Beginning Windows 8 Application DevelopmentIf you're a beginning developer, there's no better place to get up to speed on the Windows 8 SDK than this Wrox guide. A team of Microsoft experts provides a complete course in Windows 8 programming, helping you take full advantage of the innovative new SDK. Written in an easy-to-read style, this book is packed with reusable examples that showcase the endless possibilities of the Windows SDK and also introduces the new Windows 8 app store.
It explains how to set up the development environment and covers user interface design, using special effects and graphics, working with C# and C++, and much more. ...
Beginning PerlPerl is the ever-popular, flexible, open source programming language that has been called the programmers' Swiss army knife. This book introduces Perl to both new programmers and experienced ones who are looking to learn a new language. In the tradition of the popular Wrox Beginning guides, it presents step-by-step guidance in getting started, a host of try-it-out exercises, real-world examples, and everything necessary for a Perl novice to start programming with confidence. ...
Restlet in ActionRestlet in Action introduces the Restlet Framework and RESTful web APIs. You'll see how to easily create and deploy your own web API while learning to consume other web APIs effectively. You'll learn about designing, securing, versioning, documentation, optimizing, and more on both the server and client side, as well as about cloud computing, mobile Android devices, and Semantic Web applications.
The book requires a basic knowledge of Java and the web, but no prior exposure to REST or Restlet. ...
Beginning Visual C# 2010Beginning with C# 2010 programming basics such as variables, flow control, and object oriented programming, this invaluable book then moves into web and Windows programming and data access (databases and XML). All the while, the expert team of authors focuses on the tools that you need to program C#, the Visual C# 2010 development environment in Visual Studio® 2010. The step-by-step instructions and constructive examples featured throughout the book will show you how to program confidently with useful code in C# 2010. ...
Professional IIS 7Written by an author team that includes four Microsoft MVPs, this book shows you how to take advantage of these exciting new features of IIS 7. The authors draw on their expertise in the areas of deployment, hosting, development, and enterprise operations in order to help you with the learning curve of becoming familiar with IIS 7. With a clear understanding of IIS 7, you'll learn to deploy, install, monitor, manage, and secure an IIS environment with confidence and ease. ...
Hacking Exposed Web 2.0Protect your Web 2.0 architecture against the latest wave of cybercrime using expert tactics from Internet security professionals. Hacking Exposed Web 2.0 shows how hackers perform reconnaissance, choose their entry point, and attack Web 2.0 - based services, and reveals detailed countermeasures and defense techniques. You'll learn how to avoid injection and buffer overflow attacks, fix browser and plug-in flaws, and secure AJAX, Flash, and XML-driven applications. Real-world case studies illustrate social networking site weaknesses, cross-site attack methods, migration vulnerabilities, and IE shortcomings. ...
Hacking Exposed Computer Forensics, 2nd EditionIdentify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. Learn how to re-create an attacker's footsteps, communicate with counsel, prepare court-ready reports, and work through legal and organizational challenges. Case studies straight from today's headlines cover IP theft, mortgage fraud, employee misconduct, securities fraud, embezzlement, organized crime, and consumer fraud cases. ...
Hacking Exposed Malware and RootkitsProviding real-world attacks and detailed countermeasures, this new volume is a comprehensive guide to the "black art" of malware and rootkits. You will learn how to identify and defend against malicious software and dangerous hidden scripts. The book includes practical examples, case studies, and risk ratings - all in the bestselling Hacking Exposed format.
Hacking Exposed: Malware & Rootkits walks you through the processes of analyzing malicious software from start to finish. The book covers different kinds of malware and rootkits, methods of infection, and the latest detection and prevention technologies. ...
Create Stunning HTML Email That Just WorksCreate Stunning HTML Email That Just Works is a step-by-step guide to creating beautiful HTML emails that consistently work. It begins with an introduction to email covering topics such as: how email design differs from web design; permission based marketing, and the anatomy of an email.
The book shows the reader how to plan, design, and build gorgeous HTML email designs that look great in every email program: Outlook, Gmail, Apple Mail, etc. All-important tasks like legal requirements, testing, spam compliance and known hacks and workarounds are covered. ...
Pentaho Kettle SolutionsThis practical book is a complete guide to installing, configuring, and managing Pentaho Kettle. If you're a database administrator or developer, you'll first get up to speed on Kettle basics and how to apply Kettle to create ETL solutions - before progressing to specialized concepts such as clustering, extensibility, and data vault models. Learn how to design and build every phase of an ETL solution.
Get the most out of Pentaho Kettle and your data warehousing with this detailed guide - from simple single table data migration to complex multisystem clustered data integration tasks. ...