C++ AMPCapitalize on the faster GPU processors in today's computers with the C++ AMP code library - and bring massive parallelism to your project. With this practical book, experienced C++ developers will learn parallel programming fundamentals with C++ AMP through detailed examples, code snippets, and case studies. Learn the advantages of parallelism and get best practices for harnessing this technology in your applications. ...
Getting Started with Couchbase ServerStarting with the core architecture and structure of Couchbase Server, this title will tell you everything you need to know to install and setup your first Couchbase cluster. You'll be given guidance on sizing your cluster so that you maximise your performance. After installation, you'll be shown how to use the admin web console to administer your server, and then learn the techniques behind the specific tasks behind cluster management. This includes adding and removing nodes, rebalancing, and backing up and restoring your cluster. ...
Hands-On Concurrency with RustMost programming languages can really complicate things, especially with regard to unsafe memory access. The burden on you, the programmer, lies across two domains: understanding the modern machine and your language's pain-points. This book will teach you to how to manage program performance on modern machines and build fast, memory-safe, and concurrent software in Rust. It starts with the fundamentals of Rust and discusses machine architecture concepts. You will be taken through ways to measure and improve the performance of Rust code systematically and how to write collections with confidence. You will learn about the Sync and Send traits applied to threads, and coordinate thread execution with locks, atomic primitives, data-parallelism, and more.
The book will show you how to efficiently embed Rust in C++ code and explore the functionalities of various crates for multithreaded applications. It explores implementations in depth. You will know how a mutex works and build several yo ...
Raspberry Pi for Arduino UsersLeverage your Arduino skills in the Raspberry Pi world and see how to cross the two platforms into sophisticated programs.
The Arduino and Raspberry Pi communities overlap more than you might think. Arduinos can be expanded to have network capabilities with a variety of "shields", all of which increase the cost and complexity of the system. By contrast, Raspberry Pis all run Linux, which is a very network-competent platform. The newest Pi, the Raspberry Pi Zero W, is WiFi and Bluetooth capable, and costs around $10 U.S. For network enabled gadgets, it makes far more sense to cross to the Raspberry PI platform, if only someone would make it easy to do. That's what this book is about.
You'll learn some survival level Linux system administration, so you know how to set the machine up and how to establish at least minimal security for your gadget. You'll set up and learn the Geany IDE on your Pi, which is fairly similar to the Arduino IDE.
Where the two platforms overlap the most ...
Practical Guide to Salesforce CommunitiesWhether you are brand new to the world of Salesforce communities or you are looking to take your Community Cloud knowledge to the next level, this detailed guide will help you to build and manage a Salesforce community by leveraging the declarative power of the platform with clicks, not code.
Each Salesforce community is a part of a widespread ecosystem, with thousands of communities and millions of users active today on Community Cloud. Through valuable social and business tools, this online platform enables companies to empower and equip their customers, partners, and employees in new, powerful ways.
In this book, Philip Weinmeister, a Salesforce MVP and the first-ever recipient of the "Community Cloud MVP" Trailblazer award, leads you through the ins and outs of Salesforce communities and provides you with an array of best practices to deliver top-notch business portals on the Salesforce platform.
Practical Guide to Salesforce Communities is the first book to comprehensivel ...
Introducing the MySQL 8 Document StoreLearn the new Document Store feature of MySQL 8 and build applications around a mix of the best features from SQL and NoSQL database paradigms. Don't allow yourself to be forced into one paradigm or the other, but combine both approaches by using the Document Store.
MySQL 8 was designed from the beginning to bridge the gap between NoSQL and SQL. Oracle recognizes that many solutions need the capabilities of both. More specifically, developers need to store objects as loose collections of schema-less documents, but those same developers also need the ability to run structured queries on their data. With MySQL 8, you can do both! Introducing the MySQL 8 Document Store presents new tools and features that make creating a hybrid database solution far easier than ever before. This book covers the vitally important MySQL Document Store, the new X Protocol for developing applications, and a new client shell called the MySQL Shell. Also covered are supporting technologies and concepts such ...
Programming 101Understand the importance of programming, even if you've never programmed before! This book will teach you the basics of programming using the Processing programming language. You will create your own Processing sketches, using personal images, themes, or hobbies that you enjoy.
The chapters in the book will demonstrate the process of programming, starting with formulating an idea, planning, building on past projects, and refining the work, similar to writing an essay or composing a song. This approach will guide you to make use of logic and mathematics to produce beautiful effects.
The term for program in Processing is sketch, though the sketches featured in this book are far more than static drawings; they incorporate interaction, animation, video, audio, and accessing files on the local computer and on the Web. Technical features are introduced and explained in the context of complete examples: games (Snake, Hangman, jigsaw, slingshot), making a collage of family images and ...
Design Patterns in C#Get hands-on experience with each Gang of Four design pattern using C#. For each of the patterns, you'll see at least one real-world scenario, a coding example, and a complete implementation including output.
In the first part of Design Patterns in C#, you will cover the 23 Gang of Four (GoF) design patterns, before moving onto some alternative design patterns, including the Simple Factory Pattern, the Null Object Pattern, and the MVC Pattern. The final part winds up with a conclusion and criticisms of design patterns with chapters on anti-patterns and memory leaks. By working through easy-to-follow examples, you will understand the concepts in depth and have a collection of programs to port over to your own projects.
Along the way, the author discusses the different creational, structural, and behavioral patterns and why such classifications are useful. In each of these chapters, there is a Q&A session that clears up any doubts and covers the pros and cons of each of these patte ...
Asset Attack VectorsBuild an effective vulnerability management strategy to protect your organization's assets, applications, and data.
Today's network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a target. Attack surfaces are rapidly expanding to include not only traditional servers and desktops, but also routers, printers, cameras, and other IOT devices. It doesn't matter whether an organization uses LAN, WAN, wireless, or even a modern PAN—savvy criminals have more potential entry points than ever before. To stay ahead of these threats, IT and security leaders must be aware of exposures and understand their potential impact.
Asset Attack Vectors will help you build a vulnerability management program designed to work in the modern threat environment. Drawing on years of combined experience, the authors detail the latest techniques for threat analysis, risk measurement, and ...
Defending IoT Infrastructures with the Raspberry PiApply a methodology and practical solutions for monitoring the behavior of the Internet of Things (IoT), industrial control systems (ICS), and other critical network devices with the inexpensive Raspberry Pi. With this book, you will master passive monitoring and detection of aberrant behavior, and learn how to generate early indications and warning of attacks targeting IoT, ICS, and other critical network resources.
Defending IoT Infrastructures with the Raspberry Pi provides techniques and scripts for the discovery of dangerous data leakage events emanating from IoT devices. Using Raspbian Linux and specialized Python scripts, the book walks through the steps necessary to monitor, detect, and respond to attacks targeting IoT devices.
There are several books that cover IoT, IoT security, Raspberry Pi, and Python separately, but this book is the first of its kind to put them all together. It takes a practical approach, providing an entry point and level playing field for a wide ...