7 new posts |
- Getting Started with Fluidinfo
- Getting Started with OAuth 2.0
- Microsoft SQL Server 2012 Pocket Consultant
- Liars and Outliers
- Practical Malware Analysis
- Take Control of Screen Sharing in Lion
- Mastering the Fuji X100
Getting Started with Fluidinfo Posted: 08 Mar 2012 08:10 AM PST Book DescriptionImagine a public storage system that has a place online for structured data about everything that exists—or that could exist. This book introduces Fluidinfo, a system that enables you to store information about anything, real or imaginary, in any digital form. You'll learn how to organize and search for data, and decide who can use, modify, and extend what you've contributed. This guide demonstrates Fluidinfo's potential to create social data, with facilities that encourage users and applications to share, remix, and reuse data in ways they may not have anticipated. You'll learn how to use tools for reading and writing data, and how to use Fluidinfo in your own applications by working with its writable API and simple query language.
Table of Contents Appendix. Fluidinfo Query Language Reference Book Details
Related Posts
|
Getting Started with OAuth 2.0 Posted: 08 Mar 2012 08:05 AM PST Book DescriptionWhether you develop web applications or mobile apps, the OAuth 2.0 protocol will save a lot of headaches. This concise introduction shows you how OAuth provides a single authorization technology across numerous APIs on the Web, so you can securely access users' data—such as user profiles, photos, videos, and contact lists—to improve their experience of your application. Through code examples, step-by-step instructions, and use-case examples, you'll learn how to apply OAuth 2.0 to your server-side web application, client-side app, or mobile app. Find out what it takes to access social graphs, store data in a user's online filesystem, and perform many other tasks.
Table of Contents Appendix. References Book Details
Related Posts
|
Microsoft SQL Server 2012 Pocket Consultant Posted: 08 Mar 2012 06:45 AM PST Book DescriptionPortable and precise, this pocket-sized guide delivers ready answers for the day-to-day administration of SQL Server. Zero in on core support and maintenance tasks using quick-reference tables, instructions, and lists. You'll get the focused information you need to save time and get the job done—whether at your desk or in the field! Get fast facts to:
Table of Contents Part II: Microsoft SQL Server 2012 Management and Security Part III: Microsoft SQL Server 2012 Data Management Part IV: Microsoft SQL Server 2012 Optimization, Maintenance, and Recovery Book Details
Related Posts
|
Posted: 08 Mar 2012 06:40 AM PST Book DescriptionHow does society function when you can’t trust everyone? When we think about trust, we naturally think about personal relationships or bank vaults. That’s too narrow. Trust is much broader, and much more important. Nothing in society works without trust. It’s the foundation of communities, commerce, democracy—everything. In this insightful and entertaining book, Schneier weaves together ideas from across the social and biological sciences to explain how society induces trust. He shows how trust works and fails in social settings, communities, organizations, countries, and the world. In today’s hyper-connected society, understanding the mechanisms of trust is as important as understanding electricity was a century ago. Issues of trust and security are critical to solving problems as diverse as corporate responsibility, global warming, and our moribund political system. After reading Liars and Outliers, you’ll think about social problems, large and small, differently. AUTHOR BIO “The closest thing the security industry has to a rock star.” ADVANCE PRAISE FOR LIARS AND OUTLIERS “Schneier has accomplished a spectacular tour de force: an enthralling ride through history, economics, and psychology, searching for the meanings of trust and security. A must read.” “Liars and Outliers offers a major contribution to the understandability of these issues, and has the potential to help readers cope with the ever-increasing risks to which we are being exposed. It is well written and delightful to read.” “Whether it’s banks versus robbers, Hollywood versus downloaders, or even the Iranian secret police against democracy activists, security is often a dynamic struggle between a majority who want to impose their will, and a minority who want to push the boundaries. Liars and Outliers will change how you think about conflict, our security, and even who we are.” “Readers of Bruce Schneier’s Liars and Outliers will better understand technology and its consequences and become more mature practitioners.” “Liars & Outliers is not just a book about security—it is the book about it. Schneier shows that the power of humour can be harnessed to explore even a serious subject such as security. A great read!” “This fascinating book gives an insightful and convincing framework for understanding security and trust.” “By analyzing the moving parts and interrelationships among security, trust, and society, Schneier has identifi ed critical patterns, pressures, levers, and security holes within society. Clearly written, thoroughly interdisciplinary, and always smart, Liars and Outliers provides great insight into resolving society’s various dilemmas.” “By keeping the social dimension of trust and security in the center of his analysis, Schneier breaks new ground with an approach that both theoretically grounded and practically applicable.” “Eye opening. Bruce Schneier provides a perspective you need to understand today's world.” “An outstanding investigation of the importance of trust in holding society together and promoting progress. Liars and Outliers provides valuable new insights into security and economics.” “What Schneier has to say about trust—and betrayal—lays a groundwork for greater understanding of human institutions. This is an essential exploration as society grows in size and complexity.” “Society runs on trust. Liars and Outliers explains the trust gaps we must fill to help society run even better.” “An intellectually exhilarating and compulsively readable analysis of the subtle dialectic between cooperation and defection in human society. Intellectually rigorous and yet written in a lively, conversational style, Liars and Outliers will change the way you see the world.” “Schneier tackles trust head on, bringing all his intellect and a huge amount of research to bear. The best thing about this book, though, is that it’s great fun to read.” “Bruce Schneier is our leading expert in security. But his book is about much more than reducing risk. It is a fascinating, thought-provoking treatise about humanity and society and how we interact in the game called life.” “Both accessible and thought provoking, Liars and Outliers invites readers to move beyond fears and anxieties about security in modern life to understand the role of everyday people in creating a healthy society. This is a must-read!” “Trust is the sine qua non of the networked age and trust is predicated on security. Bruce Schneier's expansive and readable work is rich with insights that can help us make our shrinking world a better one.” and the World “An engaging and wide-ranging rumination on what makes society click. Highly recommended.” Book Details
Related Posts
|
Posted: 08 Mar 2012 06:35 AM PST Book DescriptionMalware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring. For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you’ll be able to safely analyze, debug, and disassemble any malicious software that comes your way. You’ll learn how to:
Hands-on labs throughout the book challenge you to practice and synthesize your skills as you dissect real malware samples, and pages of detailed dissections offer an over-the-shoulder look at how the pros do it. You’ll learn how to crack open malware to see how it really works, determine what damage it has done, thoroughly clean your network, and ensure that the malware never comes back. Table of Contents Part I: Basic Analysis Part II: Advanced Static Analysis Part III: Advanced Dynamic Analysis Part IV: Malware Functionality Part V: Anti-Reverse-Engineering Part VI: Special Topics Appendix. Important Windows Functions Book Details
Related Posts
|
Take Control of Screen Sharing in Lion Posted: 08 Mar 2012 06:26 AM PST Book DescriptionWhat hardware and software does this ebook discuss? This ebook is about screen sharing between two Macs running Mac OS X 10.7 Lion, but it is also your go-to ebook about screen sharing with 10.6 Snow Leopard and 10.5 Leopard. For the iOS apps covered, you should be running iOS 3 or later. You’ll learn how to:
Table of Contents
Book Details
Related Posts
|
Posted: 08 Mar 2012 06:20 AM PST Book DescriptionMastering the Fuji X100 provides the ambitious photographer with everything they need to know to operate this camera that has become an instant classic. Readers will learn about the features and capabilities of the X100 and will discover numerous tips and tricks for how to maximize its potential. Learn how to influence dynamic range, how to optimize focus, which film simulation is best, and much more. The Fuji X100 is a premium digital viewfinder camera that combines compact size with sophisticated technical features and uncompromising optical quality. This unique camera already enjoys cult status and is used by many photographers as the ideal travel and snapshot camera. Nonetheless, the X100 is much more than an automatic snapshot camera—it is a sophisticated photographic tool. In a layout suitable to the camera's attractive design, this manual presents convincing imagery that attests to the fun you will have as you begin to push the envelope of your Fuji X100. About the Author Working with the Fuji X100 got Michael so excited that he spontaneously decided to sit down and collect his insights and experience for this book. Michael is also a coauthor of The Wild Side of Photography, published by Rocky Nook. Book Details
Related Posts
|
You are subscribed to email updates from Wow! eBook - Blog To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
Tidak ada komentar:
Posting Komentar