Book Watch Archive


Security Intelligence (Wiley)
Monday, 01 June 2015

As leaders in the design and creation of security products authors Qing Li and Gregory Clark deliver unparalleled insight into the development of comprehensive and focused enterprise security solutions. In this handbook for security in modern times, they walk you through the process of translating your security goals into specific security technology domains, formulating the best deployment strategies, and verifying the solution by analyzing security incidents and divulging hidden breaches.

<ASIN:1118896696>

 
Learning my MySQL and MariaDB (O'Reilly)
Wednesday, 27 May 2015

This hands-on guide provides an easy, step-by-step approach to installing, using, and maintaining these popular relational database engines. Author Russell Dyer, Curriculum Manager at MariaDB and former editor of the MySQL Knowledge Base, takes you through database design and the basics of data management and manipulation, using real-world examples and many practical tips. Exercises and review questions help you practice what you’ve just learned.

<ASIN:1449362907>

 
Big Data (Manning)
Tuesday, 26 May 2015

With the subtitle "Principles and best practices of scalable realtime data systems", this book teaches you to build big data systems using an architecture that takes advantage of clustered hardware along with new tools designed specifically to capture and analyze web-scale data. Nathan Marz and James Warren describe a scalable, easy-to-understand approach to big data systems that can be built and run by a small team. Following a realistic example, they guide readers through the theory of big data systems, how to implement them in practice, and how to deploy and operate them once they're built.

<ASIN:1617290343>

 
Secrets and Lies (Wiley)
Monday, 25 May 2015

This is a special 15th Anniversary hardcover edition of security expert Bruce Schneier's book subtitled "Digital Security in a Networked World"  in which provides a practical, straight–forward guide to achieving security throughout computer networks. No theory, no math, no fiction of what should be working but isn′t, just the facts. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. Schneier′s tutorial on just what cryptography (a subset of computer security) can and cannot do for them, has received far–reaching praise from both the technical and business community.

<ASIN:1119092434>

 
Learning AngularJS (O'Reilly)
Friday, 22 May 2015

With AngularJS, you can quickly build client-side applications that run well on any desktop or mobile platform, using REST web services for backend processes. You may have heard that the learning curve for this JavaScript MVC framework is too steep, but that’s not the case. Ken Williamson provides a hands-on approach to learning AngularJS in which you gain direct experience with AngularJS by building a sample application.

<ASIN:1491916753>

 
The Gourmet iOS Developer's Cookbook (Addison Wesley)
Thursday, 21 May 2015

Offers a fresh banquet of delicious cutting-edge iOS programming recipes for projects both big and small. Renowned iOS programming expert Erica Sadun presents innovative ways to make the most of AVFoundation, Text Kit, animation, adaptive interface programming, with code for creating rich, robust. apps. As with her other iOS titles, this pragmatic guide translates modern best practices into working code, distilling key concepts into recipes you can understand and build on.

<ASIN:0134086228>

 
Designing for Performance (O'Reilly)
Wednesday, 20 May 2015

As a web designer, you encounter tough choices when it comes to weighing aesthetics and performance. Good content, layout, images, and interactivity are essential for engaging your audience, and each of these elements have an enormous impact on page load time and the end-user experience. In this practical book, Lara Hogan helps you approach projects with page speed in mind, showing you how to test and benchmark which design choices are most critical.

<ASIN:1491902515>

 
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails (Wiley)
Tuesday, 19 May 2015

Christopher Hadnagy and Michele Fincher address the growing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision–making and the impact of deliberate influence and manipulation on the recipient. Using detailed examples, the authors provide insight into the financial, corporate espionage, nation state, identity the goals of the attackers, and teach you how to spot a spoofed e–mail or cloned website.

<ASIN:1118958470>

 
Automate the Boring Stuff with Python (No Starch Press)
Monday, 18 May 2015

Described in its subtitle as "Practical Programming for Total Beginners" this is a book for non-programmers. In it Al Sweigart shows how to perform tasks that take hours to do by hand, such as renaming files or updating spreadsheet cells, with Python programs. Step-by-step instructions walk you through each program, and practice projects at the end of each chapter challenge you to improve those programs and use your newfound skills to automate similar tasks. As the blurb puts it, don't spend your time doing work a well-trained monkey could do. Even if you've never written a line of code, you can make your computer do the grunt work.

<ASIN:1593275994>

 
In Search of Certainty: The Science of Our Information Infrastructure 2nd Ed (O'Reilly)
Friday, 15 May 2015

Quite soon, the world’s information infrastructure is going to reach a level of scale and complexity that will force us to approach it in an entirely new way. The familiar notions of command and control are being thwarted by realities of a faster, denser world of communication where choice, variety, and indeterminism rule. The myth of the machine that does exactly what we tell it has come to an end. Mark Burgess focuses on the impact of computers and information on our modern infrastructure going from the roots of science to the principles behind system operation and design. To shape the future of technology, we need to understand how it works—or else what we don’t understand will end up shaping us.

<ASIN:1491923075>

 
Fast Data Processing with Spark 2nd Ed (Packt)
Thursday, 14 May 2015

This step-by-step tutorial from Krishna Sankar and Holden Karau is for software developers who want to learn how to write distributed programs with Spark. In it you will develop a machine learning system with Spark's MLlib and scalable algorithms and deploy Spark jobs to various clusters such as Mesos, EC2, Chef, YARN, EMR, and so on. No previous experience with distributed programming is necessary. However it assumes knowledge of either Java, Scala, or Python.

 

<ASIN:178439257X>

 
The Mobile Application Hacker's Handbook (Wiley)
Wednesday, 13 May 2015

A practical guide to securing all mobile applications by approaching the issue from a hacker′s point of view. Dominic Chell, Tyrone Erasmus, Shaun Colley and Ollie Whitehouse provide expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross–platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security. 

<ASIN:1118958500>

 
«StartPrev111112113114115116117118119120NextEnd»

Page 113 of 243