Kamis, 25 Oktober 2012

Wow! eBook: Restlet in Action - 3 new eBooks


Wow! eBook: Restlet in Action - 3 new eBooks

Link to Wow! eBook - Blog

Restlet in Action

Posted: 25 Oct 2012 05:33 AM PDT

Restlet in Action

Book Description

gets you started with the Framework and the REST style. You’ll create and deploy applications in record time while learning to use popular APIs effectively. This book looks at the many aspects of , on both the server and client side, along with , devices, and Semantic applications.

In a any component can act, if needed, as both client and server—this is flexible and powerful, but tricky to implement. The Restlet project is a reference implementation with a -based and everything you need to build servers and web clients that integrate with most web and enterprise technologies.

Restlet introduces the Restlet Framework and RESTful web APIs. You’ll see how to easily create and deploy your own web while learning to consume other web APIs effectively. You’ll learn about , securing, versioning, documentation, optimizing, and more on both the server and client side, as well as about , devices, and Semantic Web applications.

The book requires a basic knowledge of and the web, but no prior exposure to REST or Restlet.

What’s Inside

  • Written by the creators of Restlet!
  • How to create your own web API
  • How to deploy on and mobile platforms
  • Focus on Android, , Web Toolkit, and OSGi technologies

Table of Contents
Part 1: Getting started
Chapter 1. Introducing the Restlet Framework
Chapter 2. Beginning a Restlet application
Chapter 3. Deploying a Restlet application

Part 2: Getting ready to roll out
Chapter 4. Producing and consuming Restlet representations
Chapter 5. Securing a Restlet application
Chapter 6. Documenting and versioning a Restlet application
Chapter 7. Enhancing a Restlet application with recipes and best practices

Part 3: Further use possibilities
Chapter 8. Using Restlet with platforms
Chapter 9. Using Restlet in browsers and mobile devices
Chapter 10. Embracing hypermedia and the Semantic Web
Chapter 11. The future of Restlet

Appendixes:
Appendix A. Overview of the Restlet Framework
Appendix B. Installing the Restlet Framework
Appendix . Introducing the REST architecture style
Appendix D. a RESTful web API
Appendix E. Mapping REST, HTTP, and the Restlet API
Appendix F. Getting additional help

Book Details

  • Paperback: 464 pages
  • Publisher: Manning Publications (September 2012)
  • Language: English
  • ISBN-10: 193518234X
  • ISBN-13: 978-1935182344
Note: There is a file embedded within this post, please visit this post to download the file.

Related Posts

The post Restlet in Action appeared first on Wow! eBook - Blog.


Windows Presentation Foundation 4.5 Cookbook

Posted: 25 Oct 2012 05:05 AM PDT

Windows Presentation Foundation 4.5 Cookbook

Book Description

Presentation Foundation () provides developers with a unified model for building rich smart client user experiences that incorporate UI, , and documents.

has become the leading technology for developing rich client applications on the Windows platform, packed with features and capabilities. However, is big; in fact, it’s huge, causing a steep learning curve for the beginner and even for those already using some features.

Windows Presentation Foundation 4.5 provides clear recipes for common WPF tasks. It includes detailed explanations and code examples for customizing and enhancing the basic scenarios, while gaining a deep understanding of WPF mechanics and capabilities.

WPF is different and requires a different mind-set and approach. This book provides recipes and insights not only in its design but also its practical implementation details.

Starting from the foundations of WPF, such as dependency properties and , the book touches on all major WPF aspects, such as controls and layout, resources, and digs deep into its unprecedented data binding capabilities.

The book shows data and control templates , which allow full customizations of displayed data and controls in a declarative way. Supported by styles and resources makes data binding all the more powerful. The Model View View-Model pattern is presented as an effective way of maximizing decoupling of components, while providing an elegant way of expanding applications while maintaining a tight grip on complexity.

The later parts discuss custom elements and controls – the ultimate customization mechanism, and looks at multithreading issues, and how 4.5 task parallelism features can enhance application .

What will you learn from this book

  • Get tips and insights to maximize your productivity
  • Learn to build complex and flexible user interfaces using
  • Perform lengthy operations asynchronously while keeping the UI responsive
  • Get well-versed with WPF features such as data binding, layout, resources, templates, and styles
  • Customize a control’s template to alter appearance but preserve behaviour

Approach
This book is written in an easy-to-read style, with a strong emphasis on real-world, practical examples. Step-by-step explanations are provided for performing important tasks.

Who this book is written for
If you are # developer looking forward to increasing your understanding and knowledge of WPF, then this is the best guide for you. Basic experience with 2010 is mandatory, as well as good # skills. Previous experience with Windows Forms is not required.

Book Details

  • Paperback: 464 pages
  • Publisher: Packt Publishing (September 2012)
  • Language: English
  • ISBN-10: 184968622X
  • ISBN-13: 978-1849686228
Note: There is a file embedded within this post, please visit this post to download the file.

Related Posts

The post Windows Presentation Foundation 4.5 Cookbook appeared first on Wow! eBook - Blog.


Microsoft SQL Server 2012 Security Cookbook

Posted: 25 Oct 2012 05:02 AM PDT

Microsoft SQL Server 2012 Security Cookbook

Book Description

In 2011, a big corporation suffered a 23-day network outage after a breach of security that allowed the theft of millions of registered accounts on its gaming network. A month later, hackers claimed in a press release to have stolen personal information of 1 million users by a single injection attack. In these days of high-profile hacking, 2012 security has become of prime importance.

2012 Security ” will show you how to secure your using cutting-edge methods and protect it from hackers and other security threats. You will learn the latest techniques for data and code , user authentication and authorization, protection against brute force attacks, denial-of-service attacks, and Injection, securing intelligence, and more.

We will start with securing SQL Server right from the point where you install it. You will learn to secure your server and network with recipes such as managing service SIDs, configuring a for SQL Server access, and encrypting the session by . We will then address internal security : creating logins to connect to SQL Server, and users to gain access to a database. We will also see how to grant privileges to securable objects on the server or inside the database.

After having managed authentication through logins and users, we will assign privileges inside a database using permissions. We will then learn about symmetric keys, asymmetric keys and certificates, which can be used to encrypt data or sign data and modules with a choice of cipher algorithms, as well as creating hash representations of data.

Then we will cover methods to protect your database against brute force attacks, denial-of-service attacks, and SQL Injection. Finally we will learn about auditing and compliance and securing SQL Server Services (SSAS) and Services (SSRS).

What you will learn from this book

  • Start securing your database right from the first step when you install it
  • Protect your database against brute force attacks, denial-of-service attacks, and SQL Injection
  • Secure SQL Server Services (SSAS) and Services (SSRS)
  • Use a SQL or Application
  • Perform user authentication and authorization
  • Manage object ownership and protect data through views and stored procedures
  • Create and use certificates, and symmetric and asymmetric keys
  • Authenticate stored procedures by signatures
  • Monitor SQL Server logs and use DML and DDL trigger for auditing
  • Configure SQL Server database audit and manage audit resilience after a crash

Approach
Each recipe comprises step-by-step instructions followed by an analysis of what was done in each task and other useful information. The book is designed so that you can read it chapter by chapter, or look at the list of recipes and refer to them in no particular order. Each example comes with its expected output to make your learning even easier thus enabling you to successfully secure your SQL Server 2012 database.

Who this book is for
This book is for SQL Server administrators, developers, and consultants who want to secure their SQL Server database with cutting edge techniques for data and code encryption, user authentication and authorization, protection against brute force attacks, denial-of-service attacks, and SQL Injection, securing intelligence, and more.

Working knowledge of SQL Server is expected.

Book Details

  • Paperback: 322 pages
  • Publisher: Packt Publishing (September 2012)
  • Language: English
  • ISBN-10: 1849685886
  • ISBN-13: 978-1849685887
Note: There is a file embedded within this post, please visit this post to download the file.

Related Posts

The post Microsoft SQL Server 2012 Security Cookbook appeared first on Wow! eBook - Blog.


Tidak ada komentar:

Posting Komentar