Pro Power BI ArchitectureArchitect and deploy a Power BI solution. This book will help you understand the many available options and choose the best combination for hosting, developing, sharing, and deploying a Power BI solution within your organization.
Pro Power BI Architecture provides detailed examples and explains the different methods available for sharing and securing Power BI content so that only intended recipients can see it. Commonly encountered problems you will learn to handle include content unexpectedly changing while users are in the process of creating reports and building analysis, methods of sharing analyses that don't cover all the requirements of your business or organization, and inconsistent security models.
The knowledge provided in this book will allow you to choose an architecture and deployment model that suits the needs of your organization, ensuring that you do not spend your time maintaining your solution but on using it for its intended purpose and gaining business value fr ...
The Full Stack DeveloperUnderstand the technical foundations, as well as the non-programming skills needed to be a successful full stack web developer. This book reveals the reasons why a truly successful full stack developer does more than write code.
You will learn the principles of the topics needed to help a developer new to agile or full stack working - UX, project management, QA, product management, and more - all from the point of view of a developer. Covering these skills alongside the fundamentals and foundations of modern web development, rather than specifics of current technologies and frameworks (which can age quickly), all programming examples are given in the context of the web as it is in 2018.
Although you need to feel comfortable working on code at the system, database, API, middleware or user interface level, depending on the task in hand, you also need to be able to deal with the big picture and the little details. The Full Stack Developer recognizes skills beyond the technical, and ...
Program the Internet of Things with Swift for iOS, 2nd EditionLearn how to build apps using Apple's native APIs for the Internet of Things, including the Apple Watch, HomeKit, and Apple Pay. You'll also see how to interface with popular third-party hardware such as the Raspberry Pi, Arduino, and the FitBit family of devices.Program the Internet of Things with Swift and iOS is an update to the previous version and includes all new Swift 4 code. This book is a detailed tutorial that provides a detailed "how" and "why" for each topic, explaining Apple-specific design patterns as they come up and pulling lessons from other popular apps. To help you getting up and running quickly, each chapter is framed within a working project, allowing you to use the sample code directly in your apps.
The Internet of Things is not limited to Apple devices alone, so this book also explains how to interface with popular third-party hardware devices, such as the Fitbit and Raspberry Pi, and generic interfaces, like Restful API's and HTTPS. You'll also review new API ...
The LEGO BOOST Activity BookThe LEGO BOOST kit lets younger builders create fun, multifunctional robots by combining bricks with code, but it doesn't come with a manual. With the help of this complete guide to the LEGO BOOST set, you'll be on your way to building and programming BOOST robots in no time.
You'll begin your exploration by building a basic rover robot called MARIO to help you learn the fundamentals of the BOOST programming environment. Next, you'll add features to your rover to control its movement and make it repeat actions and react to colors and sounds. Once you've learned some programming basics, you'll learn how to program your robot to do things like follow lines on the ground, scan its environment to decide where to go, and even play darts. As final projects, you'll create two complete robots: BrickPecker to help you organize your bricks and CYBOT, a robot that talks, shoots objects, and executes voice commands.
As you advance through the book, optional lessons aim to deepen your underst ...
Pro Spring Boot 2Quickly and productively develop complex Spring applications and microservices out of the box, with minimal concern over things like configurations. This revised book will show you how to fully leverage the Spring Boot 2 technology and how to apply it to create enterprise ready applications that just work. It will also cover what's been added to the new Spring Boot 2 release, including Spring Framework 5 features like WebFlux, Security, Actuator and the new way to expose Metrics through Micrometer framework, and more.
This book is your authoritative hands-on practical guide for increasing your enterprise Java and cloud application productivity while decreasing development time. It's a no nonsense guide with case studies of increasing complexity throughout the book. The author, a senior solutions architect and Principal Technical instructor with Pivotal, the company behind the Spring Framework, shares his experience, insights and first-hand knowledge about how Spring Boot technology ...
The Java Module SystemJava's much-awaited "Project Jigsaw" is finally here! Java 11 includes a built-in modularity framework, and The Java Module System is your guide to discovering it. In this new book, you'll learn how the module system improves reliability and maintainability, and how it can be used to reduce tight coupling of system components.
Packaging code into neat, well-defined units makes it easier to deliver safe and reliable applications. The Java Platform Module System is a language standard for creating these units. With modules, you can closely control how JARs interact and easily identify any missing dependencies at startup. This shift in design is so fundamental that starting with Java 9, all core Java APIs are distributed as modules, and libraries, frameworks, and applications will benefit from doing the same.
The Java Module System is your in-depth guide to creating and using Java modules. With detailed examples and easy-to-understand diagrams, you'll learn the anatomy of a modular ...
Pro PowerShell for Amazon Web Services, 2nd EditionAmazon Web Services (AWS) is the leading public cloud platform. In this book you will learn to use Microsoft PowerShell to create, host, manage, and administer workloads using Amazon Web Services. You will learn how to create virtual machines, provision storage, configure networks, and more - all using your preferred Windows scripting language.
CIOs everywhere are leading their organizations to the cloud, but there are few books available to help. This book focuses on moving Microsoft Windows workloads to the cloud using technologies familiar to enterprise Microsoft-based professionals.
The completely revised and expanded Pro PowerShell for Amazon Web Services is written specifically for Windows professionals who already know PowerShell and want to learn to host Windows workloads on Amazon Web Services. The cloud offers information technology workers significant cost savings and agility unimaginable even just a few years ago. Tasks that traditionally took weeks of work, costing t ...
Checking Out with the Payment Request APIQuickly create consistent checkouts for use within websites, using the power of the HTML5 Payment Request API. This project-oriented book simplifies the process of creating and manipulating checkouts with the Payment Request API in browsers for websites or online applications, using little more than a text editor or free software.
One of the key concerns of any e-commerce company is ensuring customers complete the checkout process successfully, and for them to return. Unfortunately, many checkouts still suffer from a high level of drop-out. The Payment Request API is an open standard being developed by browser vendors to simplify payments for users with a quick and seamless autofill process enabling a broader set of online payment providers to participate in the market. The API is designed to be easy to implement across all supported browsers, and work with any payment type or service provider.
Checking Out with the Payment Request API equips you with a tool set that you can use ...
Xcode TreasuresLearn the critical tips and techniques to make using Xcode for the iPhone, iPad, or Mac easier, and even fun. Explore the features and functionality of Xcode you may not have heard of. Go under the hood to discover how projects really work, so when they stop working, you'll know how to fix them. Explore the common problems developers face when using Xcode, and find out how to get the most out of your IDE. Dig into Xcode, and you'll discover it's richer and more powerful than you might have thought.
Get a huge productivity boost by working with Xcode instead of against it. Instead of hacky code fixes and manual processes, once you know the the why and how of Xcode's process, you'll discover that doing things Xcode's way makes your app development more elegant and less aggravating.
Explore the major features of Xcode: project management, building UIs with storyboards, code editing, compiling apps, fixing bugs and performance problems, unit- and UI testing, and source code managemen ...
The IoT Hacker's HandbookTake a practioner's approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.
You'll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You'll also learn to assess a device physically by opening it, looking at the PCB, and identifying the chipsets and interfaces. You'll then use that information to gain entry to the device or to perform other actions, such as dumping encryption keys and firmware.
As the IoT rises to one of the most popular tech trends, manufactures need to take necessary steps to secure devices and protect them from attackers. The IoT Hacker's Handbook breaks down the Internet of Things, exploits it, and reveals how these devices can be built securely.
Perform a threat model of a real-world IoT device and locate all possible attacker entry points; Use reverse engineering of firmware binaries to identify securi ...