internet of Things. ...
Mastering Wireless Penetration Testing for Highly Secured EnvironmentsPenetration testing is a tool for testing computer systems, networks, or web applications to find vulnerabilities that an attacker could exploit. By performing a penetration test, you can proactively identify which vulnerabilities are most critical. This allows your organization to more intelligently prioritize remediation and apply necessary security patches to ensure that they are available.
This book covers how to set up Kali Linux, scan and sniff wireless networks, and crack WEP, WPA, and even WPA2 encryption. By the end of this book, you will feel much more confident when it comes to conducting wireless penetration tests, and you will have a full understanding of wireless security threats.
This book is full of hands-on demonstrations and how-to tutorials. This will benefit you, as the reader, when it comes to security awareness. Having some knowledge of wireless penetration testing would be helpful. ...
Kivy BlueprintsKivy is a Modern UI framework that greatly simplifies the development of cross-platform apps suitable for both mobile and desktop.
This book is a practical guide that will walk you through the creation of intuitive multi-platform games and apps for day-to-day use. You will learn how to build simple, common apps such as Stopwatch and Paint. Then, we will gradually dive into more advanced Python and Kivy features. We will also cover a number of related topics ranging from UI design to low-level GLSL shaders. You will be able to fill your resume with practical applications and games, including those inspired by the insanely popular puzzle game 2048 and Flappy Bird. Each chapter covers a fully functional program, highlighting different aspects of the Kivy framework. ...