Last Uploaded Books

CoverTitleYear
This book makes use of the LISP programming language to provide readers with the necessary background to understand and use fuzzy logic to solve simple to medium-complexity real-world problems. It introduces the basics of LISP required to use a Fuzzy LISP programming toolbox, which was specifically implemented more » by the author to “teach” the theory behind fuzzy logic and at the same time equip readers to use their newly-acquired knowledge to build fuzzy models of increasing complexity. The book fills an important gap in the literature, providing readers with a practice-oriented reference guide to fuzzy logic that offers more complexity than popular books yet is more accessible than other mathematical treatises on the topic. As such, students in first-year university courses with a basic tertiary mathematical background and no previous experience with programming should be able to easily follow the content. The book is intended for students and professionals in the fields of computer science and engineering, as well as disciplines including astronomy, biology, medicine and earth sciences. Software developers may also benefit from this book, which is intended as both an introductory textbook and self-study reference guide to fuzzy logic and its applications. The complete set of functions that make up the Fuzzy LISP programming toolbox can be downloaded from a companion book’s website. « less
2015
KEY FEATURES * Set up the PHP environment and get started with web programming * Leverage the potential of PHP for server-side programming, memory management, and object-oriented programming (OOP) * This book is packed with real-life examples to help you implement the concepts as you learn BOOK more » DESCRIPTION PHP is a great language for building web applications. It is essentially a server-side scripting language that is also used for general purpose programming. PHP 7 is the latest version with a host of new features, and it provides major backwards-compatibility breaks. This book begins with the fundamentals of PHP programming by covering the basic concepts such as variables, functions, class, and objects. You will set up PHP server on your machine and learn to read and write procedural PHP code. After getting an understanding of OOP as a paradigm, you will execute MySQL queries on your database. Moving on, you will find out how to use MVC to create applications from scratch and add tests. Then, you will build REST APIs and perform behavioral tests on your applications. By the end of the book, you will have the skills required to read and write files, debug, test, and work with MySQL. WHAT YOU WILL LEARN * Set up a server on your machine with PHP * Use PHP syntax with the built-in server to create apps * Apply the OOP paradigm to PHP to write richer code * Use MySQL to manage data in your web applications * Create a web application from scratch using MVC * Add tests to your web application and write testable code * Use an existing PHP framework to build and manage your applications * Build REST APIs for your PHP applications * Test the behavior of web applications with Behat ABOUT THE AUTHOR Antonio Lopez is a software engineer with more than 7 years of experience. He has worked with PHP since university, which was 10 years ago, building small personal projects. Later, Antonio started his journey around Europe, working in Barcelona, London, Dublin, and back in Barcelona. He has worked in a number of different areas, from web applications to REST APIs and internal tools. Antonio likes to spend his spare time on personal projects and start-ups and has a strong vocation in education and teaching. TABLE OF CONTENTS 1. Setting Up the Environment 2. Web Applications with PHP 3. Understanding PHP Basics 4. Creating Clean Code with OOP 5. Using Databases 6. Adapting to MVC 7. Testing Web Applications 8. Using Existing PHP Frameworks 9. Building REST APIs 10. Behavioral Testing « less
2016
Summary OAuth 2 in Action teaches you the practical use and deployment of this HTTP-based protocol from the perspectives of a client, authorization server, and resource server. You'll learn how to confidently and securely build and deploy OAuth on both the client and server sides. Foreword by Ian more » Glazer. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the Technology Think of OAuth 2 as the web version of a valet key. It is an HTTP-based security protocol that allows users of a service to enable applications to use that service on their behalf without handing over full control. And OAuth is used everywhere, from Facebook and Google, to startups and cloud services. About the Book OAuth 2 in Action teaches you practical use and deployment of OAuth 2 from the perspectives of a client, an authorization server, and a resource server. You'll begin with an overview of OAuth and its components and interactions. Next, you'll get hands-on and build an OAuth client, an authorization server, and a protected resource. Then you'll dig into tokens, dynamic client registration, and more advanced topics. By the end, you'll be able to confidently and securely build and deploy OAuth on both the client and server sides. What's Inside * Covers OAuth 2 protocol and design * Authorization with OAuth 2 * OpenID Connect and User-Managed Access * Implementation risks * JOSE, introspection, revocation, and registration * Protecting and accessing REST APIs About the Reader Readers need basic programming skills and knowledge of HTTP and JSON. About the Author Justin Richer is a systems architect and software engineer. Antonio Sanso is a security software engineer and a security researcher. Both authors contribute to open standards and open source. Table of Contents 1. Part 1 - First steps 2. What is OAuth 2.0 and why should you care? 3. The OAuth dance 4. Part 2 - Building an OAuth 2 environment 5. Building a simple OAuth client 6. Building a simple OAuth protected resource 7. Building a simple OAuth authorization server 8. OAuth 2.0 in the real world 9. Part 3 - OAuth 2 implementation and vulnerabilities 10. Common client vulnerabilities 11. Common protected resources vulnerabilities 12. Common authorization server vulnerabilities 13. Common OAuth token vulnerabilities 14. Part 4 - Taking OAuth further 15. OAuth tokens 16. Dynamic client registration 17. User authentication with OAuth 2.0 18. Protocols and profiles using OAuth 2.0 19. Beyond bearer tokens 20. Summary and conclusions « less
2017
KEY FEATURES * Create powerful, end-to-end applications for Blockchain using Ethereum * Write your first program using the Solidity programming language * Change the way you think and design your applications by using the all new database-Blockchain BOOK DESCRIPTION Blockchain is a decentralized more » ledger that maintains a continuously growing list of data records that are secured from tampering and revision. Every user is allowed to connect to the network, send new transactions to it, verify transactions, and create new blocks, making it permission-less. This book will teach you what Blockchain is, how it maintains data integrity, and how to create real-world Blockchain projects using Ethereum. With interesting real-world projects, you will learn how to write smart contracts which run exactly as programmed without any chance of fraud, censorship, or third-party interference, and build end-to-end applications for Blockchain. You will learn about concepts such as cryptography in cryptocurrencies, ether security, mining , smart contracts, solidity, and more. You will also learn about web sockets, various API services for Ethereum, and much more. The blockchain is the main technical innovation of bitcoin, where it serves as the public ledger for bitcoin transactions. WHAT YOU WILL LEARN * Walk through the basics of the Blockchain technology * Implement Blockchain's technology and its features, and see what can be achieved using them * Build DApps using Solidity and Web3.js * Understand the geth command and cryptography * Create Ethereum wallets * Explore consortium blockchain ABOUT THE AUTHOR Narayan Prusty is currently working at a Blockchain company (Attores). Attores platform is an Ethereum product. Narayan writes Smart Contracts and also build the front end using Web3.js. He has been working on Ethereum for last 6 months. You can connect with him on LinkedIn at https://in.linkedin.com/in/narayanprusty. You can tweet him on Twitter at https://twitter.com/narayanprusty. Or you can check out his company s website, http://qnimate.com/. Narayan authored the following books for PACKT in 2015: Modern JavaScript Applications ( https://lnkd.in/eFgDVJS) and Learning ECMAScript 6 ( https://lnkd.in/eFT2_2y). « less
2017
A Practitioner's Approach
Although interest in machine learning has reached a high point, lofty expectations often scuttle projects before they get very far. How can machine learning—especially deep neural networks—make a real difference in your organization? This hands-on guide not only provides the most practical information more » available on the subject, but also helps you get started building efficient deep learning networks. Authors Adam Gibson and Josh Patterson provide theory on deep learning before introducing their open-source Deeplearning4j (DL4J) library for developing production-class workflows. Through real-world examples, you’ll learn methods and strategies for training deep network architectures and running deep learning workflows on Spark and Hadoop with DL4J. * Dive into machine learning concepts in general, as well as deep learning in particular * Understand how deep networks evolved from neural network fundamentals * Explore the major deep network architectures, including Convolutional and Recurrent * Learn how to map specific deep networks to the right problem * Walk through the fundamentals of tuning general neural networks and specific deep network architectures * Use vectorization techniques for different data types with DataVec, DL4J’s workflow tool * Learn how to use DL4J natively on Spark and Hadoop « less
2017
Develop your first interactive 2D platformer game by learning the fundamentals of C#
ABOUT THIS BOOK * Get to grips with the fundamentals of scripting in C# with Unity * Create an awesome, 2D platformer game from scratch using the principles of object-oriented programming and coding in C# * This is a step-by-step guide to learn the fundamentals of C# scripting to develop GameObjects more » and master the basics of the new UI system in Unity WHO THIS BOOK IS FOR The book is targeted at beginner level Unity developers with no programming experience. If you are a Unity developer and you wish to learn how to write C# scripts and code by creating games, then this book is for you. WHAT YOU WILL LEARN * Understand the fundamentals of variables, methods, and code syntax in C# * Get to know about techniques to turn your game idea into working project * Use loops and collections efficiently in Unity to reduce the amount of code * Develop a game using the object-oriented programming principles * Generate infinite levels for your game * Create and code a good-looking functional UI system for your game * Publish and share your game with users IN DETAIL Unity is a cross-platform game engine that is used to develop 2D and 3D video games. Unity 5 is the latest version, released in March 2015, and adds a real-time global illumination to the games, and its powerful new features help to improve a game's efficiency. This book will get you started with programming behaviors in C# so you can create 2D games in Unity. You will begin by installing Unity and learning about its features, followed by creating a C# script. We will then deal with topics such as unity scripting for you to understand how codes work so you can create and use C# variables and methods. Moving forward, you will find out how to create, store, and retrieve data from collection of objects. You will also develop an understanding of loops and their use, and you'll perform object-oriented programming. This will help you to turn your idea into a ready-to-code project and set up a Unity project for production. Finally, you will discover how to create the GameManager class to manage the game play loop, generate game levels, and develop a simple UI for the game. By the end of this book, you will have mastered the art of applying C# in Unity. STYLE AND APPROACH This is a step-by-step guide to developing a game from scratch by applying the fundamentals of C# and Unity scripting. « less
2016
Master the art of automating and managing your Windows environment using PowerShell
ABOUT THIS BOOK * Construct scripts by following proven best practices to automate redundant tasks * Delve into real-world examples to understand how to simplify the management of your Windows environment * Get to grips with PowerShell's advanced functions and effectively administer your system WHO more » THIS BOOK IS FOR If you are a system administrator who wants to become an expert in controlling and automating your Windows environment, then this book is for you. Prior knowledge of PowerShell's core elements and applications is required for this book. WHAT YOU WILL LEARN * Utilize variables, hashes, and arrays to store data * Parse and manipulate different data types * Optimize code through the use of functions, switches, and looping structures * Create and implement regular expressions in PowerShell scripts * Leverage session-based remote management * Manage files, folders, and registries through the use of PowerShell * Discover the best practices to manage Microsoft systems IN DETAIL PowerShell is quickly becoming the de facto standard for scripting in Microsoft Windows environments. It enables the automation of otherwise complex tasks, providing interactivity between different products. Beginning with PowerShell fundamentals, this book progresses by imparting the advanced skills required to master automation. You will learn how to deal with data and operations on various data types and structures, and see the techniques of data manipulation and parsing. Moving on, you will learn about the usage of regular expressions and comparison operators. Error handling techniques will enable you to identify and eliminate errors. This book also provides best practices for scripting and techniques to reduce the amount of code required to complete tasks. By the end of this book, you will be able to create a variety of PowerShell scripts and successfully automate your environment and become the go-to person. « less
2015
Rethink what's possible with Docker – become an expert in the innovative containerization tool to unlock new opportunities in the way you use and deploy software
ABOUT THIS BOOK * Create highly scalable applications and services using the Linux container virtualization paradigm * Extend Docker with external platforms, including Heroku and OpenStack * Integrate with some of the most innovative and exciting orchestration tools such as Kubernetes for larger and more » more controlled deployments WHO THIS BOOK IS FOR If you recognize Docker's importance for innovation in everything from system administration to web development, but aren't sure how to use it to its full potential, this book is for you. WHAT YOU WILL LEARN * Become fluent with the basic components of Docker * Learn best practices for storing and managing Docker files * Secure your containers and files with Docker's security features * Learn how to use Docker machine to build new servers from scratch * Find out how to set up and manage multiple environments with Docker compose * Utilize Docker Swarm to orchestrate containers across different servers * Integrate Docker with a wide range of cloud and configuration tools to fully realize its potential IN DETAIL Docker has been a game-changer when it comes to virtualization – it has now grown to become a key driver of innovation beyond system administration, having an impact on the world of web development and more. But how can you make sure you're keeping up with the innovations that it's driving? How can you be sure you're using it to its full potential? Mastering Docker shows you how – it not only demonstrates how to use Docker more effectively, it also helps you rethink and reimagine what's possible with Docker. Covering best practices to make sure you're confident with and the basics, such as building, managing and storing containers, before diving deeper into Docker security, you'll find everything you need to help you extend and integrate Docker in new and innovative ways. You'll learn how to take greater control over your containers using some of Docker's most sophisticated and useful tools, such as Docker compose and Docker swarm, before bringing together everything you already know and have learned to put your containers into production and monitor them for safety and performance. Beyond this, you'll also explore even more advanced strategies, as you learn how to extend and integrate Docker with cloud platforms such as Heroku and OpenStack, and how tools such as Kubernetes can improve the way you manage large-scale container orchestration. With further guidance on how you can use configuration management tools such as Puppet, Chef and PowerShell, by the end of the book you'll have a broad and detailed sense of exactly what's possible with Docker – and how seamlessly it fits with a range of other platforms and tools. STYLE AND APPROACH This book takes you through some of the most sophisticated Docker tools in a way that's accessible and practical. It has been created to help you put new ideas in practice – and to demonstrate precisely what's possible with Docker. « less
2015
#1 NEW YORK TIMES BESTSELLER If you want to build a better future, you must believe in secrets. The great secret of our time is that there are still uncharted frontiers to explore and new inventions to create. In Zero to One, legendary entrepreneur and investor Peter Thiel shows how we can find more » singular ways to create those new things. Thiel begins with the contrarian premise that we live in an age of technological stagnation, even if we’re too distracted by shiny mobile devices to notice. Information technology has improved rapidly, but there is no reason why progress should be limited to computers or Silicon Valley. Progress can be achieved in any industry or area of business. It comes from the most important skill that every leader must master: learning to think for yourself. Doing what someone else already knows how to do takes the world from 1 to n, adding more of something familiar. But when you do something new, you go from 0 to 1. The next Bill Gates will not build an operating system. The next Larry Page or Sergey Brin won’t make a search engine. Tomorrow’s champions will not win by competing ruthlessly in today’s marketplace. They will escape competition altogether, because their businesses will be unique. Zero to One presents at once an optimistic view of the future of progress in America and a new way of thinking about innovation: it starts by learning to ask the questions that lead you to find value in unexpected places. « less
2014
Get started with the art and science of digital forensics with this practical, hands-on guide!
ABOUT THIS BOOK * Champion the skills of digital forensics by understanding the nature of recovering and preserving digital information which is essential for legal or disciplinary proceedings * Explore new and promising forensic processes and tools based on 'disruptive technology' to regain control more » of caseloads. * Richard Boddington, with 10+ years of digital forensics, demonstrates real life scenarios with a pragmatic approach WHO THIS BOOK IS FOR This book is for anyone who wants to get into the field of digital forensics. Prior knowledge of programming languages (any) will be of great help, but not a compulsory prerequisite. WHAT YOU WILL LEARN * Gain familiarity with a range of different digital devices and operating and application systems that store digital evidence. * Appreciate and understand the function and capability of forensic processes and tools to locate and recover digital evidence. * Develop an understanding of the critical importance of recovering digital evidence in pristine condition and ensuring its safe handling from seizure to tendering it in evidence in court. * Recognise the attributes of digital evidence and where it may be hidden and is often located on a range of digital devices. * Understand the importance and challenge of digital evidence analysis and how it can assist investigations and court cases. * Explore emerging technologies and processes that empower forensic practitioners and other stakeholders to harness digital evidence more effectively. IN DETAIL Digital Forensics is a methodology which includes using various tools, techniques, and programming language. This book will get you started with digital forensics and then follow on to preparing investigation plan and preparing toolkit for investigation. In this book you will explore new and promising forensic processes and tools based on ‘disruptive technology' that offer experienced and budding practitioners the means to regain control of their caseloads. During the course of the book, you will get to know about the technical side of digital forensics and various tools that are needed to perform digital forensics. This book will begin with giving a quick insight into the nature of digital evidence, where it is located and how it can be recovered and forensically examined to assist investigators. This book will take you through a series of chapters that look at the nature and circumstances of digital forensic examinations and explains the processes of evidence recovery and preservation from a range of digital devices, including mobile phones, and other media. This book has a range of case studies and simulations will allow you to apply the knowledge of the theory gained to real-life situations. By the end of this book you will have gained a sound insight into digital forensics and its key components. STYLE AND APPROACH The book takes the reader through a series of chapters that look at the nature and circumstances of digital forensic examinations and explains the processes of evidence recovery and preservation from a range of digital devices, including mobile phones, and other media. The mystery of digital forensics is swept aside and the reader will gain a quick insight into the nature of digital evidence, where it is located and how it can be recovered and forensically examined to assist investigators. « less
2016