Data Storage Networking [PDF]

Data Storage Networking [PDF]
Data Storage Networking: Real World Skills for the CompTIA Storage+ Certification and Beyond by Nigel Poulton
2014 | PDF | 4.79MB

Learn efficient ways to harness and manage your data storage networks

Whether you're preparing for the CompTIA Storage+ exam or simply seeking a deeper understanding of data storage networks, this Sybex guide will help you get there. This book covers data storage from the basics to advanced topics, and provides practical examples to show you ways to deliver world-class solutions. In addition, it covers all the objectives of the CompTIA Storage+ exam (SG0-001), including storage components, connectivity, storage management, data protection, and storage performance.

  • Focuses on designing, implementing, and administering storage for today's evolving organizations, getting under the hood of the technologies that enable performance, resiliency, availability, recoverability, and simplicity
  • Covers virtualization, big data, cloud storage, security, and scalability as well as how storage fits in to the wider technology environments prevalent in today's cloud era
  • Provides advice and real-world examples that storage administrators in the trenches can actually use
  • An excellent study aid for the CompTIA Storage+ exam (SG0-001), covering all the exam objectives

Data Storage Networking: Real World Skills for the CompTIA Storage+ Certification and Beyond provides a solid foundation for data storage administrators and a reference that can be consulted again and again.

The Metadata Manual [EPUB]

The Metadata Manual [EPUB]
The Metadata Manual: A Practical Workbook by Rebecca Lubas, Amy Jackson, Ingrid Schneider
2013 | EPUB | 3.23MB

Cultural heritage professionals have high levels of training in metadata. However, the institutions in which they practice often depend on support staff, volunteers, and students in order to function. With limited time and funding for training in metadata creation for digital collections, there are often many questions about metadata without a reliable, direct source for answers. The Metadata Manual provides such a resource, answering basic metadata questions that may appear, and exploring metadata from a beginner’s perspective. This title covers metadata basics, XML basics, Dublin Core, VRA Core, and CDWA schemes and provides exercise in the creation of metadata. Finally, the book gives an overview of metadata, including mapping and sharing.

  • Outlines the most popular metadata schema written by practicing metadata librarians
  • Focuses on what you “need to know?
  • Does not require coding experience to use and understand

C++11 for Programmers, 2nd Edition [EPUB]

C++11 for Programmers, 2nd Edition [EPUB]
C++11 for Programmers, 2nd Edition by Paul J Deitel, Harvey M Deitel
2013 | EPUB | 36.81MB

In C++11 for Programmers, the Deitels bring their proven Live Code approach to teaching today’s powerful new version of the C++ language. Like all Deitel Developer titles, they teach the best way possible: via hundreds of complete example C++ programs, with thousands of lines of downloadable C++ source code.

Unlike other C++11 books, this guide teaches robust, best-practice coding practices that fully support the CERT® Coordination Center’s authoritative secure coding standards. To help you write programs that are even more secure, the Deitels also introduce C++11’s new non-deterministic random-number generation capabilities. Using all these techniques, you can write industrial-strength C+11 code that stands up to attacks from viruses, worms, and other forms of malware.

Ideal for anyone who’s worked with at least one programming language before, C++11 for Programmers utilizes a proven “early objects” approach, emphasizing program clarity, software reuse, and component-oriented software construction. In addition to the core language, it will help you take advantage of the newest standard libraries and the newest language extensions. Coverage includes many new C++11 features, including smart pointers, regular expressions, shared_ptr and weak_ptr, and more.

This book contains 240 complete C++11 programs (more than 15,000 lines of downloadable code). All code has been thoroughly tested on three popular industrial-strength C++11 compilers: GNU C++ 4.7, Microsoft® Visual C++® 2012, and Apple® LLVM in Xcode® 4.5.

HTML5 and CSS3 For Dummies [EPUB]

HTML5 and CSS3 For Dummies [EPUB]
HTML5 and CSS3 For Dummies by David Karlins
2013 | EPUB | 19.16MB

Learn to create powerful and unique websites with HTML5 and CSS3

HTML5 and CSS3 have ushered in an entirely new era in web development and web design. This easy-to-understand full-color guide presents the elements of design and development as equal; therefore, both designers and developers will benefit from learning how to leverage the power behind HTML5 and CSS3. The two-page spreads and helpful insight show you how to use HTML5 and CSS3 in conjunction in order to create websites that possess both powerful function and beautiful design.

  • Incorporates all the trademark elements of the For Dummies series writing style - approachable, friendly, reliable, and functional - to assist you in gaining a solid foundation of the basics
  • Fills the void for both developers and designers who are looking to merge the power and function of HTML5 and CSS3
  • Features a website with code and templates

HTML5 and CSS3 For Dummies covers what you need to know to use HTML5 and CSS3, without weighing you down in unnecessary information.

Start Concurrent, 2014 Edition [EPUB]

Start Concurrent, 2014 Edition [EPUB]
Start Concurrent: An Introduction to Problem Solving in Java with a Focus on Concurrency, 2014 Edition by Barry Wittman, Aditya Mathur, Tim Korb
2014 | EPUB | 5.29MB

Multicore microprocessors are now at the heart of nearly all desktop and laptop computers. While these chips offer exciting opportunities for the creation of newer and faster applications, they also challenge students and educators. How can the new generation of computer scientists growing up with multicore chips learn to program applications that exploit this latent processing power? This unique book is an attempt to introduce concurrent programming to first-year computer science students, much earlier than most competing products.

This book assumes no programming background but offers a broad coverage of Java. It includes over 150 numbered and numerous inline examples as well as more than 300 exercises categorized as “conceptual,” “programming,” and “experiments.” The problem-oriented approach presents a problem, explains supporting concepts, outlines necessary syntax, and finally provides its solution. All programs in the book are available for download and experimentation. A substantial index of at least 5000 entries makes it easy for readers to locate relevant information.

In a fast-changing field, this book is continually updated and refined. The 2014 version is the seventh “draft edition” of this volume, and features numerous revisions based on student feedback.

The Browser Hacker's Handbook [EPUB]

The Browser Hacker's Handbook [EPUB]
The Browser Hacker's Handbook by Wade Alcorn, Christian Frichot, Michele Orru
2014 | EPUB | 26.64MB

Hackers exploit browser vulnerabilities to attack deep within networks

The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods.

The web browser has become the most popular and widely used computer "program" in the world. As the gateway to the Internet, it is part of the storefront to any business that operates online, but it is also one of the most vulnerable entry points of any system. With attacks on the rise, companies are increasingly employing browser-hardening techniques to protect the unique vulnerabilities inherent in all currently used browsers. The Browser Hacker's Handbook thoroughly covers complex security issues and explores relevant topics such as:

  • Bypassing the Same Origin Policy
  • ARP spoofing, social engineering, and phishing to access browsers
  • DNS tunneling, attacking web applications, and proxying—all from the browser
  • Exploiting the browser and its ecosystem (plugins and extensions)
  • Cross-origin attacks, including Inter-protocol Communication and Exploitation

The Browser Hacker's Handbook is written with a professional security engagement in mind. Leveraging browsers as pivot points into a target's network should form an integral component into any social engineering or red-team security assessment. This handbook provides a complete methodology to understand and structure your next browser penetration test.

pages: 02 03 04 05 06 07 08 09 10 11
*10: 10