Learning Linux Shell Scripting, 2nd EditionLinux is the most powerful and universally adopted OS. Shell is a program that gives the user direct interaction with the operating system. Scripts are collections of commands that are stored in a file. The shell reads this file and acts on commands as if they were typed on the keyboard.
Learning Linux Shell Scripting covers Bash, GNU Bourne Again Shell, preparing you to work in the exciting world of Linux shell scripting. CentOS is a popular rpm-based stable and secured Linux distribution. Therefore, we have used CentOS distribution instead of Ubuntu distribution. Linux Shell Scripting is independent of Linux distributions, but we have covered both types of distros. We start with an introduction to the Shell environment and basic commands used. Next, we explore process management in Linux OS, real-world essentials such as debugging and perform Shell arithmetic fluently. You'll then take a step ahead and learn new and advanced topics in Shell scripting, such as decision making, star ...
.NET Standard 2.0 CookbookThe .NET Standard is a standard that represents a set of APIs that all .NET platforms have to implement, making it easy for developers to access and use one common library for their development needs. This book begins with a quick refresher, helping you understand the mechanics of the new standard and offering insight into how it works. You'll explore the core library concepts, such as working with collections, configurations, I/O, security, and multithreading. You'll explore the iOS and Android libraries of Xamarin and we'll guide you through creating a .NET Standard 2.0 library, which you'll use with both Android and iOS applications.
In the final chapters, you'll learn the various debugging and diagnostics tools to deliver quality libraries and create a NuGet package of the .NET Standard 2.0 library. By the end of this book, you'll be able to expand your current workflow to various .NET flavors and have the essential skills to create a .NET Standard 2.0 library from scratch to pa ...
Core Java SE 9 for the Impatient, 2nd EditionModern Java introduces major enhancements that impact the core Java technologies and APIs at the heart of the Java platform. Many old Java idioms are no longer needed and new features such as modularization make you far more effective. However, navigating these changes can be challenging.
Core Java SE 9 for the Impatient, Second Edition, is a complete yet concise guide that includes all the latest changes up to Java SE 9. Written by Cay S. Horstmann - author of the classic two-volume Core Java - this indispensable tutorial offers a faster, easier pathway for learning modern Java. Given Java SE 9's size and the scope of its enhancements, there's plenty to cover, but it's presented in small chunks organized for quick access and easy understanding.
Horstmann's practical insights and sample code help you quickly take advantage of all that's new, from Java SE 9's long-awaited "Project Jigsaw" module system to the improvements first introduced in Java SE 8, including lambda expressions ...
Sales HuntingThe first year of developing a new sales territory is a daunting task—especially in dog-eat-dog industries. The traditional advice is to train quickly on product, grab a customer list, start calling for appointments, discover opportunities, and close deals. In fact, almost every sales model out there is based on nothing more than "opportunity" management. But jumping straight to opportunity will have new salespeople—or veterans developing new territories—chasing their tails for the first year or two.
As Sales Hunting: How to Develop New Territories and Major Accounts in Half the Time Using Trust as Your Weapon details, there is a significant problem you must overcome when opening up new accounts and territories. No matter what you are selling, your prospect already has a trusted relationship with an incumbent vendor and will continue to buy from that vendor even when you have the better solution. ...
The Agile CultureWhat do you want? Delighted customers. How do you get them? By rapidly delivering innovative, exciting products and services your customers will love to use. How do you do this? By uniting talented people around shared ideas and purpose, trusting them, helping them take ownership, and getting out of their way. It sounds easy—but you know it isn't. To make it happen, you must create an agile culture: one that's open to change and can respond quickly to whatever your customers need and desire. The Agile Culture gives you proven models, pragmatic tools, and handy worksheets for doing just that. Building on their experience helping hundreds of companies, three world-class experts help you align and unleash the talents of everyone in your organization. Step by step, you'll learn how to move toward a culture of trust, in which everyone knows, owns, and improves the results. ...
Learning Malware AnalysisMalware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. With adversaries becoming sophisticated and carrying out advanced malware attacks on critical infrastructures, data centers, and private and public organizations, detecting, responding to, and investigating such intrusions is critical to information security professionals. Malware analysis and memory forensics have become must-have skills to fight advanced malware, targeted attacks, and security breaches.
This book teaches you the concepts, techniques, and tools to understand the behavior and characteristics of malware through malware analysis. It also teaches you techniques to investigate and hunt malware using memory forensics.
This book introduces you to the basics of malware analysis, and then gradually progresses into the more advanced concepts of code analysis and memory forensics. It uses real-world malware samples, ...
Unity 2018 Shaders and Effects Cookbook, 3rd EditionSince their introduction to Unity, shaders have been seen as notoriously difficult to understand and implement in games. Complex mathematics has always stood in the way of creating your own shaders and attaining the level of realism you crave.
Unity 2018 Shaders and Effects Cookbook changes that by giving you a recipe-based guide to creating shaders using Unity. It will show you everything you need to know about vectors, how lighting is constructed with them, and how textures are used to create complex effects without the heavy math.
This book starts by teaching you how to use shaders without writing code with the post-processing stack. Then, you'll learn how to write shaders from scratch, build up essential lighting, and finish by creating stunning screen effects just like those in high-quality 3D and mobile games. You'll discover techniques, such as normal mapping, image-based lighting, and animating your models inside a shader. We'll explore how to use physically based renderi ...
Hands-On Cryptography with PythonCryptography is essential for protecting sensitive information, but it is often performed inadequately or incorrectly.
Hands-On Cryptography with Python starts by showing you how to encrypt and evaluate your data. The book will then walk you through various data encryption methods,such as obfuscation, hashing, and strong encryption, and will show how you can attack cryptographic systems. You will learn how to create hashes, crack them, and will understand why they are so different from each other. In the concluding chapters, you will use three NIST-recommended systems: the Advanced Encryption Standard (AES), the Secure Hash Algorithm (SHA), and the Rivest-Shamir-Adleman (RSA).
By the end of this book, you will be able to deal with common errors in encryption. ...
Hands-On Microservices with C#C# is a powerful language when it comes to building applications and software architecture using rich libraries and tools such as .NET.
This book will harness the strength of C# in developing microservices architectures and applications.
This book shows developers how to develop an enterprise-grade, event-driven, asynchronous, message-based microservice framework using C#, .NET, and various open source tools. We will discuss how to send and receive messages, how to design many types of microservice that are truly usable in a corporate environment. We will also dissect each case and explain the code, best practices, pros and cons, and more.
Through our journey, we will use many open source tools, and create file monitors, a machine learning microservice, a quantitative financial microservice that can handle bonds and credit default swaps, a deployment microservice to show you how to better manage your deployments, and memory, health status, and other microservices. By the end o ...
Asynchronous Android Programming, 2nd EditionAsynchronous programming has acquired immense importance in Android programming, especially when we want to make use of the number of independent processing units (cores) available on the most recent Android devices. With this guide in your hands you'll be able to bring the power of Asynchronous programming to your own projects, and make your Android apps more powerful than ever before!
To start with, we will discuss the details of the Android Process model and the Java Low Level Concurrent Framework, delivered by Android SDK. We will also guide you through the high-level Android-specific constructs available on the SDK: Handler, AsyncTask, and Loader. Next, we will discuss the creation of IntentServices, Bound Services and External Services, which can run in the background even when the user is not interacting with it. You will also discover AlarmManager and JobScheduler APIs, which are used to schedule and defer work without sacrificing the battery life. In a more advanced phase, ...