Hardware
Neil Mackenzie
The Windows Azure platform is Microsoft's Platform-as-a-Service environment for hosting services and data in the cloud. It provides developers with on-demand computing, storage, and service connectivity capabilities that facilitate the hosting of highly scalable services in Windows Azure datacenters across the globe.This practical cookbook will show you advanced development techniques for building highly scalable cloud-based services using the Windows Azure platform. It contains over 80 practical, task-based, and immediately usable recipes covering a wide range of advanced development techniques for building highly scalable services to solve particular problems/scenarios when developing these services on the Windows Azure platform.Packed with reusable, real-world recipes, the book starts by explaining the various access control mechanisms used in the Windows Azure platform. Next you will see the advanced features of Windows Azure Blob storage, Windows Azure Table storage, and Windows Azure Queues. The book then dives deep into topics such as developing Windows Azure hosted services, using Windows Azure Diagnostics, managing hosted services with the Service Management API, using SQL Azure and the Windows Azure AppFabric Service Bus. You will see how to use several of the latest features such as VM roles, Windows Azure Connect, startup tasks, and the Windows Azure AppFabric Caching Service.
Juntao Cheng, Steven Cheng
The Windows Communication Foundation 4.0 (WCF 4.0) is a .NET-based application programming interface for building and running connected systems. It enables secure and reliable communication among systems within an organization or across the Internet. This book deals with the difficult issues faced by a .NET developer while working with WCF.WCF 4.0 is a communications infrastructure that unifies a broad array of distributed systems' capabilities in a composable, extensible architecture that supports multiple transports, messaging patterns, encodings, network topologies, and hosting models. This book is a collection of focused real-world recipes and covers basic recipes on topics such as working with contracts to more advanced topics such as extending WCF runtime. By the end of this book you will have valuable information that helps transform the potentially unproductive habits of .Net developers who work with WCF.This book will take you through many concepts starting with complete support for contract-related design for WCF service development. You will learn to use WCF's built-in feature for building various service endpoints. Service hosting and configuration are important areas for building WCF services, especially at the service deployment stage, and are detailed in this book. You will find it easy to work with WCF client proxy generation and metadata publishing and discovery when you go through recipes such as customizing auto-generated service proxies.The author then discusses the exchange of data in WCF service operation features, related to WCF data serialization. You will discover some useful tips for security in WCF service development and built-in features for developing concurrency control for your services built upon it.One big plus is that you will learn to extend the existing WCF framework to achieve advanced functionality. You will find a dedicated chapter for RESTful and AJAX-enabled service development. Moving on, you will find several useful WCF service interoperability cases, which are important for a distributed service development platform. Towards the end of this book you will find some handy and useful diagnostic methods for troubleshooting.
David Overton
Microsoft Windows Intune is a cloud service solution that simplifies how small and mid-sized businesses manage and secure PCs using Microsoft cloud services and Windows 7óso your computers and users can operate at peak performance all the time.This step-by-step guide will show you how to plan, set up and maintain Windows Intune, showing you how to manage a group of PCs (either 1 business or several if a partner) from the base operating system, through to the patches, anti-malware solution and deployed software and policies from a central console, using the Windows Intune service. This book takes you through all the steps to plan, set up and maintain Windows Intune and how to manage a group of PCs. The book starts by providing an overview of Cloud Computing and PC Management. The book then dives into topics such as Windows Intune features, signing up for Windows Intune and installing the client software, configuring Windows Intune, proactive management, and monitoring and dealing with alerts, including remote assistance amongst others. As Windows 7 is part of Windows Intune, the book will also cover the minimum steps required to move from Windows XP to Windows 7 while keeping user settings and preferences.
Andrew Zhu
Windows Workflow Foundation 4.0 (WF) is a significant part of .NET Framework 4.0. WF makes workflow technology available to every single programmer that uses the .NET Framework 4.0. It is easy to create long running and distributed programs using WF with the right knowledge. With this book, you will discover that working with workflows is easy.This book provides both step-by-step recipes and relevant background information. It covers all the important aspects of Windows Workflow Foundation 4.0. The best thing about this book is that all recipes are based on real-world experiences of Andrew Zhu. Andrew is a global WF and BizTalk technology support engineer for Microsoft. This book covers everything you need to know, when working with workflows. Get to grips with flow control activities, messaging, and transaction processes with easy to understand steps followed by explanations. You will quickly learn to use collection and custom WF activities and WF services.You will see recipes that illustrate integration of Windows Workflow with other applications such as WPF, ASP.NET, WCF service.Lastly, you will discover how easily you can customize W4 Designer with WF rule engine and others.
Debabrata Panda, Arvind Maheshwari, Debabrata Panda
Today's IT environment is very complex, encompassing a myriad of technologies and middleware platforms. Many organizations have large and heterogeneous middleware platforms that power their enterprise applications and it is often a real challenge for administrators to meet agreed service levels and minimize downtime. Oracle Enterprise Manager allows administrators to manage the complete lifecycle of an entire application infrastructure for middleware and SOA applications.This book will help you kick-start the setup of Oracle Enterprise Manager Grid Control and master all aspects of middleware management supported by Oracle Enterprise Manager.This book, written by senior members of the Oracle team serves as the only hands on guide to provisioning middleware and implementing proactive monitoring to maximize application performance and compliance using Oracle Enterprise Manager.The book starts with an introduction to the challenges faced by middleware administrators in their everyday life, and how Oracle Enterprise Manager helps solve those challenges. This book will help you manage your middleware infrastructure and applications effectively and efficiently using Oracle Enterprise Manager. By following the practical examples in this book you will learn to proactively monitor your production middleware applications running on Oracle Application Server, Oracle WebLogic Server, Oracle SOA suite (such as Oracle BPEL Process manager), Oracle Server Bus, and Oracle Coherence. You will also learn different aspects to proactive monitoring and alert notifications, service level and incident management, diagnostics for production applications, lifecycle automation using out-of-the-box deployment procedures, and patching mechanisms. This book also helps you to master best practices for managing your middleware and SOA applications for optimal service performance and reduced down time.
Minikomputer Onion Omega 2. Internet rzeczy i inne zastosowania
Wolfram Donat
Minikomputer Onion Omega 2 jest jedną z ciekawszych propozycji na rynku małych urządzeń jednopłytkowych (SBC). Został opracowany do zastosowań w internecie rzeczy. Działa pod kontrolą jednej z odmian Linuksa, systemu OpenWrt. Ma niewielkie rozmiary (43x26x10 mm), jego procesor MIPS pracuje z częstotliwością 580 MHz, może obsłużyć pamięć RAM do 256 MB i czytnik kart SD. Radzi sobie z kilkoma różnymi protokołami łączności, dzięki czemu bez trudu można go podłączyć do zwykłego komputera i komunikować się z nim za pomocą konsoli wyświetlanej w przeglądarce. Możliwości "cebuli" można łatwo rozszerzać za pomocą dostępnych płytek i modułów. To świetna propozycja dla każdego amatora elektroniki i robotyki! Ta książka jest wyjątkowo zwięzłym, a przy tym przystępnie napisanym i praktycznym podręcznikiem, dzięki któremu błyskawicznie uzyskasz wiedzę potrzebną do uruchomienia minikomputera Onion Omega 2 i rozpoczęcia pracy. Aby wykonać opisane tu projekty, potrzebujesz minikomputera Omega 2, modułu zasilającego, rozszerzenia przekaźnikowego i rozszerzenia z ekranem OLED. Przyda się też podstawowa znajomość Linuksa i Pythona. Dzięki książce w krótkim czasie poszerzysz horyzonty, zdobędziesz kilka nowych umiejętności, nauczysz się pracy z komponentami sprzętowymi - i będziesz gotów, by w pełni samodzielnie przygotować i wykonać kolejne projekty z zastosowaniem tego świetnego minikomputera. Najważniejsze zagadnienia: montaż i konfiguracja minikomputera konsola Onion Omegi zastosowanie Pythona własne projekty: "Tweetująca cebula" i "Światłolub" Onion Omega 2: pasjonująca droga do internetu rzeczy!
Modern Data Architecture on AWS. A Practical Guide for Building Next-Gen Data Platforms on AWS
Behram Irani
Many IT leaders and professionals are adept at extracting data from a particular type of database and deriving value from it. However, designing and implementing an enterprise-wide holistic data platform with purpose-built data services, all seamlessly working in tandem with the least amount of manual intervention, still poses a challenge.This book will help you explore end-to-end solutions to common data, analytics, and AI/ML use cases by leveraging AWS services. The chapters systematically take you through all the building blocks of a modern data platform, including data lakes, data warehouses, data ingestion patterns, data consumption patterns, data governance, and AI/ML patterns. Using real-world use cases, each chapter highlights the features and functionalities of numerous AWS services to enable you to create a scalable, flexible, performant, and cost-effective modern data platform.By the end of this book, you’ll be equipped with all the necessary architectural patterns and be able to apply this knowledge to efficiently build a modern data platform for your organization using AWS services.
ModSecurity 2.5. Prevent web application hacking with this easy to use guide
Magnus Mischel, Brian Rectanus
With more than 67% of web servers running Apache and web-based attacks becoming more and more prevalent, web security has become a critical area for web site managers. Most existing tools work on the TCP/IP level, failing to use the specifics of the HTTP protocol in their operation. Mod_security is a module running on Apache, which will help you overcome the security threats prevalent in the online world.A complete guide to using ModSecurity, this book will show you how to secure your web application and server, and does so by using real-world examples of attacks currently in use. It will help you learn about SQL injection, cross-site scripting attacks, cross-site request forgeries, null byte attacks, and many more so that you know how attackers operate.Using clear, step-by-step instructions this book starts by teaching you how to install and set up ModSecurity, before diving into the rule language with examples. It assumes no prior knowledge of ModSecurity, so as long as you are familiar with basic Linux administration, you can start to learn right away.Real-life case studies are used to illustrate the dangers on the Web today ñ you will for example learn how the recent worm that hit Twitter works, and how you could have used ModSecurity to stop it in its tracks. The mechanisms behind these and other attacks are described in detail, and you will learn everything you need to know to make sure your server and web application remain unscathed on the increasingly dangerous web. Have you ever wondered how attackers figure out the exact web server version running on a system? They use a technique called HTTP fingerprinting, and you will learn about this in depth and how to defend against it by flying your web server under a false flag.The last part of the book shows you how to really lock down a web application by implementing a positive security model that only allows through requests that conform to a specific, pre-approved model, and denying anything that is even the slightest bit out of line.