Drupal 8 Configuration ManagementDrupal 8 Configuration Management will teach you everything you need to know about the Configuration Management system and get you started with using its features quickly. For more advanced users, the book explains how to use the API to add custom configuration and how to upgrade custom modules to use the new Configuration Management system, covering some essential tools and best practices. It will teach you to write schema files for custom configuration and upgrade modules to the new Configuration Management system. Additionally, you will learn how to migrate configuration from Drupal 6 and 7 to Drupal 8 and how to manage configuration for multilingual websites. ...
Elasticsearch IndexingBeginning with an overview of the way ElasticSearch stores data, you'll begin to extend your knowledge to tackle indexing and mapping, and learn how to configure ElasticSearch to meet your users' needs. You'll then find out how to use analysis and analyzers for greater intelligence in how you organize and pull up search results – to guarantee that every search query is met with the relevant results! You'll explore the anatomy of an ElasticSearch cluster, and learn how to set up configurations that give you optimum availability as well as scalability. Once you've learned how these elements work, you'll find real-world solutions to help you improve indexing performance, as well as tips and guidance on safety so you can back up and restore data. Once you've learned each component outlined throughout, you will be confident that you can help to deliver an improved search experience – exactly what modern users demand and expect. ...
Enterprise CybersecurityEnterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity program that is seamlessly coordinated with policy, programmatics, IT life cycle, and assessment.
Fail-safe cyberdefense is a pipe dream. Given sufficient time, an intelligent attacker can eventually defeat defensive measures protecting an enterprise's computer systems and IT networks.
To prevail, an enterprise cybersecurity program must manage risk by detecting attacks early enough and delaying them long enough that the defenders have time to respond effectively. Enterprise Cybersecurity shows players at all levels of responsibility how to unify their organization's people, budgets, technolog ...
Enyo: Up and Running, 2nd EditionDiscover how easy it is to design and build responsive, cross-platform apps with the Enyo open source JavaScript framework. With this revised and expanded edition, Enyo contributor Roy Sutton gets you started with the framework's core object-oriented features, including its modular design, reusable and extensible components, layout and widget libraries, easy-to-use deployment options, and support for HTML5 standards.
You'll also delve into Enyo's latest features, including models, collections, data binding, and computed properties. Before you know it, you'll be writing native-quality, data-driven apps that work equally well on smartphones, tablets, and desktops. Are you familiar with HTML, CSS, or JavaScript? Then you're ready for Enyo. ...
Essential Cybersecurity ScienceIf you're involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You'll learn how to conduct scientific experiments on everyday tools and procedures, whether you're evaluating corporate security systems, testing your own security product, or looking for bugs in a mobile game.
Once author Josiah Dykstra gets you up to speed on the scientific method, he helps you focus on standalone, domain-specific topics, such as cryptography, malware analysis, and system security engineering. The latter chapters include practical case studies that demonstrate how to use available tools to conduct domain-specific scientific experiments. ...
Beginning Android Programming with Android Studio, 4th EditionAs the dominant mobile platform today, the Android OS is a powerful and flexible platform for mobile device. The new Android 7 release (New York Cheesecake) boasts significant new features and enhancements for both smartphone and tablet applications. This step-by-step resource takes a hands-on approach to teaching you how to create Android applications for the latest OS and the newest devices, including both smartphones and tablets.
Shows you how to install, get started with, and use Android Studio 2 - the simplest Android developer tool ever for beginners; Addresses how to display notifications, create rich user interfaces, and use activities and intents; Reviews mastering views and menus and managing data; Discusses working with SMS; Looks at packaging and publishing applications to the Android market.
Beginning Android Programming with Android Studio starts with the basics and goes on to provide you with everything you need to know to begin to successfully develop your own And ...
Graph Analysis and VisualizationGraph Analysis and Visualization brings graph theory out of the lab and into the real world. Using sophisticated methods and tools that span analysis functions, this guide shows you how to exploit graph and network analytic techniques to enable the discovery of new business insights and opportunities. Published in full color, the book describes the process of creating powerful visualizations using a rich and engaging set of examples from sports, finance, marketing, security, social media, and more. You will find practical guidance toward pattern identification and using various data sources, including Big Data, plus clear instruction on the use of software and programming. The companion website offers data sets, full code examples in Python, and links to all the tools covered in the book.
Science has already reaped the benefit of network and graph theory, which has powered breakthroughs in physics, economics, genetics, and more. This book brings those proven techniques into the worl ...
Hardening Azure ApplicationsLearn what it takes to build large scale, mission critical applications -hardened applications- on the Azure cloud platform.
This 208 page book covers the techniques and engineering principles that every architect and developer needs to know to harden their Azure/.NET applications to ensure maximum reliability and high availability when deployed at scale. While the techniques are implemented in .NET and optimized for Azure, the principles here will also be valuable for users of other cloud-based development platforms.
Applications come in a variety of forms, from simple apps that can be built and deployed in hours to mega-scale apps that need significantly higher engineering rigor and robust organizations to deliver them. How do you build such massively scalable applications to keep pace with traffic demands while always being ‘online' with five 9's availability? ...
HTML5 Programmer's ReferenceThe HTML5 Programmer's Reference aims to provide everything a programmer needs for understanding and using the new HTML5 family of standards. Previous HTML standards were focused on defining tags for marking up documents. The HTML5 family of standards not only includes new semantic tags but also defines exciting new JavaScript APIs that can be used to build rich, interactive web applications for both mobile and desktop platforms.
The HTML5 Programmer's Reference focuses on providing real-world non-trivial examples to demonstrate concepts. Chapters include both in-depth discussions and full references for all HTML5 features, as well as extras like how to find the standards, the history of their evolution, and other examples and helpful resources. With this book the reader will learn everything they need to know to build the next generation of web applications. ...
Leading When You're Not the BossAnswer the questions that arise when managers and workers need to adjust to unfamiliar leadership roles and rules in flattened organizational forms. Leading When You're Not the Boss provides a conceptual framework that you can apply when assessing your own organizations and work. The book discusses the underlying ideas necessary for a shift from a culture of hierarchies to one of relationships and the establishment of intrapreneurial and holistic work environments.
This book supports the trend in many corporations toward flattening parts of their traditional top–down hierarchical management systems into more egalitarian, democratized, and distributed organizational forms. It analyzes the weaknesses of "management" culture at a time of ever more rapid change and complexity in the business world and illustrates how flattened organizational units increase agility, innovation, and efficacy. Moreover, it discusses how individuals can exercise effective leadership despite lack ...