React Router Quick Start GuideReact Router is the routing library for React, and it can be used in both React Web and React Native applications. This book is a simple way to get started with React Router and harness its full power for your applications.
The book starts with an introduction to React Router and teaches you how to create your first route using the React component. You will then learn about configuring your routes, passing parameters, and creating nested routes. You will be introduced to various components in React-Router and learn different configuration options available for these components. You will then see how to use the Redirect and Switch components. For even greater flexibility, you will learn about BrowserRouter, HashRouter, NativeRouter, and StaticRouter.
By the end of the book, you will have set up a project with React Router and make routing configuration work in a server-side rendered React application, a mobile application built with React Native and also understand how Redux and ...
Industrial Internet Application DevelopmentThe Industrial Internet refers to the integration of complex physical machines with networked sensors and software. The current growth in the number of sensors deployed in heavy machinery and industrial equipment will lead to an exponential increase in data being captured that needs to be analyzed for predictive analytics. This also opens up a new avenue for developers who want to build exciting industrial applications.
Industrial Internet Application Development serves as a one-stop guide for software professionals wanting to design, build, manage, and operate IIoT applications. You will develop your first IIoT application and understand its deployment and security considerations, followed by running through the deployment of IIoT applications on the Predix platform. Once you have got to grips with what IIoT is, you will move on to exploring Edge Development along with the analytics portions of the IIoT stack. All this will help you identify key elements of the development framewor ...
Java 11 Cookbook, 2nd EditionFor more than three decades, Java has been on the forefront of developing robust software that has helped versatile businesses meet their requirements. Being one of the most widely used programming languages in history, it's imperative for Java developers to discover effective ways of using it in order to take full advantage of the power of the latest Java features. Java 11 Cookbook offers a range of software development solutions with simple and straightforward Java 11 code examples to help you build a modern software system.
Starting with the installation of Java, each recipe addresses various problem by explaining the solution and offering insights into how it works. You'll explore the new features added to Java 11 that will make your application modular, secure, and fast. The book contains recipes on functional programming, GUI programming, concurrent programming, and database programming in Java. You'll also be taken through the new features introduced in JDK 18.3 and 18.9. ...
Cybersecurity Incident ResponseCreate, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support.
Surviving an incident, or a breach, requires the best response possible. This book provides practical guidance for the containment, eradication, and recovery from cybersecurity events and incidents.
The book takes the approach that incident response should be a continual program. Leaders must understand the organizational environment, the strengths and weaknesses of the program and team, and how to strategically respond. Successful behaviors and actions required for each phase of incident response are explored in the book. Straight from NIST 800-61, these actions include: Planning and practicing, Detection, Containment, Eradication, Post-incident actions.
Know the sub-categories of the NIST Cyber ...
Security with GoGo is becoming more and more popular as a language for security experts. Its wide use in server and cloud environments, its speed and ease of use, and its evident capabilities for data analysis, have made it a prime choice for developers who need to think about security.
Security with Go is the first Golang security book, and it is useful for both blue team and red team applications. With this book, you will learn how to write secure software, monitor your systems, secure your data, attack systems, and extract information.
Defensive topics include cryptography, forensics, packet capturing, and building secure web applications.
Offensive topics include brute force, port scanning, packet injection, web scraping, social engineering, and post exploitation techniques. ...
Web Penetration Testing with Kali Linux, 3rd EditionWeb Penetration Testing with Kali Linux - 3rd Edition shows you how to set up a lab, helps you understand the nature and mechanics of attacking websites, and explains classical attacks in great depth. This edition is heavily updated for the latest Kali Linux changes and the most recent attacks. Kali Linux shines when it comes to client-side attacks and fuzzing in particular.
From the start of the book, you'll be given a thorough grounding in the concepts of hacking and penetration testing, and you'll see the tools used in Kali Linux that relate to web application hacking. You'll gain a deep understanding of classicalSQL, command-injection flaws, and the many ways to exploit these flaws. Web penetration testing also needs a general overview of client-side attacks, which is rounded out by a long discussion of scripting and input validation flaws.
There is also an important chapter on cryptographic implementation flaws, where we discuss the most recent problems with cryptographic la ...
Mastering ArduinoMastering Arduino is an all-in-one guide to getting the most out of your Arduino. This practical, no-nonsense guide teaches you all of the electronics and programming skills that you need to create advanced Arduino projects. This book is packed full of real-world projects for you to practice on, bringing all of the knowledge in the book together and giving you the skills to build your own robot from the examples in this book. The final two chapters discuss wireless technologies and how they can be used in your projects.
The book begins with the basics of electronics, making sure that you understand components, circuits, and prototyping before moving on. It then performs the same function for code, getting you into the Arduino IDE and showing you how to connect the Arduino to a computer and run simple projects on your Arduino.
Once the basics are out of the way, the next 10 chapters of the book focus on small projects centered around particular components, such as LCD displays, st ...
TokenomicsTokenomics is the economy of this new world. This is a no-holds-barred, in-depth exploration of the way in which we can participate in the blockchain economy. The reader will learn the basics of bitcoin, blockchains, and tokenomics; what the very first ICO was; and how over a period of 5 years, various projects managed to raise the enormous sums of money they did. The book then provides insights from ICO experts and looks at what the future holds. By comparing the past, current, and future of this technology, the book will inform anyone, whatever motivates their interest.
The crypto shift of blockchains, ICOs, and tokens is much more than just buying bitcoins, creating tokens, or raising millions in a minute in an ICO. It is a new paradigm shift from centralized to decentralized, from closed to open, and from opaqueness to transparency. ICOs and the creation of tokens during the craze of 2017 needed a lot of preparation, an understanding of cryptocurrencies and of emerging legal fra ...
Using Your Web Skills To Make MoneyDiscover what you need to learn to thrive and master online course creation and other income generating strategies that really work. This short book is the story of what worked and what didn't for author Azat Mardan, giving you the best tools and inspiration to achieve your monetary, career, creative, or contributorship goals.
Are you happy with your current level of passive income? Do your products or businesses make you money while you're asleep? When it comes to money and passive income, the only person you can rely on is yourself. Using Your Web Skills To Make Money will navigate you past any obstacles you may face in generating multiple income streams... especially if you're doing it for the first time.
Create online courses in your spare time; Review apprenticeships; Master one-on-one coaching; Understand the value of membership communities. ...
How to Compete in the Age of Artificial IntelligenceGet started with artificial intelligence in your business. This book will help you understand AI, its implications, and how to adopt a strategy that is rational, relevant, and practical.
Beyond the buzzwords and the technology complexities, organizations are struggling to understand what AI means for their industry and how they can start their journey. How to Compete in the Age of Artificial Intelligence is not a book about complex formulas or solution architectures. It goes deeper into explaining the meaning and relevance of AI for your business. You will learn how to apply AI thinking across enterprise functions - including disruptive technologies such as IoT, Blockchain, and cloud - and transform your organization.
Know how to spot AI opportunities and establish the right organizational imperatives to grow your business; Understand AI in the context of changing business dynamics and the workforce/skills required to succeed; Discover how to apply AI thinking across enterprise f ...