Showing 1–24 of 378 results
Over 90 hands-on recipes to successfully build and automate development life cycle tasks following Maven conventions and best practices
If you are a Java developer or a manager who has experience with Apache Maven and want to extend your knowledge, then this is the ideal book for you.
Apache Maven Cookbook is for those who want to learn how Apache Maven can be used for build automation. It is also meant for those familiar with Apache Maven, but want to understand the finer nuances of Maven and solve specific problems.
Explore mobile automation with Appium and discover new ways to test native, web, and hybrid applications
About This Book
Use Appium to automate any type of mobile application from any language using any test framework
Write a single script to perform automation testing on both Android and iOS platforms
Equip yourself with the practical skills required to develop mobile applications using this pragmatic guide
What You Will Learn
Understand the desired capabilities that need to be acquired before starting Appium
Get to know and use the settings that are required to automate mobile applications
Interact with mobile applications by identifying elements using different locator strategies and techniques
Install mobile apps onto an emulator/simulator or a real device using Appium scripts
Test scripts written to automate applications
Configure mobile devices and perform automation testing on them
Explore the advanced features of Appium such as scroll, zoom, and swipe
Part of a series of specialized guides on System Center – this book provides focused drilldown into building a virtualized network solution. Series editor Mitch Tulloch and a team of System Center experts provide concise technical guidance as they step you through key build, configuration, and implementation tasks.
Create real-time stream processing applications with Apache Storm
About This Book
Integrate Storm with other Big Data technologies like Hadoop, HBase, and Apache Kafka
Explore log processing and machine learning using Storm
Step-by-step and easy-to-understand guide to effortlessly create applications with Storm
Who This Book Is For
If you are a Java developer who wants to enter into the world of real-time stream processing applications using Apache Storm, then this book is for you.
An examplepacked guide to help you successfully administer Citrix Provisioning Services
About This Book
Install and configure Citrix Provisioning Services quickly and efficiently
Master the architecture of Citrix Provisioning Services
Successfully manage and operate Citrix Provisioning Services
Who This Book Is For
This book is a useful guide for an admin/engineer who is new to the Citrix virtualization solution and provisioning service, and who is looking to get a good grounding in Citrix PVS.
High-performance message-based supercomputers have only recently emerged from the research laboratory. The commercial manufacturing of such products as the Intel iPSC, the Ametek s/14, the NCUBE/ten, and the FPS T Series – all based on multicomputer network technology – has sparked lively interest in high-performance computation, and particularly in the message-passing paradigm for parallel computation.This book makes readily available information on many aspects of the design and use of multicomputer networks, including machine organization, system software, and application programs.
Maximize the impact and precision of your message! Now in its fourth edition, the Microsoft Manual of Style provides essential guidance to content creators, journalists, technical writers, editors, and everyone else who writes about computer technology. Direct from the Editorial Style Board at Microsoft-you get a comprehensive glossary of both general technology terms and those specific to Microsoft; clear, concise usage and style guidelines with helpful examples and alternatives; guidance on grammar, tone, and voice; and best practices for writing content for the web, optimizing for accessibility, and communicating to a worldwide audience.
Building on the first edition of Joomla!: Visual QuickStart Guide, this task-based guide is the perfect tool for those just starting with Joomla, as well as, seasoned professionals who want to know how to use the latest version of the software to its fullest. It shows how to create, customize, and maintain a dynamic Joomla 1.6 website starting with fundamental concepts for using Joomla and then walks the user through every function of the system. It details the requirements for operating a secure and efficient Joomla website, including server configuration and website planning.
What once seemed nearly impossible has turned into reality. The number of available Internet addresses is now nearly exhausted, due mostly to the explosion of commercial websites and entries from an expanding number of countries.
Editors: Jajodia, S., Subrahmanian, V.S., Swarup, V., Wang, C. (Eds.)Features chapters written by leading experts in the fieldProposes new scientific methods to address many of the practical problems of cyber deceptionProvides a thorough scientific foundation for the field of cyber deceptionIncludes military and policy dimensions not typically covered in cyber-security booksThis edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more.
Cyberpsychology is an emerging area of psychological study that aims to understand and explain all facets of online behaviour. This book brings together overviews from a number of leading authorities in the field, to suggest how academic theory and research can be applied to a variety of online behaviours. Both positive and negative behaviours are considered, including topics as diverse as parenting the online child, age-related internet usage and cultural considerations in online interactions. Psychological research can no longer view online and offline worlds as different entities, but must consider online behaviours as equally distinct as offline activities.
This book shows you how to use PowerShell to quickly pinpoint, diagnose, and solve problems with your Windows Server environment, reducing the need for external tools, and ensuring you stay up-to-date with PowerShell as it quickly becomes one of the most useful tools in an administrator’s toolkit.Authors Derek Schauland and Donald Jacobs take you through a range of examples, showing you how to gather information from different computer sources. Whether you are logged into the server locally or just wanting to check the status of a server from your local computer, the right PowerShell cmdlets can give you a lot of information quickly, and allow you to troubleshoot your servers from the command line with little interaction with the server’s desktop.I
Get a fast start to using AlwaysOn, the SQL Server solution to high-availability and disaster recovery. Read this short, 150-page book that is adapted from Peter Carter’s Pro SQL Server Administration to gain a solid and accurate understanding of how to implement systems requiring consistent and continuous uptime.Begin with an introduction to high-availability and disaster recovery concepts such as Recovery Point Objectives (RPOs), Recovery Time Objectives (RTO), availability levels, and the cost of downtime.
Harness the power of VMware vRealize Operations to efficiently manage your IT infrastructure
About This Book
Extract the optimum performance, availability, and capacity of your IT infrastructure with the help of vRealise Operations Manager
Leverage the power of strategic reports to drive tactful decision-making within the IT department
A pragmatic guide to proficiently manage your applications and storage
Who This Book Is For
If you are a vSphere administrator and wish to optimize your virtual environment, this book is your go-to guide on vRealize Operations.
Imagine a public storage system that has a place online for structured data about everything that exists—or that could exist. This book introduces Fluidinfo, a system that enables you to store information about anything, real or imaginary, in any digital form. You’ll learn how to organize and search for data, and decide who can use, modify, and extend what you’ve contributed.
Authors: Mohapatra, Sanjay, Agrawal, Arjun, Satpathy, AnuragProvides a practical approach to design and implement Knowledge Management StrategyFocused on aligning KM Strategy with business objectivesIncludes five contemporary global case studiesThis book provides a practical approach to designing and implementing a Knowledge Management (KM) Strategy. The book explains how to design KM strategy so as to align business goals with KM objectives. The book also presents an approach for implementing KM strategy so as to make it sustainable.
Behind Google’s deceptively simple interface is immense power for both market and competitive research—if you know how to use it well. Sure, basic searches are easy, but complex searches require specialized skills.
Among its many amazing applications, Google now has web-based alternatives to many of the applications in Microsoft Office. This comprehensive and easy-to-follow new book enables you to explore Google’s new office applications in detail. Once you do, you’ll be in good company – more than 100,000 small businesses and some corporations are already looking to take advantage of these free Google offerings.
Break through brick walls in your genealogical researchLearn how to use innovative methods to unearth hard-to-find ancestors. Advanced Genealogy Research Techniques shows you, step by step, how to uncover elusive details by taking advantage of specialized tools and software programs and using proven best practices for breaking through the brick walls that have hindered your progress.You’ll get professional advice on formulating a research strategy, understanding the details you discover, keeping careful track of your data, analyzing the evidence, and developing hypotheses.
This work serves as a thorough, yet simple-to-read, reference on various aspects of cloud computing security. The text opens with an introduction to the general concepts of cloud computing necessary to build a basic understanding of the cloud, followed by a discussion of aspects of security. The work then examines how cloud security differs from conventional information security, and reviews cloud-specific classes of threats and attacks. A range of varying threats in cloud computing are covered, from threats of data loss and data breaches, to threats to availability and threats posed by malicious insiders.
With the recent proliferation of service-oriented architectures (SOA), cloud computing technologies, and distributed-interconnected systems, distributed fusion is taking on a larger role in a variety of applications―from environmental monitoring and crisis management to intelligent buildings and defense. Drawing on the work of leading experts around the world, Distributed Data Fusion for Network-Centric Operations examines the state of the art of data fusion in a distributed sensing, communications, and computing environment.
Get Insight into Designing and Implementing Data Fusion in a Distributed Network
Addressing the entirety of information fusion, the contributors cover everything from signal and image processing, through estimation, to situation awareness. In particular, the work offers a timely look at the issues and solutions involving fusion within a distributed network enterprise. These include critical design problems, such as how to maintain a pedigree of agents or nodes that receive information, provide their contribution to the dataset, and pass to other network components. The book also tackles dynamic data sharing within a network-centric enterprise, distributed fusion effects on state estimation, graph-theoretic methods to optimize fusion performance, human engineering factors, and computer ontologies for higher levels of situation assessment.
A comprehensive introduction to this emerging field and its challenges, the book explores how data fusion can be used within grid, distributed, and cloud computing architectures. Bringing together both theoretical and applied research perspectives, this is a valuable reference for fusion researchers and practitioners. It offers guidance and insight for those working on the complex issues of designing and implementing distributed, decentralized information fusion.
Master the art of penetration testing with Kali Linux
Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in a successful penetration testing project engagement.
Kali Linux – Assuring Security By Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating cutting-edge hacker tools and techniques with a coherent, step-by-step approach.
Showing 1–24 of 378 results