Hands-On Data Structures and Algorithms with Python, 3rd Edition
Choosing the right data structure is pivotal to optimizing the performance and scalability of applications. This new edition of Hands-On Data Structures and Algorithms with Python will expand your understanding of key structures, including stacks, queues, and lists, and also show you how to apply priority queues and heaps in applications. You'll learn how to analyze and compare Python algorithms, and understand which algorithms should be used for a problem based on running time and computational complexity. You will also become confident organizing your code in a manageable, consistent, and scalable way, which will boost your productivity as a Python developer.
By the end of this Python book, you'll be able to manipulate the most important data structures and algorithms to more efficiently store, organize, and access data in your applications. ...
Data-Driven Alexa Skills
Design and build innovative, custom, data-driven Alexa skills for home or business. Working through several projects, this book teaches you how to build Alexa skills and integrate them with online APIs. If you have basic Python skills, this book will show you how to build data-driven Alexa skills. You will learn to use data to give your Alexa skills dynamic intelligence, in-depth knowledge, and the ability to remember.
Data-Driven Alexa Skills takes a step-by-step approach to skill development. You will begin by configuring simple skills in the Alexa Skill Builder Console. Then you will develop advanced custom skills that use several Alexa Skill Development Kit features to integrate with lambda functions, Amazon Web Services (AWS), and Internet data feeds. These advanced skills enable you to link user accounts, query and store data using a NoSQL database, and access real estate listings and stock prices via web APIs. ...
SELinux System Administration, 3rd Edition
Linux is a dominant player in many organizations and in the cloud. Securing the Linux environment is extremely important for any organization, and Security-Enhanced Linux (SELinux) acts as an additional layer to Linux system security.
SELinux System Administration covers basic SELinux concepts and shows you how to enhance Linux system protection measures. You will get to grips with SELinux and understand how it is integrated. As you progress, you'll get hands-on experience of tuning and configuring SELinux and integrating it into day-to-day administration tasks such as user management, network management, and application maintenance. Platforms such as Kubernetes, system services like systemd, and virtualization solutions like libvirt and Xen, all of which offer SELinux-specific controls, will be explained effectively so that you understand how to apply and configure SELinux within these applications. If applications do not exert the expected behavior, you'll learn how to fine-tune p ...
Developing Inclusive Mobile Apps
By failing to consider those with needs different to ourselves, we are telling these people they are not welcome in our app, and therefore that technology as a whole, is not for them. This is not hyperbole - 23% of people in the US with a registered disability aren't online at all, that's three times more likely than the general population. When asked why they're not online, disabled respondents say their disability prevents them or that using the internet is too hard.
To help your apps combat the issue of digital exclusion, this book covers considerations and tools mobile developers, or anyone creating mobile experiences, can use to make mobile work better for those with disabilities - mental or physical - and how to create a better experience for everyone. Software is not made up of cold, unthinking algorithms. Software is a craft in the truest sense of the word, and one of the greatest tools you can have as a craftsperson is empathy for the people who will be using your app. Each ...
MOS Study Guide for Microsoft Access Expert Exam MO-500
Demonstrate your expertise with Microsoft Access. Designed to help you practice and prepare for Microsoft Office Specialist (MOS): Access 2019 certification, this official Study Guide delivers: In-depth preparation for each MOS objective; Detailed procedures to help build the skills measured by the exam; Hands-on tasks to practice what you've learned; Practice files and sample solutions. Sharpen the skills measured by these objectives: Create and manage databases; Build tables; Create queries; Create forms; Create reports. ...
Identity Attack Vectors
Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory initiatives.
As a solution, Identity Access Management (IAM) has emerged as the cornerstone of enterprise security. Managing accounts, credentials, roles, certification, and attestation reporting for all resources is now a security and compliance mandate. When identity theft and poor identity management is leveraged as an attack vector, risk and vulnerabilities increase exponentially. As cyber attacks continue to increase in volume and sophistication, it is not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities, to conduct their malicious activities through priv ...
Developing Accessible iOS Apps
Any developer aiming for a global audience needs to cover a series of requisites for their apps, and one of them is to make them accessible. Just having an app in the App Store is not enough for it to be a global success anymore. More than that, it is arguably our duty as developers to create inclusive apps that anyone can use.
Apple provides us with excellent tools for creating accessible apps. However, many developers just don't know about them or think they're difficult to us. This concise guide offers a focused look at breaking those myths and proving that creating accessible apps is very easy, and that it's just as easy to embed accessibility into the development process of your team.
You'll have a look at the tools iOS provides. Some, like zoom, button shapes, etc., come integrated in the operating system. Others, like VoiceOver, Larger Accessibility Sizes with Dynamic Types, and Smart Inverted Colours will need extra work to support appropriately. Then go from the basics o ...
Cloud Computing Using Oracle Application Express
Get the domain knowledge you need to develop real-world business apps for and in the cloud. You'll see how Oracle APEX has made the life of web developers much easier and how it helps you create web-based data-centric applications easily and instantly without writing screeds of code.
In Cloud Computing Using Oracle Application Express, you will develop a complete general ledger accounting system named the Cloud Accountant which will be accessible through a variety of devices including desktops, laptops, and the latest smartphones.
This new edition also incorporates the new application page creation process, which differs from the previous version. You'll cover other new areas, such as the updated UI elements and properties, and the interactive grid. Besides the development of a full application that you can deploy in your organization, the book teaches many new techniques to further enhance your APEX development skills.
Discover new development techniques for APEX developers; ...
Professional Web Accessibility Auditing Made Easy
Digital accessibility skills are in high demand, as the world becomes more aware of barriers in digital content that prevent some people from participating in a digital society. These are essential skills for web developers, and essential knowledge for organizations that want to ensure their web content is reaching the broadest audience possible.
This book will help readers develop the skills and knowledge needed to evaluate websites, web content, and web applications for compliance with international web accessibility requirements. These requirements help ensure that people with disabilities are able to participate fully on the Web.
This book is made up of an Introductory Unit, plus 8 chapters with a variety of readings, hands-on activities, and a short unmarked self-test.
Though there are no prerequisites knowledge required to benefit from this book, in order to make the best out of their learning experience, it is recommended that readers have:
- Some previous familiarity ...
Access 2019 Bible
Access 2019 Bible is your, comprehensive reference to the world's most popular database management tool. With clear guidance toward everything from the basics to the advanced, this go-to reference helps you take advantage of everything Access 2019 has to offer. Whether you're new to Access or getting started with Access 2019, you'll find everything you need to know to create the database solution perfectly tailored to your needs, with expert guidance every step of the way. The companion website features all examples and databases used in the book, plus trial software and a special offer from Database Creations. Start from the beginning for a complete tutorial, or dip in and grab what you need when you need it.
Access enables database novices and programmers to store, organize, view, analyze, and share data, as well as build powerful, integrable, custom database solutions - but databases can be complex, and difficult to navigate. This book helps you ...
Securing the Perimeter
Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it's now easier than ever to build and operate your own IAM stack.
The most common culprit of the largest hacks has been bad personal identification. In terms of bang for your buck, effective access control is the best investment you can make. Financially, it's more valuable to prevent than to detect a security breach. That's why Identity and Access Management (IAM) is a critical component of an organization's security infrastructure. In the past, IAM software has been available only from large enterprise software vendors. Commercial IAM offerings are bundled as "suites" because IAM is not just one component. It's a number of components working together, including web, authentication, authorization, cryptographic, and persistence services.