Analyzing the AnalyzersThere has been intense excitement in recent years around activities labeled "data science," "big data," and "analytics." However, the lack of clarity around these terms and, particularly, around the skill sets and capabilities of their practitioners has led to inefficient communication between "data scientists" and the organizations requiring their services. This lack of clarity has frequently led to missed opportunities. To address this issue, we surveyed several hundred practitioners via the Web to explore the varieties of skills, experiences, and viewpoints in the emerging data science community. ...
Gradle Beyond the BasicsIf you're familiar with Gradle's basics elements - possibly through the author's previous O'Reilly book, Building and Testing with Gradle - this more advanced guide provides the recipes, techniques, and syntax to help you master this build automation tool. With clear, concise explanations and lots of ready-to-use code examples, you'll explore four discrete areas of Gradle functionality: file operations, custom Gradle plugins, build lifecycle hooks, and dependency management.
Learn how to use Gradle's rich set of APIs and Groovy-based Domain Specific Language to customize build software that actually conforms to your product. By using the techniques in this book, you'll be able to write domain-specific builds that support every other line of code your team creates. ...
Lift CookbookIf you need help building web applications with the Lift framework, this cookbook provides scores of concise, ready-to-use code solutions. You'll find recipes for everything from setting up a coding environment to creating REST web services and deploying your application to production.
Built on top of the Scala JVM programming language, Lift takes a different - yet ultimately easier - approach to development than MVC frameworks such as Rails. Each recipe in this book includes a discussion of how and why each solution works, not only to help you complete the task at hand, but also to illustrate how Lift works. ...
Pluggable Authentication ModulesPAM-aware applications reduce the complexity of authentication. With PAM you can use the same user database for every login process. PAM also supports different authentication processes as required. Moreover, PAM is a well-defined API, and PAM-aware applications will not break if you change the underlying authentication configuration.
The PAM framework is widely used by most Linux distributions for authentication purposes. Originating from Solaris 2.6 ten years ago, PAM is used today by most proprietary and free UNIX operating systems including GNU/Linux, FreeBSD, and Solaris, following both the design concept and the practical details. PAM is thus a unifying technology for authentication mechanisms in UNIX. ...
Zenoss Core Network and System MonitoringFor system administrators, network engineers, and security analysts, it is essential to keep a track of network traffic. At some point it will be necessary to read the network traffic directly instead of monitoring application level details. Network security audits, debug network configurations, and usage patterns analyzing can all require network traffic monitoring. This task can be achieved by using network monitoring software, or network sniffers, that sniff the traffic and display it on your computer on the network.
Zenoss is an enterprise network and systems management application written in Python/Zope that provides an integrated product for monitoring availability, performance, events and configuration across layers and across platforms. ...
Middleware Management with Oracle Enterprise Manager Grid Control 10g R5Today's IT environment is very complex, encompassing a myriad of technologies and middleware platforms. Many organizations have large and heterogeneous middleware platforms that power their enterprise applications and it is often a real challenge for administrators to meet agreed service levels and minimize downtime. Oracle Enterprise Manager allows administrators to manage the complete lifecycle of an entire application infrastructure for middleware and SOA applications.
This book will help you kick-start the setup of Oracle Enterprise Manager Grid Control and master all aspects of middleware management supported by Oracle Enterprise Manager. ...
The Official Joomla! BookThe Official Joomla! Book is the authoritative and comprehensive Joomla! reference for every administrator, developer, designer, and content manager. Distilling the unsurpassed experience of two long-time Joomla! contributors, it teaches exactly what you need to know, through practical example sites and crystal-clear explanations.
If you're new to Joomla!, you'll learn how to quickly create usable, effective sites. If you're an experienced Joomla! user, you'll learn how to make your sites more flexible, feature-rich, visually attractive, and useful. And whether new or experienced, you'll learn how Joomla! really works, so you can fully leverage its power whenever you're ready. ...
Crackproof Your SoftwareThis essential resource for software developers highlights the weak points in "well-protected" software, shows how crackers break common protection schemes, and how to defend against crackers. Includes in-depth discussions of anti-debugging and anti-disassembling. ...
Hacking, 2nd EditionHacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.
Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective. ...
Game InvadersPresenting a holistic and thoroughly practical investigation of the true nature of computer games that arms readers with a small yet powerful set of theories for developing unique approaches to understanding games. Game Invaders fully integrates genre theory, new media aesthetics, perceptual opportunities, and semiotics into a practical DIY toolkit for games analysis—offering detailed guidance for how to conduct in-depth critiques of game content and gameplay.
Featuring an informal and witty writing style, the book devotes a number of chapters to specific games from all eras, clearly demonstrating the practical application of the theories to modern, large-scale computer games. ...