Java: A Beginner's Guide, 7th EditionFully updated for Java Platform, Standard Edition 9 (Java SE 9), Java: A Beginner's Guide, 7th Edition, gets you started programming in Java right away. Bestselling programming author Herb Schildt begins with the basics, such as how to create, compile, and run a Java program. He then moves on to the keywords, syntax, and constructs that form the core of the Java language. The book also covers some of Java's more advanced features, including multithreaded programming, generics, lambda expressions, Swing, and JavaFX. This practical Oracle Press guide features details on Java SE 9's innovative new module system, and, as an added bonus, it includes an introduction to JShell, Java's new interactive programming tool.
Designed for Easy Learning: Key Skills and Concepts - Chapter-opening lists of specific skills covered in the chapter; Ask the Expert - Q&A sections filled with bonus information and helpful tips; Try This - Hands-on exercises that show you how to apply your skills Self Tests ...
CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (CS0-001)This highly effective self-study system provides complete coverage of every objective for the challenging CompTIA CySA+ Cybersecurity Analyst exam. You'll find learning objectives at the beginning of each chapter, exam tips, in-depth explanations, and practice exam questions. All questions closely mirror those on the live test in content, format, and tone. Designed to help you pass exam CS0-001 with ease, this definitive guide also serves as an essential on-the-job reference. ...
Quicken for Windows, Eighth EditionTake control of your personal finances using the best practices and time-saving tips in Quicken 2018 for Windows The Official Guide! Find out the most effective methods for tracking your income, expenses, savings, transactions, investments, and so much more.
Endorsed by the makers of Quicken, this practical resource shows you, step by step, how to take full advantage of the software's powerful features, including the Quicken mobile app. You'll also get professional advice to help you reduce debt, stay on budget, save money, invest wisely, and plan for a secure financial future.
Customize Quicken for your preferences; Track income and expenses; Automate transactions and tasks; Record bank and credit card transactions; Use online banking features; Reconcile checking, savings, and credit card accounts; Track investments and optimize your portfolio; Monitor your assets, loans, and net worth; Evaluate your financial position; Reduce debt, save money, and plan for retirement; Simplify ...
BlockchainGet the most out of cutting-edge blockchain technology using the hands-on information contained in this comprehensive resource. Written by a team of technology and legal experts, Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions demonstrates each topic through a start-to-finish, illustrated case study. The book includes financial, technology, governance, and legal use cases along with advantages and challenges. Validation, implementation, troubleshooting, and best practices are fully covered. You will learn, step-by-step, how to build and maintain effective, reliable, and transparent blockchain solutions.
Understand the fundamentals of decentralized computing and blockchain; Explore business, technology, governance, and legal use cases; Review the evolving practice of law and technology as it concerns legal and governance issues arising from blockchain implementation; Write and administer performant blockchain-enabled applications; Handle cryptograp ...
Cisco Firepower Threat Defense (FTD)This is the definitive guide to best practices and advanced troubleshooting techniques for the Cisco flagship Firepower Threat Defense (FTD) system running on Cisco ASA platforms, Cisco Firepower security appliances, Firepower eXtensible Operating System (FXOS), and VMware virtual appliances.
Senior Cisco engineer Nazmul Rajib draws on unsurpassed experience supporting and training Cisco Firepower engineers worldwide, and presenting detailed knowledge of Cisco Firepower deployment, tuning, and troubleshooting. Writing for cybersecurity consultants, service providers, channel partners, and enterprise or government security professionals, he shows how to deploy the Cisco Firepower next-generation security technologies to protect your network from potential cyber threats, and how to use Firepower's robust command-line tools to investigate a wide variety of technical issues.
Each consistently organized chapter contains definitions of keywords, operational flowcharts, architectural di ...
The IT as a Service (ITaaS) FrameworkOngoing digitization, along with the risks of digital disruption, mean today's Enterprise businesses are more reliant than ever on their IT Organizations to be successful; but business cannot wait on IT. Instead, Enterprise IT Organizations must transform to Fast IT to keep pace with the various lines of business, operate more agilely and efficiently than ever before, while simultaneously supporting rapid innovation of transformative capabilities.
The IT as a Service (ITaaS) Framework - based on the work pioneered by Cisco's own global IT organization - is a proven model for transforming to an end-to-end Services Organization, and shifting the underlying culture of the IT organization as a foundation for Fast IT. Now, the developer of the ITaaS framework provides you with an in-depth guide ensuring that your Services Transformation achieves the intended value outcomes of establishing IT as a trusted advisor to the business, and operating IT like an agile, competitive, and cost-effic ...
Investigating the Cyber BreachToday, cybersecurity and networking professionals know they can't possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they occur. Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer is the first comprehensive guide to doing just that.
Writing for working professionals, senior cybersecurity experts Joseph Muniz and Aamir Lakhani present up-to-the-minute techniques for hunting attackers, following their movements within networks, halting exfiltration of data and intellectual property, and collecting evidence for investigation and prosecution. You'll learn how to make the most of today's best open source and Cisco tools for cloning, data analytics, network and endpoint breach detection, case management, monitoring, analysis, and more.
Unlike digital forensics books focused primarily on post-attack evidence gathering, this one offers complete coverage of tracking threats, improving inte ...
Programming PIC Microcontrollers with XC8Learn how to use microcontrollers without all the frills and math. This book uses a practical approach to show you how to develop embedded systems with 8 bit PIC microcontrollers using the XC8 compiler. It's your complete guide to understanding modern PIC microcontrollers.
Are you tired of copying and pasting code into your embedded projects? Do you want to write your own code from scratch for microcontrollers and understand what your code is doing? Do you want to move beyond the Arduino? Then Programming PIC Microcontrollers with XC8 is for you! Written for those who want more than an Arduino, but less than the more complex microcontrollers on the market, PIC microcontrollers are the next logical step in your journey.
You'll also see the advantage that MPLAB X offers by running on Windows, MAC and Linux environments. You don't need to be a command line expert to work with PIC microcontrollers, so you can focus less on setting up your environment and more on your application. ...
Data Integration Life Cycle Management with SSISBuild a custom BimlExpress framework that generates dozens of SQL Server Integration Services (SSIS) packages in minutes. Use this framework to execute related SSIS packages in a single command. You will learn to configure SSIS catalog projects, manage catalog deployments, and monitor SSIS catalog execution and history.
Data Integration Life Cycle Management with SSIS shows you how to bring DevOps benefits to SSIS integration projects. Practices in this book enable faster time to market, higher quality of code, and repeatable automation. Code will be created that is easier to support and maintain. The book teaches you how to more effectively manage SSIS in the enterprise environment by drawing on the art and science of modern DevOps practices.
Generate dozens of SSIS packages in minutes to speed your integration projects; Reduce the execution of related groups of SSIS packages to a single command; Successfully handle SSIS catalog deployments and their projects; Monitor the execut ...
Beginning Ractive.jsDevelop websites using the Ractive.js template-driven UI library. This book is project-oriented and simplifies the process of using Ractive.js to create websites or online applications that are interactive by default. It equips you with a starting toolset to develop future projects, safe in the knowledge that the site operates as expected, and is not reliant on bloated technology, typical of other similar frameworks.
Beginning Ractive.js takes the view that you shouldn't always resort to what "everyone else uses", and that there is indeed a different way you can achieve the same result. We live in an age where speed and simplicity are of the essence - this book provides a perfect alternative that challenges the norm. Stop thinking you must use the same library as everyone else. Give Ractive a try!
Understand how Ractive.js works and how it differs to other templating frameworks; Source and manage data using Ractive.js' data binding methods; Gain an appreciation of managing events ...