Building Web Applications with Python and Neo4jPy2neo is a simple and pragmatic Python library that provides access to the popular graph database Neo4j via its RESTful web service interface. This brings with it a heavily refactored core, a cleaner API, better performance, and some new idioms.
You will begin with licensing and installing Neo4j, learning the fundamentals of Cypher as a graph query language, and exploring Cypher optimizations. You will discover how to integrate with various Python frameworks such as Flask and its extensions: Py2neo, Neomodel, and Django. Finally, the deployment aspects of your Python-based Neo4j applications in a production environment is also covered. By sequentially working through the steps in each chapter, you will quickly learn and master the various implementation details and integrations of Python and Neo4j, helping you to develop your use cases more quickly. ...
Calm TechnologyHow can you design technology that becomes a part of a user's life and not a distraction from it? This practical book explores the concept of calm technology, a method for smoothly capturing a user's attention only when necessary, while calmly remaining in the background most of the time. You'll learn how to design products that work well, launch well, are easy to support, easy to use, and remain unobtrusive.
Author Amber Case presents ideas first introduced by researchers at Xerox PARC in 1995, and explains how they apply to our current technology landscape, especially the Internet of Things. This book is ideal for UX and product designers, managers, creative directors, and developers. ...
Canon EOS 7D Mark II For DummiesThis full-color guide to the features and functions of the Canon EOS 7D Mark II makes it easy for first-time users to get the most out of the camera and capture cool, professional-level photos. Packed with examples on how to create eye-popping digital photos, Canon EOS 7D Mark II For Dummies gives you a plain-English tour of the camera's controls, shows how to manipulate focus and color, gives step-by-step instructions on how to shoot better low-light and action shots, and so much more.
Digital Single Lens Reflex (DSLR) cameras offer full control over exposure settings while also providing pre-sets and auto mode options for beginners. If you're just picking up—or considering buying—a Canon EOS 7D Mark II camera, this fun and friendly guide takes the intimidation out of making sense of the bells and whistles so you can get right down to snapping stunning photos. ...
Cocos2d-x by Example, 2nd EditionUpgraded and updated, the powerful and popular open source framework Cocos2d-x is better than ever. Through step-by-step tutorials, you'll learn how to take complete advantage of the framework. You'll learn how to add animations and special effects, implement a physics engine, optimize your games, prepare a project for multiple devices, and develop game ideas from the test version to a finished project.
Most importantly, this book provides you with the accumulated knowledge of thousands of game developers, all packed into one easy-to-use and proven framework that will save time and strenuous thinking! ...
Coding with JavaScript For DummiesCoding with JavaScript For Dummies provides easy, hands-on instruction for anyone looking to learn this popular client-side language. No experience? No problem! This friendly guide starts from the very beginning and walks you through the basics, then shows you how to apply what you've learned to real projects. You'll start building right away, including web page elements and simple applications, so you can immediately see how JavaScript is used in the real world. Online exercises allow you to test your code and expand your skills, and the easy-to-follow instruction provides step-by-step guidance toward understanding the JavaScript syntax, applications, and language.
JavaScript enhances static web pages by providing dynamic elements that can adapt and react to user action. It's a need-to-know tool for aspiring web designers, but anyone can benefit from understanding this core development language. ...
Cyber OperationsLearn to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources.
You'll learn how to configure your network from the ground up, starting by setting up your virtual test environment with basics like DNS and active directory, through common network services, and ending with complex web applications involving web servers and backend databases.
Key defensive techniques are integrated throughout the exposition. You will develop situational awareness of your network and will build a complete defensive infrastructure—including log servers, network firewalls, web application firewalls, and intrusion detection systems. ...
Designing Hyper-V SolutionsThis book is a practical, example-oriented tutorial that will guide you through the basics and architecture of the Hyper-V platform and help you understand how to build your virtualization infrastructure from the ground up. It then goes on to focus on scalability and high availability aspects, and trains you to set up highly available Hyper-V clusters and perform the live migration of virtual machines. You will also learn about advancements in virtual networking and storage in Windows Server 2012 and Windows Server 2012 R2.
Finally, the book then advises you on how to set up backup and recovery and how to prepare a disaster recovery plan via Hyper-V Replica, concluding with insight into Microsoft VDI implementation guidance. ...
Elasticsearch IndexingBeginning with an overview of the way ElasticSearch stores data, you'll begin to extend your knowledge to tackle indexing and mapping, and learn how to configure ElasticSearch to meet your users' needs. You'll then find out how to use analysis and analyzers for greater intelligence in how you organize and pull up search results – to guarantee that every search query is met with the relevant results! You'll explore the anatomy of an ElasticSearch cluster, and learn how to set up configurations that give you optimum availability as well as scalability. Once you've learned how these elements work, you'll find real-world solutions to help you improve indexing performance, as well as tips and guidance on safety so you can back up and restore data. Once you've learned each component outlined throughout, you will be confident that you can help to deliver an improved search experience – exactly what modern users demand and expect. ...
Elastix Unified Communications Server CookbookElastix brings together the most useful tools and features from the Unified Communications and Open Source worlds: IP-PBX, Chat, Call Center, Multisite, Video, and so on, in a modular way.
Beginning with installation and gaining an in-depth understanding of the internal workings of Elastix, you will soon dive into the core features of Elastix and VoIP and Unified Communications to enable a full cost-effective Unified Communications server solution. You will explore the configuration of IP-BPX features, control call routes and destinations, and troubleshoot the unified communications software. Finish by going that extra mile and securing your server and implement advanced dialplan functions.
Through this step-by-step guide you will get to grips with VoIP and Unified Communications with Elastix and dive into practical tips to install, deploy, and maintain your own solutions. ...
Enterprise CybersecurityEnterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity program that is seamlessly coordinated with policy, programmatics, IT life cycle, and assessment.
Fail-safe cyberdefense is a pipe dream. Given sufficient time, an intelligent attacker can eventually defeat defensive measures protecting an enterprise's computer systems and IT networks.
To prevail, an enterprise cybersecurity program must manage risk by detecting attacks early enough and delaying them long enough that the defenders have time to respond effectively. Enterprise Cybersecurity shows players at all levels of responsibility how to unify their organization's people, budgets, technolog ...