Confessions of an IT ManagerFrom IT projects that have trampled all over the guiding principles of successful development, to tips on training your manager to the required standard, each of Phil's tales is shot through with a wild seam of anarchic humour. And yet, in each case, the humor is just a sugar coating for a pill of sage advice, wrought from years of rough-and-tumble in the IT industry.
In his more reflective moments, he gives vent to his inner poet, penning romantic elegies to the SQL Server index, or quietly condemning recruitment agencies to Dante's inferno for crimes against innocent contractors.
Phil Factor is a legend in his own runtime. Scurrilous, absurd, confessional and scathing by turns, Confessions of an IT Manager targets the idiocy, incompetence and overreach of the IT management industry from vantage point all the way up and down the greasy pole. ...
ASP.NET Core SecurityASP.NET Core Security teaches you the skills and countermeasures you need to keep your ASP.NET Core apps secure from the most common web application attacks. With this collection of practical techniques, you will be able to anticipate risks and introduce practices like testing as regular security checkups. You'll be fascinated as the author explores real-world security breaches, including rogue Firefox extensions and Adobe password thefts. The examples present universal security best practices with a sharp focus on the unique needs of ASP.NET Core applications.
Your ASP.NET Core applications are under attack now. Are you ready? Th ere are specific countermeasures you can apply to keep your company out of the headlines. This book demonstrates exactly how to secure ASP.NET Core web applications, including safe browser interactions, recognizing common threats, and deploying the framework's unique security APIs.
ASP.NET Core Security is a realistic guide to securing your web applicat ...
The Definitive Guide to Security in Jakarta EERefer to this definitive and authoritative book to understand the Jakarta EE Security Spec, with Jakarta Authentication & Authorization as its underlying official foundation. Jakarta EE Security implementations are discussed, such as Soteria and Open Liberty, along with the build-in modules and Jakarta EE Security third-party modules, such as Payara Yubikey & OIDC, and OmniFaces JWT-Auth.
The book discusses Jakarta EE Security in relation to SE underpinnings and provides a detailed explanation of how client-cert authentication over HTTPS takes place, how certifications work, and how LDAP-like names are mapped to caller/user names. General (web) security best practices are presented, such as not storing passwords in plaintext, using HTTPS, sanitizing inputs to DB queries, encoding output, and explanations of various (web) attacks and common vulnerabilities are included.
Practical examples of securing applications discuss common needs such as letting users explicitly log in, sign u ...
Introducing Microsoft OrleansWelcome to Orleans, a virtual actor framework from Microsoft that allows a single developer to create immensely scalable, available applications while maintaining a high throughput. This guide is designed to give you a foundational understanding of Orleans, an overview of its implementations, and plenty of hands-on coding experience. Side-by-side monolithic and microservice patterns alongside Orleans' framework features are also discussed, to help readers without an actor model background understand how they can enhance applications.
Author Nelson's approach is to introduce patterns as needed for business requirements, including monolithic microservices and to convert monolithic to microservices, in order to keep a microservice from growing into a monolithic application. Orleans is a good choice for either of these scenarios as the next step to build your backend services and reduce unnecessary orchestration, overhead, and tooling.
The Orleans framework was designed to handle ted ...
Git for Electronic Circuit DesignWork with Git and avoid dangerous mishaps in this popular, cooperative environment, even if you have no software engineering background or previous experience with Git. This book will teach you the basic principles of working cooperatively in Git with software engineers and other team members to handle issues the GUI can't.
You'll start by learning the fundamentals of the Git environment and commands. Concepts such as commits, branches, and Git organization are discussed. To avoid bogging you down with software terminology, advanced topics like setting up a Git server are ignored. Descriptions are worded to keep you away from technical specifications. Examples are presented in easily digestible text files and focus on realistic scenarios and concerns without delving into one-off or advanced, oddball situations. You can see the results without focusing on the jargon.
Once you understand the basics of Git, you'll design a digital system circuit using a computer aided design (CAD) ...
Data-Driven Alexa SkillsDesign and build innovative, custom, data-driven Alexa skills for home or business. Working through several projects, this book teaches you how to build Alexa skills and integrate them with online APIs. If you have basic Python skills, this book will show you how to build data-driven Alexa skills. You will learn to use data to give your Alexa skills dynamic intelligence, in-depth knowledge, and the ability to remember.
Data-Driven Alexa Skills takes a step-by-step approach to skill development. You will begin by configuring simple skills in the Alexa Skill Builder Console. Then you will develop advanced custom skills that use several Alexa Skill Development Kit features to integrate with lambda functions, Amazon Web Services (AWS), and Internet data feeds. These advanced skills enable you to link user accounts, query and store data using a NoSQL database, and access real estate listings and stock prices via web APIs. ...
Evolve the Monolith to Microservices with Java and NodeMicroservices is an architectural style in which large, complex software applications are composed of one or more smaller services. Each of these microservices focuses on completing one task that represents a small business capability. These microservices can be developed in any programming language.
This book shows how to break out a traditional Java EE application into separate microservices and provides a set of code projects that illustrate the various steps along the way. The sample projects highlight the evolution of monoliths to microservices with Java and Node. ...
Debugging with GDBThe GNU Debugger allows you to see what is going on "inside" a program while it executes - or what a program was doing at the moment it crashed. GDB supports C, C++, Java, Fortran and Assembly among other languages; it is also designed to work closely with the GNU Compiler Collection (GCC). The GNU Debugger Program has four special features that helps you catch bugs in the act: It starts your program for you, specifying anything that might affect it's behavior. Makes your program stop under specified conditions. Examines what happened when the program stopped. Allows you to experiment with changes to see what effect they have on the program. This book will show you: setting and clearing breakpoints examining the stack, source files and data examining the symbol table altering program execution specifying a target for debugging how to control the debugger how to use canned command sequences how to install GDB and much more! This manual is written for programmers. It is designed so someo ...
Coding Roblox Games Made Easy, 2nd EditionRoblox is a huge entertainment platform like no other for both playing and creating games. With over 200 million monthly active users, Roblox has enabled new and experienced developers to create successful games, often called experiences, that can be played globally at no cost.
Coding Roblox Games Made Easy, 2nd Edition, builds a solid foundation of the concepts you need to embark on the journey of building two end-to-end games in Roblox in increasing order of complexity.
For the first game, you will create obstacles and traps for an obstacle course game (obby) and overcome them to win the game alongside other players and earn rewards. In the next game, you will manage player avatars, their weapons, a battlefield and add programming logic for the players to find their weapons and fight, with a reward for the last player standing.
Finally, you'll delve into the logistics of game production, focusing on optimizing your games' performance by implementing impressive mechanics, mon ...
Build Customized Apps with Amazon HoneycodeAmazon Honeycode enables you to build fully managed, customizable, and scalable mobile and web applications for personal or professional use with little to no code. With this practical guide to Amazon Honeycode, you'll be able to bring your app ideas to life, improving your and your team's/organization's productivity.
You'll begin by creating your very first app from the get-go and use it as a means to explore the Honeycode development environment and concepts. Next, you'll learn how to set up and organize the data to build and bind an app on Honeycode as well as deconstruct different templates to understand the common structures and patterns that can be used. Finally, you'll build a few apps from scratch and discover how to apply the concepts you've learned.
By the end of this app development book, you'll have gained the knowledge you need to be able to build and deploy your own mobile and web applications. You'll also be able to invite and share your app with people you want to ...