Practical Guide to Salesforce CommunitiesWhether you are brand new to the world of Salesforce communities or you are looking to take your Community Cloud knowledge to the next level, this detailed guide will help you to build and manage a Salesforce community by leveraging the declarative power of the platform with clicks, not code.
Each Salesforce community is a part of a widespread ecosystem, with thousands of communities and millions of users active today on Community Cloud. Through valuable social and business tools, this online platform enables companies to empower and equip their customers, partners, and employees in new, powerful ways.
In this book, Philip Weinmeister, a Salesforce MVP and the first-ever recipient of the "Community Cloud MVP" Trailblazer award, leads you through the ins and outs of Salesforce communities and provides you with an array of best practices to deliver top-notch business portals on the Salesforce platform.
Practical Guide to Salesforce Communities is the first book to comprehensivel ...
Practical API Architecture and Development with Azure and AWSLearn the business and technical importance of API design and architecture using the available cloud services from Azure and AWS.
This book starts off with an introduction to APIs and the concept of API Economy from a business and organizational perspective. You'll decide on a sustainable API strategy and API architecture based on different case scenarios.
You'll then look at actual examples on API development guidelines, providing a practical view and approach towards the API development and aligning teams in API development. This book walks you through the API gateway services available in Azure and AWS and reviews different approaches to API Security. This will prepare you for understanding the trade-off between security and the frictionless API experience.
Implement API Gateways to streamline API Development; Examine Security Mapping with API gateways from Azure and AWS; Apply API implementation using Serverless architecture; Review evolving APIs for monitoring and changing ...
Design Patterns in C#Get hands-on experience with each Gang of Four design pattern using C#. For each of the patterns, you'll see at least one real-world scenario, a coding example, and a complete implementation including output.
In the first part of Design Patterns in C#, you will cover the 23 Gang of Four (GoF) design patterns, before moving onto some alternative design patterns, including the Simple Factory Pattern, the Null Object Pattern, and the MVC Pattern. The final part winds up with a conclusion and criticisms of design patterns with chapters on anti-patterns and memory leaks. By working through easy-to-follow examples, you will understand the concepts in depth and have a collection of programs to port over to your own projects.
Along the way, the author discusses the different creational, structural, and behavioral patterns and why such classifications are useful. In each of these chapters, there is a Q&A session that clears up any doubts and covers the pros and cons of each of these patte ...
Defending IoT Infrastructures with the Raspberry PiApply a methodology and practical solutions for monitoring the behavior of the Internet of Things (IoT), industrial control systems (ICS), and other critical network devices with the inexpensive Raspberry Pi. With this book, you will master passive monitoring and detection of aberrant behavior, and learn how to generate early indications and warning of attacks targeting IoT, ICS, and other critical network resources.
Defending IoT Infrastructures with the Raspberry Pi provides techniques and scripts for the discovery of dangerous data leakage events emanating from IoT devices. Using Raspbian Linux and specialized Python scripts, the book walks through the steps necessary to monitor, detect, and respond to attacks targeting IoT devices.
There are several books that cover IoT, IoT security, Raspberry Pi, and Python separately, but this book is the first of its kind to put them all together. It takes a practical approach, providing an entry point and level playing field for a wide ...
Isomorphic Web ApplicationsBuild secure web apps that perform beautifully with high, low, or no bandwidth. Isomorphic web apps employ a pattern that exploits the full stack, storing data locally and minimizing server hits. They render flawlessly, maximize SEO, and offer opportunities to share code and libraries between client and server.
Isomorphic Web Applications teaches you to build production-quality web apps using isomorphic architecture. You'll learn to create and render views for both server and browser, optimize local storage, streamline server interactions, and handle data serialization. Designed for working developers, this book offers examples in relevant frameworks like React, Redux, Angular, Ember, and webpack. You'll also explore unique debugging and testing techniques and master specific SEO skills. ...
The Manga Guide to CryptographyCryptography is hard, but it's less hard when it's filled with adorable Japanese manga. The latest addition to the Manga Guide series, The Manga Guide to Cryptography, turns the art of encryption and decryption into plain, comic-illustrated English.
As you follow Inspector Jun Meguro in his quest to bring a cipher-wielding thief to justice, you'll learn how cryptographic ciphers work. (Ciphers are the algorithms at the heart of cryptography). Like all books in the Manga Guide series, The Manga Guide to Cryptography is illustrated throughout with memorable Japanese manga as it dives deep into advanced cryptography topics, such as classic substitution, polyalphabetic, and transposition ciphers; symmetric-key algorithms like block and DES (Data Encryption Standard) ciphers; and how to use public key encryption technology. It also explores practical applications of encryption such as digital signatures, password security, and identity fraud countermeasures.
The Manga Guide to Cryptog ...
Programming Elixir 1.6Functional programming techniques help you manage the complexities of today's real-world, concurrent systems; maximize uptime; and manage security. Enter Elixir, with its modern, Ruby-like, extendable syntax, compile and runtime evaluation, hygienic macro system, and more. But, just as importantly, Elixir brings a sense of enjoyment to parallel, functional programming. Your applications become fun to work with, and the language encourages you to experiment.
Part 1 covers the basics of writing sequential Elixir programs. We'll look at the language, the tools, and the conventions. Part 2 uses these skills to start writing concurrent code—applications that use all the cores on your machine, or all the machines on your network! And we do it both with and without OTP. Part 3 looks at the more advanced features of the language, from DSLs and code generation to extending the syntax.
This edition is fully updated with all the new features of Elixir 1.6, with a new chapter on structurin ...
Salesforce Lightning CookbookThe new Lightning Experience combines three major components - Lightning Design System, Lightning App Builder, and Lightning Components - to enable anyone to quickly and easily create beautiful, modern enterprise apps. If you wish to meet the challenges that Lightning throws at you head-on, then look no further because this practical book will be your faithful companion and ensure that you make best use of the Lightning platform.
The book starts by walking you through the three major Lightning Components and helps you enable and configure a Lightning solution. You will explore the art of working with standard components and build a basic layout for the application. Then, you will add more advanced components using the Lightning Framework. Finally, you will also build and migrate reports and dashboards to make your app look more professional. Towards the end of the book, you'll make use of Design System to work with Salesforce data and lay out the entire page with the components that ...
Practical Linux Security Cookbook, 2nd EditionOver the last few years, system security has gained a lot of momentum and software professionals are focusing heavily on it. Linux is often treated as a highly secure operating system. However, the reality is that Linux has its share of security aws, and these security aws allow attackers to get into your system and modify or even destroy your important data. But there's no need to panic, since there are various mechanisms by which these aws can be removed, and this book will help you learn about different types of Linux security to create a more secure Linux system.
With a step-by-step recipe approach, the book starts by introducing you to various threats to Linux systems. Then, this book will walk you through customizing the Linux kernel and securing local files. Next, you will move on to managing user authentication both locally and remotely and mitigating network attacks. Later, you will learn about application security and kernel vulnerabilities. You will also learn about patch ...
Qt5 Python GUI Programming CookbookPyQt is one of the best cross-platform interface toolkits currently available; it's stable, mature, and completely native. If you want control over all aspects of UI elements, PyQt is what you need. This book will guide you through every concept necessary to create fully functional GUI applications using PyQt, with only a few lines of code.
As you expand your GUI using more widgets, you will cover networks, databases, and graphical libraries that greatly enhance its functionality. Next, the book guides you in using Qt Designer to design user interfaces and implementing and testing dialogs, events, the clipboard, and drag and drop functionality to customize your GUI. You will learn a variety of topics, such as look and feel customization, GUI animation, graphics rendering, implementing Google Maps, and more. Lastly, the book takes you through how Qt5 can help you to create cross-platform apps that are compatible with Android and iOS. You will be able to develop functional and appeali ...