Kamis, 08 Maret 2012

7 new posts


7 new posts

Link to Wow! eBook - Blog

Getting Started with Fluidinfo

Posted: 08 Mar 2012 08:10 AM PST

Getting Started with Fluidinfo

Book Description

Imagine a public storage system that has a place online for structured data about everything that exists—or that could exist. This book introduces , a system that enables you to store information about anything, real or imaginary, in any form. You'll learn organize and search for data, and decide who can use, modify, and extend what you've contributed.

This guide demonstrates 's potential to create data, with facilities that encourage users and applications to share, remix, and reuse data in ways they may not have anticipated. You'll learn use tools for reading and writing data, and use Fluidinfo in your own applications by working with its writable and simple query language.

  • Read and write Fluidinfo data from applications—and reuse and build upon each other's data
  • Discover Fluidinfo's permissions system for tags and namespaces
  • Learn how to use Fish, the command-line tool for interacting with Fluidinfo data
  • Delve into Fluidinfo's RESTful , and learn how to make requests
  • Use Fluidinfo client libraries to build a simple utility or a application

Table of Contents
Chapter 1. What Is Fluidinfo?
Chapter 2. Fluidinfo from the Command Line
Chapter 3. Data
Chapter 4. with Fluidinfo
Chapter 5. with
Chapter 6. Programming Fluidinfo with
Chapter 7. Fluidinfo's RESTful API
Chapter 8. Advanced Use of the Fluidinfo
Chapter 9. Conventions for the About Tag

Appendix. Fluidinfo Query Language Reference

Book Details

  • Paperback: 138 pages
  • Publisher: O’Reilly (January 2012)
  • Language: English
  • ISBN-10: 1449307094
  • ISBN-13: 978-1449307097
Note: There is a file embedded within this post, please visit this post to download the file.

Related Posts


Getting Started with OAuth 2.0

Posted: 08 Mar 2012 08:05 AM PST

Getting Started with OAuth 2.0

Book Description

Whether you develop applications or apps, the 2.0 protocol will save a lot of headaches. This concise introduction shows you how provides a single authorization technology across numerous APIs on the , so you can securely access users' data—such as user profiles, photos, videos, and contact lists—to improve their experience of your application.

Through code examples, step-by-step instructions, and use-case examples, you'll learn apply 2.0 to your server-side web application, client-side app, or app. Find out what it takes to access graphs, store data in a user's online filesystem, and perform many other tasks.

  • Understand OAuth 2.0's role in authentication and authorization
  • Learn how OAuth's Authorization Code flow helps you integrate data from different applications
  • Discover why native use OAuth differently than mobile
  • Use OpenID Connect and eliminate the need to build your own authentication system

Table of Contents
Chapter 1. Introduction
Chapter 2. Server-Side Web Application Flow
Chapter 3. Client-Side Web Applications Flow
Chapter 4. Resource Owner Password Flow
Chapter 5. Client Credentials Flow
Chapter 6. Getting Access to User Data from
Chapter 7. OpenID Connect Authentication
Chapter 8. Tools and Libraries

Appendix. References

Book Details

  • Paperback: 80 pages
  • : O’Reilly (February 2012)
  • Language: English
  • ISBN-10: 1449311601
  • ISBN-13: 978-1449311605
Note: There is a file embedded within this post, please visit this post to download the file.

Related Posts


Microsoft SQL Server 2012 Pocket Consultant

Posted: 08 Mar 2012 06:45 AM PST

Microsoft SQL Server 2012 Pocket Consultant

Book Description

Portable and precise, this -sized guide delivers ready answers for the day-to-day of Server. Zero in on core support and maintenance tasks using quick-reference tables, instructions, and lists. You'll get the focused information you need to save time and get the job done—whether at your desk or in the field!

Get fast facts to:

  • Manage Server services and clients
  • Configure, manage, and tune servers
  • Implement policy-based management
  • Administer and access
  • server activity and tune
  • Automate maintenance
  • Perform backups and

Table of Contents
Part I: 2012 Essentials
Chapter 1. Managing Your SQL Servers
Chapter 2. Managing Services and Clients

Part II: SQL Server 2012 Management and
Chapter 3. Implementing Policy-Based Management
Chapter 4. Configuring and Tuning Your SQL Servers
Chapter 5. Tuning and Linking Your SQL Servers
Chapter 6. Essentials
Chapter 7. Implementing SQL Server 2012 Security

Part III: Microsoft SQL Server 2012 Data Management
Chapter 8. Manipulating Schemas, Tables, and Views
Chapter 9. Using Indexes, Constraints, and Partitions

Part IV: Microsoft SQL Server 2012 , Maintenance, and
Chapter 10. Automating and Maintaining SQL Server 2012
Chapter 11. SQL Server 2012 Backup and Recovery
Chapter 12. SQL Server 2012 Profiling and Monitoring

Book Details

  • Paperback: 592 pages
  • Publisher: Microsoft Press (February 2012)
  • Language: English
  • ISBN-10: 0735663769
  • ISBN-13: 978-0735663763
Note: There is a file embedded within this post, please visit this post to download the file.

Related Posts


Liars and Outliers

Posted: 08 Mar 2012 06:40 AM PST

Liars and Outliers

Book Description

How does society function when you can’t trust everyone?

When we think about trust, we naturally think about personal relationships or bank vaults. That’s too narrow. Trust is much broader, and much more important. Nothing in society works without trust. It’s the foundation of communities, commerce, democracy—everything.

In this insightful and entertaining book, Schneier weaves together ideas from across the and biological sciences to explain how society induces trust. He shows how trust works and fails in settings, communities, organizations, countries, and the world.

In today’s hyper-connected society, understanding the mechanisms of trust is as important as understanding electricity was a century ago. Issues of trust and are critical to solving problems as diverse as corporate responsibility, global warming, and our moribund political system. After reading Liars and Outliers, you’ll think about problems, large and small, differently.

AUTHOR BIO
BRUCE SCHNEIER is an internationally renowned technologist who studies the human side of . He is the author of eleven books; and hundreds of articles, essays, and academic papers. He has testified before Congress, is a frequent guest on television and radio, and is regularly quoted in the press. His blog and monthly newsletter at www.schneier.com reach over devoted 250,000 devoted readers world-wide.

“The closest thing the security industry has to a rock star.”
The Register

ADVANCE PRAISE FOR LIARS AND OUTLIERS
“A rich, insightfully fresh take on what security really means!”
—DAVID ROPEIK, Author of How Risky is it, Really?

“Schneier has accomplished a spectacular tour de force: an enthralling ride through history, economics, and psychology, searching for the meanings of trust and security. A must read.”
—ALESSANDRO ACQUISTI, Associate Professor of Information Systems and Public Policy at the Heinz College, Carnegie Mellon University

“Liars and Outliers offers a major contribution to the understandability of these issues, and has the potential to help readers cope with the ever-increasing risks to which we are being exposed. It is well written and delightful to read.”
—PETER G. NEUMANN, Principal Scientist in the SRI International Computer Science Laboratory

“Whether it’s banks versus robbers, Hollywood versus downloaders, or even the Iranian police against democracy activists, security is often a dynamic struggle between a majority who want to impose their will, and a minority who want to push the boundaries. Liars and Outliers will change how you think about conflict, our security, and even who we are.”
—ROSS ANDERSON, Professor of Security Engineering at Cambridge University and author of Security Engineering

“Readers of Bruce Schneier’s Liars and Outliers will better understand technology and its consequences and become more mature practitioners.”
—PABLO G. MOLINA, Professor of Technology , Georgetown University

Liars & Outliers is not just a book about security—it is the book about it. Schneier shows that the power of humour can be harnessed to explore even a serious subject such as security. A great read!”
—FRANK FUREDI, author of On Tolerance: A Defence of Moral Independence

“This fascinating book gives an insightful and convincing framework for understanding security and trust.”
—JEFF YAN, Founding Research Director, Center for Cybercrime and Computer Security, Newcastle University

“By analyzing the moving parts and interrelationships among security, trust, and society, Schneier has identifi ed critical patterns, pressures, levers, and security holes within society. Clearly written, thoroughly interdisciplinary, and always smart, Liars and Outliers provides great insight into resolving society’s various dilemmas.”
—JERRY KANG, Professor of Law, UCLA

“By keeping the social dimension of trust and security in the center of his , Schneier breaks new ground with an approach that both theoretically grounded and practically applicable.”
—JONATHAN ZITTRAIN, Professor of Law and Computer Science, Harvard University and author of The Future of the —And How to Stop It

“Eye opening. Bruce Schneier provides a perspective you need to understand today's world.”
—STEVEN A. LEBLANC, Director of Collections, Harvard University and author of Constant Battles: Why We Fight

“An outstanding investigation of the importance of trust in holding society together and promoting progress. Liars and Outliers provides valuable new insights into security and economics.”
—ANDREW ODLYZKO, Professor, School of Mathematics, University of Minnesota

“What Schneier has to say about trust—and betrayal—lays a groundwork for greater understanding of human institutions. This is an essential exploration as society grows in size and complexity.”
—JIM HARPER, Director of Information Policy Studies, CATO Institute and author of Identity Crisis: How Identification is Overused and Misunderstood

“Society runs on trust. Liars and Outliers explains the trust gaps we must fill to help society run even better.”
—M. ERIC JOHNSON, Director, Glassmeyer/McNamee Center for Strategies, Tuck School of Business at Dartmouth College

“An intellectually exhilarating and compulsively readable of the subtle dialectic between cooperation and defection in human society. Intellectually rigorous and yet written in a lively, conversational style, Liars and Outliers will change the way you see the world.”
—DAVID LIVINGSTONE SMITH, author of Less Than Human: Why We Demean, Enslave, and Exterminate Others

“Schneier tackles trust head on, bringing all his intellect and a huge amount of research to bear. The best thing about this book, though, is that it’s great fun to read.”
—ANDREW MCAFEE, Principal Research Scientist, MIT Center for Business and co-author of Race Against the Machine

“Bruce Schneier is our leading expert in security. But his book is about much more than reducing risk. It is a fascinating, thought-provoking treatise about humanity and society and how we interact in the game called life.”
—JEFF JARVIS, author of Public Parts: How Sharing in the Digital Age Improves the Way We Work and Live

“Both accessible and thought provoking, Liars and Outliers invites readers to move beyond fears and anxieties about security in modern life to understand the role of everyday people in creating a healthy society. This is a must-read!”
—DANAH BOYD, Research Assistant Professor in , Culture, and Communication at New York University

“Trust is the sine qua non of the networked age and trust is predicated on security. Bruce Schneier's expansive and readable work is rich with insights that can help us make our shrinking world a better one.”
—DON TAPSCOTT, co-author of Macrowikinomics: Rebooting Business

and the World

“An engaging and wide-ranging rumination on what makes society click. Highly recommended.”
—JOHN MUELLER, author of Overblown: How Politicians and the Terrorism Industry Inflate National Security Threats, and Why We Believe Them

Book Details

  • Hardcover: 384 pages
  • : Wiley (February 2012)
  • Language: English
  • ISBN-10: 1118143302
  • ISBN-13: 978-1118143308
Note: There is a file embedded within this post, please visit this post to download the file.

Related Posts


Practical Malware Analysis

Posted: 08 Mar 2012 06:35 AM PST

Practical Malware Analysis

Book Description

is big , and attacks can cost a company dearly. When breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.

For those who want to stay ahead of the latest , Practical Malware will teach you the tools and techniques used by professional analysts. With this book as your guide, you’ll be able to safely analyze, debug, and disassemble any malicious software that comes your way.

You’ll learn :

  • Set up a safe virtual environment to analyze malware
  • Quickly extract network signatures and host-based indicators
  • Use key analysis tools like Pro, , and WinDbg
  • Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques
  • Use your newfound knowledge of internals for malware analysis
  • Develop a methodology for unpacking malware and get practical experience with five of the most popular packers
  • Analyze special cases of malware with shellcode, ++, and 64-bit code

Hands-on labs throughout the book challenge you to practice and synthesize your skills as you dissect real malware samples, and pages of detailed dissections offer an over-the-shoulder look at how the pros do it. You’ll learn crack open malware to see how it really works, determine what damage it has done, thoroughly clean your network, and ensure that the malware never comes back.

Table of Contents
Chapter 1. Malware Analysis Primer

Part I: Basic Analysis
Chapter 2. Basic Static Techniques
Chapter 3. Malware Analysis in Virtual Machines
Chapter 4. Basic Dynamic Analysis

Part II: Advanced Static Analysis
Chapter 5. A Crash Course in x86 Disassembly
Chapter 6. Pro
Chapter 7. Recognizing Code Constructs in
Chapter 8. Analyzing Malicious Programs

Part III: Advanced Dynamic Analysis
Chapter 9. Debugging
Chapter 10.
Chapter 11. Kernel Debugging with WinDbg

Part IV: Malware Functionality
Chapter 12. Malware Behavior
Chapter 13. Covert Malware Launching
Chapter 14. Data Encoding
Chapter 15. Malware-Focused Network Signatures

Part V: Anti-Reverse-Engineering
Chapter 16. Anti-Disassembly
Chapter 17. Anti-Debugging
Chapter 18. Anti-Virtual Machine Techniques
Chapter 19. Packers and Unpacking

Part VI: Special Topics
Chapter 20. Shellcode Analysis
Chapter 21. C++ Analysis
Chapter 22. 64-Bit Malware

Appendix. Important Windows Functions
Appendix. Tools for Malware Analysis
Appendix. Solutions to Labs

Book Details

  • Paperback: 800 pages
  • : No Starch Press (February 2012)
  • Language: English
  • ISBN-10: 1593272901
  • ISBN-13: 978-1593272906
Note: There is a file embedded within this post, please visit this post to download the file.

Related Posts


Take Control of Screen Sharing in Lion

Posted: 08 Mar 2012 06:26 AM PST

Take Control of Screen Sharing in Lion

Book Description

What hardware and software does this ebook discuss?

This ebook is about screen sharing between two Macs running 10.7 Lion, but it is also your go-to ebook about screen sharing with 10.6 Snow Leopard and 10.5 Leopard. For the apps covered, you should be running 3 or later.

You’ll learn :

  • Set up your Mac so that it can be controlled from your .
  • Start using screen sharing to help your confused uncle with his Mac.
  • Find and launch the built-in Screen Sharing application on your Mac.
  • Control an unattended Mac from far away.
  • Turn on Back to My Mac with MobileMe or .
  • Get set up and begin to share your screen through .
  • Give a presentation to a remote location through Theater.
  • Wake up a remote Mac in order to control it through screen sharing.
  • Copy text from one computer to another while sharing screens.
  • Put a shared screen in its own Full-Screen display in Lion.
  • Control a far-away Mac through screen sharing when another user is logged in to that same Mac with a different account.

Table of Contents

  • Read Me First
  • Introduction
  • Quick Start to Screen Sharing
  • What's New in Lion
  • Learn the Basics of Screen Sharing
  • Share via
  • Prepare to Share
  • Share via Bonjour
  • Share via a Direct Network Connection
  • Share via Back to My Mac
  • Share via
  • Sharing Screens in
  • Troubleshooting
  • About This Book
  • Copyright and Fine Print Featured Titles

Book Details

  • Paperback: 103 pages
  • : TidBITS Publishing, Inc. (February 2012)
  • Language: English
  • ISBN-10: 1615423966
  • ISBN-13:  978-1615423965
Note: There is a file embedded within this post, please visit this post to download the file.

Related Posts


Mastering the Fuji X100

Posted: 08 Mar 2012 06:20 AM PST

Mastering the Fuji X100

Book Description

Mastering the Fuji X100 provides the ambitious photographer with everything they need to know to operate this that has become an instant classic. Readers will learn about the features and capabilities of the X100 and will discover numerous tips and tricks for maximize its potential. Learn influence dynamic range, optimize focus, which film simulation is best, and much more.

The Fuji X100 is a premium viewfinder that combines compact size with sophisticated technical features and uncompromising optical quality. This unique already enjoys cult status and is used by many photographers as the ideal travel and snapshot . Nonetheless, the X100 is much more than an automatic snapshot —it is a sophisticated photographic tool.

In a layout suitable to the camera's attractive design, this manual presents convincing imagery that attests to the fun you will have as you begin to push the envelope of your Fuji X100.

About the Author
Michael Diechtierow is a photographer by passion and a biologist by , having recently earned his PhD in this field. As a photographer, he is equally interested in traditional and cutting edge experimental techniques.

Working with the Fuji X100 got Michael so excited that he spontaneously decided to sit down and collect his insights and experience for this book. Michael is also a coauthor of The Wild Side of , published by Rocky Nook.

Book Details

  • Paperback: 192 pages
  • : Rocky Nook (February 2012)
  • Language: English
  • ISBN-10: 1933952989
  • ISBN-13: 978-1933952987
Note: There is a file embedded within this post, please visit this post to download the file.

Related Posts


Tidak ada komentar:

Posting Komentar