RESTful Java Web Services SecurityThis book will serve as a practical companion for you to learn about common vulnerabilities when using RESTful services, and will provide you with an indispensable knowledge of the tools you can use to implement and test security on your applications. It will cover the fine details of setting up RESTful services such as implementing RESTEasy and securing transmission protocols such as the OAuth protocol and its integration with RESTEasy. Furthermore, it also explains the implementation of digital signatures and the integration of the Doseta framework with RESTEasy.
With this book, you will be able to design your own security implementation or use a protocol to grant permissions over your RESTful applications with OAuth. You will also gain knowledge about the working of other features such as configuring and verifying HTTP and HTTPS protocols, certificates, and securing protocols for data transmission. By the end of this book, you will have comprehensive knowledge that will help you ...
Hadoop in Practice, 2nd EditionHadoop in Practice, Second Edition provides over 100 tested, instantly useful techniques that will help you conquer big data, using Hadoop. This revised new edition covers changes and new features in the Hadoop core architecture, including MapReduce 2. Brand new chapters cover YARN and integrating Kafka, Impala, and Spark SQL with Hadoop. You'll also get new and updated techniques for Flume, Sqoop, and Mahout, all of which have seen major new versions recently. In short, this is the most practical, up-to-date coverage of Hadoop available anywhere. ...
D3.js in ActionD3.js in Action is a practical tutorial for creating interactive graphics and data-driven applications using D3.js. You'll start with in-depth explanations of D3's out-of-the-box layouts, along with dozens of practical use cases that align with different types of visualizations. Then, you'll explore practical techniques for content creation, animation, and representing dynamic data—including interactive graphics and data streamed live over the web. The final chapters show you how to use D3's rich interaction model as the foundation for a complete web application. In the end, you'll be ready to integrate D3.js into your web development process and transform any site into a more engaging and sophisticated user experience. ...
Learn Raspberry Pi 2 with Linux and Windows 10, 2nd EditionLearn Raspberry Pi 2 with Linux and Windows 10 will tell you everything you need to know about working with Raspberry Pi 2 so you can get started doing amazing things. You'll learn how to set up your new Raspberry Pi 2 with a monitor, keyboard and mouse, and how to install both Linux and Windows on your new Pi 2.
Linux has always been a great fit for the Pi, but it can be a steep learning curve if you've never used it before. With this book, you'll see how easy it is to install Linux and learn how to work with it, including how to become a Linux command line pro. You'll learn that what might seem unfamiliar in Linux is actually very familiar. And now that Raspberry Pi also supports Windows 10, a chapter is devoted to setting up Windows 10 for the Internet of Things on a Raspberry Pi. ...
HTML5 Games, 2nd EditionHTML5 Gamesshows you how to combine HTML5, CSS3 and JavaScript to make games for the web and mobiles - games that were previously only possible with plugin technologies like Flash. Using the latest open web technologies, you are guided through the process of creating a game from scratch using Canvas, HTML5 Audio, WebGL and WebSockets
Inside, Jacob Seidelin shows you how features available in HTML5 can be used to create games. First, you will build a framework on which you will create your HTML5 game. Then each chapter covers a new aspect of the game including user input, sound, multiplayer functionality, 2D and 3D graphics and more. By the end of the book, you will have created a fully functional game that can be played in any compatible browser, or on any mobile device that supports HTML5. ...
Abusing the Internet of ThingsA future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars.
If you're part of a team creating applications for Internet-connected devices, this guide will help you explore security solutions. You'll not only learn how to uncover vulnerabilities in existing IoT devices, but also gain deeper insight into an attacker's tactics. ...
Python Machine LearningMachine learning and predictive analytics are transforming the way businesses and other organizations operate. Being able to understand trends and patterns in complex data is critical to success, becoming one of the key strategies for unlocking growth in a challenging contemporary marketplace. Python can help you deliver key insights into your data – its unique capabilities as a language let you build sophisticated algorithms and statistical models that can reveal new perspectives and answer key questions that are vital for success.
Python Machine Learning gives you access to the world of predictive analytics and demonstrates why Python is one of the world's leading data science languages. If you want to ask better questions of data, or need to improve and extend the capabilities of your machine learning systems, this practical data science book is invaluable. ...
Social eCommerceWant to make money online? Then ignore social media at your own risk. Social media is vital if you want to your business to thrive, and though you can't control the conversations, you can influence them. This book will teach you how.
If mismanaged, social media can create more noise than signal. It can be a time and energy suck - for you and your audience. Or worse still, it can become an echo chamber for negative PR.
If done well, guerrilla social media marketing can help you persuade, command attention, establish dialogue, differentiate yourself, capture new markets, and outmaneuver the competition - all on a shoestring budget. Whether you're selling digital goods and services, physical goods, or local services, this book has the answers. ...
Risk Centric Threat ModelingThis book introduces the Process for Attack Simulation & Threat Analysis (PASTA) threat modeling methodology. It provides an introduction to various types of application threat modeling and introduces a risk-centric methodology aimed at applying security countermeasures that are commensurate to the possible impact that could be sustained from defined threat models, vulnerabilities, weaknesses, and attack patterns.
Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis is a resource for software developers, architects, technical risk managers, and seasoned security professionals. ...
The Maker's Guide to the Zombie ApocalypseWhere will you be when the zombie apocalypse hits? Trapping yourself in the basement? Roasting the family pet? Beheading reanimated neighbors?
No way. You'll be building fortresses, setting traps, and hoarding supplies, because you, savvy survivor, have snatched up your copy of The Maker's Guide to the Zombie Apocalypse before it's too late. This indispensable guide to survival after Z-day, written by hardware hacker and zombie anthropologist Simon Monk, will teach you how to generate your own electricity, salvage parts, craft essential electronics, and out-survive the undead. ...