Program the Internet of Things with Swift for iOS, 2nd EditionLearn how to build apps using Apple's native APIs for the Internet of Things, including the Apple Watch, HomeKit, and Apple Pay. You'll also see how to interface with popular third-party hardware such as the Raspberry Pi, Arduino, and the FitBit family of devices.Program the Internet of Things with Swift and iOS is an update to the previous version and includes all new Swift 4 code. This book is a detailed tutorial that provides a detailed "how" and "why" for each topic, explaining Apple-specific design patterns as they come up and pulling lessons from other popular apps. To help you getting up and running quickly, each chapter is framed within a working project, allowing you to use the sample code directly in your apps.
The Internet of Things is not limited to Apple devices alone, so this book also explains how to interface with popular third-party hardware devices, such as the Fitbit and Raspberry Pi, and generic interfaces, like Restful API's and HTTPS. You'll also review new API ...
Java Design Patterns, 2nd EditionGet hands-on experience implementing 26 of the most common design patterns using Java and Eclipse. In addition to Gang of Four (GoF) design patterns, you will also learn about alternative design patterns, and understand the criticisms of design patterns with an overview of anti-patterns. For each pattern you will see at least one real-world scenario, a computer-world example, and a complete implementation including output.
This book has three parts. The first part covers 23 Gang of Four (GoF) design patterns. The second part includes three alternative design patterns. The third part presents criticisms of design patterns with an overview of anti-patterns. You will work through easy-to-follow examples to understand the concepts in depth and you will have a collection of programs to port over to your own projects.
A Q&A session is included in each chapter and covers the pros and cons of each pattern. The last chapter presents FAQs about the design patterns. The step-by-step approac ...
Thriving in the Gig EconomyTake an in-depth look into the gig economy to see how tech professionals and entrepreneurs can earn a living as freelancers and contractors. Build your own business. The pros and cons of the lifestyle and what to expect from it are discussed.
In this book, author Adam Sinicki explains the impact of the gig economy and the forces that led to it as it relates to technology and working online. You will understand how to make a living supplying tech skills on a "per gig" basis. Practical instructions, advice, and tips are provided on goal setting, lifestyle design, and selecting the types of work and contracts that further your goals and support the things you value as you transition from a 9-5 job.
Know the types of work that a tech freelancer can offer: coding, SEO, web development, 3D modeling, and more; Find and manage clients; Negotiate pay and contracts; Stay productive without a manager; Discover useful tools, websites, and apps to build your business and ensure a steady incom ...
Modern C Quick Syntax Reference, 2nd EditionDiscover how C's efficiency makes it a popular choice in a wide variety of applications and operating systems with special applicability to wearables, game programming, system level programming, embedded device/firmware programming and in Arduino and related electronics hobbies in this condensed code and syntax guide. This book presents the essential C syntax in a well-organized format that can be used as a quick and handy reference.
In this book, you will find short, simple, and focused code examples; and a well laid out table of contents and a comprehensive index allowing easy review. You won't find any technical jargon, bloated samples, drawn out history lessons, or witty stories. What you will find is a language reference that is concise, to the point and highly accessible. The book is packed with useful information and is a must-have for any C programmer.
Code for some of today's modern and popular firmware and systems; How to do embedded programming found in Arduino and rel ...
The Linux Command Line, 2nd EditionThe Linux Command Line takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell (or command line). Along the way you'll learn the timeless skills handed down by generations of experienced, mouse-shunning gurus: file navigation, environment configuration, command chaining, pattern matching with regular expressions, and more.
In addition to that practical knowledge, author William Shotts reveals the philosophy behind these tools and the rich heritage that your desktop Linux machine has inherited from Unix supercomputers of yore.
As you make your way through the book's short, easily-digestible chapters, you'll learn how to: Create and delete files, directories, and symlinks; Administer your system, including networking, package installation, and process management; Use standard input and output, redirection, and pipelines; Edit files with Vi, the world's most popular text editor; Write shell scripts to automate common or borin ...
MATLAB Machine Learning Recipes, 2nd EditionHarness the power of MATLAB to resolve a wide range of machine learning challenges. This book provides a series of examples of technologies critical to machine learning. Each example solves a real-world problem. All code in MATLAB Machine Learning Recipes: A Problem-Solution Approach is executable. The toolbox that the code uses provides a complete set of functions needed to implement all aspects of machine learning. Authors Michael Paluszek and Stephanie Thomas show how all of these technologies allow the reader to build sophisticated applications to solve problems with pattern recognition, autonomous driving, expert systems, and much more.
How to write code for machine learning, adaptive control and estimation using MATLAB; How these three areas complement each other; How these three areas are needed for robust machine learning applications; How to use MATLAB graphics and visualization tools for machine learning; How to code real world examples in MATLAB for major applications of ...
Classic Computer Science Problems in PythonClassic Computer Science Problems in Python deepens your knowledge of problem solving techniques from the realm of computer science by challenging you with time-tested scenarios, exercises, and algorithms. As you work through examples in search, clustering, graphs, and more, you'll remember important things you've forgotten and discover classic solutions to your "new" problems!
Computer science problems that seem new or unique are often rooted in classic algorithms, coding techniques, and engineering principles. And classic approaches are still the best way to solve them! Understanding these techniques in Python expands your potential for success in web development, data munging, machine learning, and more.
Classic Computer Science Problems in Python sharpens your CS problem-solving skills with time-tested scenarios, exercises, and algorithms, using Python. You'll tackle dozens of coding challenges, ranging from simple tasks like binary search algorithms to clustering data using ...
Practical Network Automation, 2nd EditionNetwork automation is the use of IT controls to supervise and carry out everyday network management functions. It plays a key role in network virtualization technologies and network functions.
The book starts by providing an introduction to network automation, and its applications, which include integrating DevOps tools to automate the network efficiently. It then guides you through different network automation tasks and covers various data digging and performing tasks such as ensuring golden state configurations using templates, interface parsing. This book also focuses on Intelligent Operations using Artificial Intelligence and troubleshooting using chatbots and voice commands. The book then moves on to the use of Python and the management of SSH keys for machine-to-machine (M2M) communication, all followed by practical use cases. The book also covers the importance of Ansible for network automation, including best practices in automation; ways to test automated networks using too ...
Docker for Rails DevelopersDocker does for DevOps what Rails did for web development - it gives you a new set of superpowers. Gone are “works on my machine” woes and lengthy setup tasks, replaced instead by a simple, consistent, Docker-based development environment that will have your team up and running in seconds. Gain hands-on, real-world experience with a tool that's rapidly becoming fundamental to software development. Go from zero all the way to production as Docker transforms the massive leap of deploying your app in the cloud into a baby step.
Docker makes life as a Ruby and Rails developer easier. It helps build, ship, and run your applications, solving major problems you face every day. It allows you to run applications at scale, adding new resources as needed. Docker provides a reliable, consistent environment that's guaranteed to work the same everywhere.
Docker lets you do all things DevOps without needing a PhD in infrastructure and operations. Want to spin up a cluster to run your app? N ...
Microsoft Azure Security Center, 2nd EditionReflecting updates through mid-2019, this book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder help you apply Azure Security Center's robust protection, detection, and response capabilities in key operational scenarios. You'll walk through securing any Azure workload, and optimizing key facets of modern security, from policies and identity to incident response and risk management. Brand-new coverage includes single-click remediation, IoT, improved container security, Azure Sentinel, and more. Whatever your security role, you'll learn how to save hours, days, or even weeks by solving problems in the most efficient and reliable ways possible.
Two of Microsoft's leading cloud security experts show how to: Implement a comprehensive new security paradigm designed specifically for cloud and hybrid environments; Gain visibility and control to secure all ...