Raspberry Pi LED BlueprintsBlinking LED is a popular application when getting started in embedded development. By customizing and utilising LED-based modules into the Raspberry Pi board, exciting projects can be obtained. A countdown timer, a digital clock, a traffic light controller, and a remote light controller are a list of LED-based inspired project samples for Raspberry Pi.
An LED is a simple actuator device that displays lighting and can be controlled easily from a Raspberry Pi. This book will provide you with the ability to control LEDs from Raspberry Pi, starting from describing an idea through designing and implementing several projects based on LEDs, such as, 7-segments, 4-digits 7 segment, and dot matrix displays.
Beginning with step-by-step instructions on installation and configuration, this book can either be read from cover to cover or treated as an essential reference companion to your Raspberry Pi. Samples for the project application are provided such as a countdown timer, a digital clock ...
Node Cookbook, 2nd EditionNode Cookbook Second Edition shows you how to transfer your JavaScript skills to server-side programming. It will talk you through the various server-side scenarios, often saving you time and effort by demonstrating best practices and showing you how to avoid security faux pas.
Beginning with making your own web server, the recipes are designed to allow smooth progression through Node in order to help you design full web applications, command-line applications, and Node modules.
There's also extensive coverage on using popular frameworks such as Express 4 and Socket.IO, writing your own Node modules and different ways to take your apps live. ...
PhoneGap for EnterpriseThis book covers the necessary concepts you'll need to build useful, rich, secure enterprise apps for mobile devices, and also explains portions of an example enterprise app development so that you have a working demonstration of the concepts in the book.
The book focuses heavily on security concepts such as authorization, SSL and certificates, source code protection, local data store encryption, and so on, as ensuring a secure channel of communication between the user and the enterprise servers is critical.
The book explores the entire app's design, covering the data model and business logic you'll use for your app. It then moves on to cover how to build middle-tier communication between the middle tier and the mobile device, handling application and network events (such as a network going offline), and culminates by showing you how to work with various rich presentation technologies. ...
Learn Social EngineeringThis book will provide you with a holistic understanding of social engineering. It will help you to avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates.
Learn Social Engineering starts by giving you a grounding in the different types of social engineering attacks,and the damages they cause. It then sets up the lab environment to use different toolS and then perform social engineering steps such as information gathering. The book covers topics from baiting, phishing, and spear phishing, to pretexting and scareware.
By the end of the book, you will be in a position to protect yourself and your systems from social engineering threats and attacks.
All in all, the book covers social engineering from A to Z, along with excerpts from many world wide known security experts. ...
Mastering Kubernetes, 2nd EditionKubernetes is an open source system that is used to automate the deployment, scaling, and management of containerized applications. If you are running more containers or want automated management of your containers, you need Kubernetes at your disposal. To put things into perspective, Mastering Kubernetes walks you through the advanced management of Kubernetes clusters.
To start with, you will learn the fundamentals of both Kubernetes architecture and Kubernetes design in detail. You will discover how to run complex stateful microservices on Kubernetes including advanced features such as horizontal pod autoscaling, rolling updates, resource quotas, and persistent storage backend. Using real-world use cases, you will explore the options for network configuration, and understand how to set up, operate, and troubleshoot various Kubernetes networking plugins. In addition to this, you will get to grips with custom resource development and utilization in automation and maintenance workflo ...
Gray Hat Hacking, 5th EditionFortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hacker's Handbook, Fifth Edition explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. And the new topic of exploiting the Internet of things is introduced in this edition.
Build and launch spoofing exploits with Ettercap; Induce error conditions and crash software using fuzzers; Use advanced reverse engineering to exploit Windows and Linux software; Bypass Windows Access Control and memory protection schemes; Exploit web applications with Padding Oracle Att ...
C++ Templates, 2nd EditionTemplates are among the most powerful features of C++, but they remain misunderstood and underutilized, even as the C++ language and development community have advanced. In C++ Templates, Second Edition, three pioneering C++ experts show why, when, and how to use modern templates to build software that's cleaner, faster, more efficient, and easier to maintain.
Now extensively updated for the C++11, C++14, and C++17 standards, this new edition presents state-of-the-art techniques for a wider spectrum of applications. The authors provide authoritative explanations of all new language features that either improve templates or interact with them, including variadic templates, generic lambdas, class template argument deduction, compile-time if, forwarding references, and user-defined literals. They also deeply delve into fundamental language concepts (like value categories) and fully cover all standard type traits.
The book starts with an insightful tutorial on basic concepts and rele ...
Computing the EnvironmentComputing the Environment presents practical workflows and guidance for designers to get feedback on their design using digital design tools on environmental performance. Starting with an extensive state-of-the-art survey of what top international offices are currently using in their design projects, this book presents detailed descriptions of the tools, algorithms, and workflows used and discusses the theories that underlie these methods. Project examples from Transsolar Klimaengineering, Buro Happold's SMART Group, Behnish Behnisch Architects, Thomas Herzog, Autodesk Research are contextualized with quotes and references to key thinkers in this field such as Eric Winsberg, Andrew Marsh, Michelle Addington and Ali Malkawi. ...
The Manga Guide to CryptographyCryptography is hard, but it's less hard when it's filled with adorable Japanese manga. The latest addition to the Manga Guide series, The Manga Guide to Cryptography, turns the art of encryption and decryption into plain, comic-illustrated English.
As you follow Inspector Jun Meguro in his quest to bring a cipher-wielding thief to justice, you'll learn how cryptographic ciphers work. (Ciphers are the algorithms at the heart of cryptography). Like all books in the Manga Guide series, The Manga Guide to Cryptography is illustrated throughout with memorable Japanese manga as it dives deep into advanced cryptography topics, such as classic substitution, polyalphabetic, and transposition ciphers; symmetric-key algorithms like block and DES (Data Encryption Standard) ciphers; and how to use public key encryption technology. It also explores practical applications of encryption such as digital signatures, password security, and identity fraud countermeasures.
The Manga Guide to Cryptog ...
Salesforce Lightning CookbookThe new Lightning Experience combines three major components - Lightning Design System, Lightning App Builder, and Lightning Components - to enable anyone to quickly and easily create beautiful, modern enterprise apps. If you wish to meet the challenges that Lightning throws at you head-on, then look no further because this practical book will be your faithful companion and ensure that you make best use of the Lightning platform.
The book starts by walking you through the three major Lightning Components and helps you enable and configure a Lightning solution. You will explore the art of working with standard components and build a basic layout for the application. Then, you will add more advanced components using the Lightning Framework. Finally, you will also build and migrate reports and dashboards to make your app look more professional. Towards the end of the book, you'll make use of Design System to work with Salesforce data and lay out the entire page with the components that ...