Product LeadershipIn today's lightning-fast technology world, good product management is critical to maintaining a competitive advantage. Yet, managing human beings and navigating complex product roadmaps is no easy task, and it's rare to find a product leader who can steward a digital product from concept to launch without a couple of major hiccups. Why do some product leaders succeed while others don't?
This insightful book presents interviews with nearly 100 leading product managers from all over the world. Authors Richard Banfield, Martin Eriksson, and Nate Walkingshaw draw on decades of experience in product design and development to capture the approaches, styles, insights, and techniques of successful product managers. If you want to understand what drives good product leaders, this book is an irreplaceable resource.
In three parts, Product Leadership helps you explore: Themes and patterns of successful teams and their leaders, and ways to attain those characteristics; Best approaches for g ...
Streaming DataAs humans, we're constantly filtering and deciphering the information streaming toward us. In the same way, streaming data applications can accomplish amazing tasks like reading live location data to recommend nearby services, tracking faults with machinery in real time, and sending digital receipts before your customers leave the shop. Recent advances in streaming data technology and techniques make it possible for any developer to build these applications if they have the right mindset. This book will let you join them.
Streaming Data is an idea-rich tutorial that teaches you to think about efficiently interacting with fast-flowing data. Through relevant examples and illustrated use cases, you'll explore designs for applications that read, analyze, share, and store streaming data. Along the way, you'll discover the roles of key technologies like Spark, Storm, Kafka, Flink, RabbitMQ, and more. This book offers the perfect balance between big-picture thinking and implementation deta ...
Communications Receivers, 4th EditionThis thoroughly updated guide offers comprehensive explanations of the science behind today's radio receivers along with practical guidance on designing, constructing, and maintaining real-world communications systems. You will explore system planning, antennas and antenna coupling, amplifiers and gain control, filters, mixers, demodulation, digital communication, and the latest software defined radio (SDR) technology. Written by a team of telecommunication experts, Communications Receivers: Principles and Design, Fourth Edition, features technical illustrations, schematic diagrams, and detailed examples.
Basic radio considerations; Radio receiver characteristics; Receiver system planning; Receiver implementation considerations; RF and baseband techniques for Software-Defined Radios; Transceiver SDR considerations; Antennas and antenna coupling; Mixers; Frequency sources and control; Ancillary receiver circuits; Performance measurement. ...
Gray Hat Hacking, 5th EditionFortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hacker's Handbook, Fifth Edition explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. And the new topic of exploiting the Internet of things is introduced in this edition.
Build and launch spoofing exploits with Ettercap; Induce error conditions and crash software using fuzzers; Use advanced reverse engineering to exploit Windows and Linux software; Bypass Windows Access Control and memory protection schemes; Exploit web applications with Padding Oracle Att ...
Raspberry Pi 3 Cookbook for Python Programmers, 3rd EditionRaspberry Pi 3 Cookbook for Python Programmers, 3rd Edition begins by guiding you through setting up Raspberry Pi 3, performing tasks using Python 3.6, and introducing the first steps to interface with electronics. As you work through each chapter, you will build your skills and apply them as you progress. You will learn how to build text classifiers, predict sentiments in words, develop applications using the popular Tkinter library, and create games by controlling graphics on your screen. You will harness the power of a built in graphics processor using Pi3D to generate your own high-quality 3D graphics and environments.
You will understand how to connect Raspberry Pi's hardware pins directly to control electronics, from switching on LEDs and responding to push buttons to driving motors and servos. Get to grips with monitoring sensors to gather real-life data, using it to control other devices, and viewing the results over the internet. You will apply what you have learned by crea ...
Hands-On MQTT Programming with PythonMQTT is a lightweight messaging protocol for small sensors and mobile devices. This book explores the features of the latest versions of MQTT for IoT and M2M communications, how to use them with Python 3, and allow you to interact with sensors and actuators using Python.
The book begins with the specific vocabulary of MQTT and its working modes, followed by installing a Mosquitto MQTT broker. You will use different utilities and diagrams to understand the most important concepts related to MQTT. You will learn to make all the necessary configuration to work with digital certificates for encrypting all data sent between the MQTT clients and the server. You will also work with the different Quality of Service levels and later analyze and compare their overheads.
You will write Python 3.x code to control a vehicle with MQTT messages delivered through encrypted connections (TLS 1.2), and learn how leverage your knowledge of the MQTT protocol to build a solution based on requirements. ...
FPGA Prototyping by SystemVerilog ExamplesThis is the successor edition of the popular FPGA Prototyping by Verilog Examples text. It follows the same "learning-by-doing" approach to teach the fundamentals and practices of HDL synthesis and FPGA prototyping. The new edition uses a coherent series of examples to demonstrate the process to develop sophisticated digital circuits and IP (intellectual property) cores, integrate them into an SoC (system on a chip) framework, realize the system on an FPGA prototyping board, and verify the hardware and software operation. The examples start with simple gate-level circuits, progress gradually through the RT (register transfer) level modules, and lead to a functional embedded system with custom I/O peripherals and hardware accelerators. Although it is an introductory text, the examples are developed in a rigorous manner, and the derivations follow the strict design guidelines and coding practices used for large, complex digital systems.
The book is completely updated and uses the Syst ...
Learning Malware AnalysisMalware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. With adversaries becoming sophisticated and carrying out advanced malware attacks on critical infrastructures, data centers, and private and public organizations, detecting, responding to, and investigating such intrusions is critical to information security professionals. Malware analysis and memory forensics have become must-have skills to fight advanced malware, targeted attacks, and security breaches.
This book teaches you the concepts, techniques, and tools to understand the behavior and characteristics of malware through malware analysis. It also teaches you techniques to investigate and hunt malware using memory forensics.
This book introduces you to the basics of malware analysis, and then gradually progresses into the more advanced concepts of code analysis and memory forensics. It uses real-world malware samples, ...
Game AnalyticsDeveloping a successful game in today's market is a challenging endeavor. Thousands of titles are published yearly, all competing for players' time and attention. Game analytics has emerged in the past few years as one of the main resources for ensuring game quality, maximizing success, understanding player behavior and enhancing the quality of the player experience. It has led to a paradigm shift in the development and design strategies of digital games, bringing data-driven intelligence practices into the fray for informing decision making at operational, tactical and strategic levels.
Game Analytics - is the first book on the topic of game analytics; the process of discovering and communicating patterns in data towards evaluating and driving action, improving performance and solving problems in game development and game research. ...
Learning PixelmatorToday, everybody has a digital camera, but how do you turn your pictures into masterpieces? With Pixelmator, you will be able to edit your photos like a pro and get that artistic, professional feel to your images.
Learning Pixelmator will teach you how to use Pixelmator to turn your everyday snapshots into works of art. With an example-based approach, you will learn how to use each tool effectively to create, edit, or enhance your photos. It is for everyone that wants to get started with Pixelmator. ...