Subscribe: Safari Books Online - Enterprise
http://search.safaribooksonline.com/rss/
Added By: Feedage Forager Feedage Grade B rated
Language: English
Tags:
attacks  design patterns  die  hacking  java  learn  network  office  patterns  penetration testing  penetration  rust  und  work 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Safari Books Online - Enterprise

Safari Books Online - Enterprise



Safari Books Online - Enterprise RSS Feed



 



Design Patterns in Modern C++: Reusable Approaches for Object-Oriented Software Design

2018/04/23April 18, 2018

(image)

Apply modern C++17 to the implementations of classic design patterns. As well as covering traditional design patterns, this book fleshes out new patterns and approaches that will be useful to C++ developers. The author presents concepts as a fun investigation of how problems can be solved in different ways, along the way using varying degrees of technical sophistication and explaining different sorts of trade-offs. Design Patterns in Modern C++ also provides a technology demo for modern C++, showcasing how some of its latest features (e.g., coroutines) make difficult problems a lot easier to solve. The examples in this book are all suitable for putting into production, with only a few simplifications made in order to aid readability. What You Will Learn Apply design patterns to modern C++ programming Use creational patterns of builder, factories, prototype and singleton Implement structural patterns such as adapter, bridge, decorator, facade and more Work with the behavioral patterns such as chain of responsibility, command, iterator, mediator and more Apply functional design patterns such as Monad and more Who This Book Is For Those with at least some prior programming experience, especially in C++.




Office 365 for Healthcare Professionals: Improving Patient Care Through Collaboration, Compliance, and Productivity

2018/04/23April 18, 2018

(image)

Healthcare is a complex, rapidly changing industry. Providers are expected to maximize and extend care for patients, while working with fewer resources and striving to stay modern and secure. This book offers prescriptive guidance and real-world use cases that will help readers leverage Office 365 and the cloud in order to be more productive, secure, and compliant with all the healthcare compliance standards. Office 365 for Healthcare increases the value of a provider’s existing investment and infrastructure in Office 365 by teaching configurations and services that will resolve real day-to-day productivity and communication challenges. Understanding that each provider is unique, this book focuses on operational and clinical similarities that can be applied to any healthcare provider such as telehealth, readmission rate, shift scheduling, tumor board innovations, continuous education for medical practitioners, and more. What You'll Learn Configure Office 365 to enable a compliant and meaningful collaboration between care providers and patients Discover innovative uses through the Tumor Board collaboration Understand specific ways to improve nurse scheduling and training Improve Telehealth for remote patients Apply simple techniques via the existing Office 365 toolset Secure Office 365 without affecting productivity Increase operating efficiency and patient satisfaction by reducing lengths of stay and re-admission Who This Book is For IT pros, technical decision makers, and Office 365 users in the healthcare industry. Readers should have an understanding of Office 365, how healthcare organizations function, and an understanding of the technical challenges they are facing.   




Essentials of Computer Organization and Architecture, 5th Edition

2018/04/23March 15, 2018

(image)

Bestselling text, The Essentials of Computer Organization and Architecture, Fourth Edition, is comprehensive enough to address all necessary organization and architecture topics, but concise enough to be appropriate for a single-term course. Its focus on real-world examples and practical applications encourages students to develop a “big-picture” understanding of how essential organization and architecture concepts are applied in the computing world. In addition to direct correlation with the ACM/IEEE guidelines for computer organization and architecture, the text exposes readers to the inner workings of a modern digital computer through an integrated presentation of fundamental concepts and principles.




CompTIA Security+ - Vorbereitung auf die Prüfung SYO-501

2018/04/22April 19, 2018

(image)

Vorbereitung auf die Prüfung SYO-501 Fundierter und ausführlicher Einstieg in das Thema IT-Sicherheit Erläuterung und Fragen zu allen Themen der aktuellen CompTIA-Prüfung SYO-501 Einziges deutsches Buch zum Thema Die CompTIA Security+-Prüfung teilt sich in mehrere Fachgebiete auf, die regelmäßig aktualisiert werden. In der aktuellen Fassung der Prüfung (SYO-501) lauten die Fachgebiete: Netzwerksicherheit Compliance und Betriebssicherheit Bedrohungen und Schwachstellen Anwendungs-, Daten- und Rechnersicherheit Zugriffskontrolle und Identitätsmanagement Kryptografie Entsprechend behandeln die Autoren die genannten Themenbereiche ausführlich und vermitteln Ihnen mit diesem Buch das für die Zertifizierung notwendige Fachwissen. Im Zentrum steht dabei weniger die Auflistung aller möglichen und unmöglichen Abkürzungen aus diesem Bereich, sondern die Schaffung eines auch praxistauglichen Verständnisses für die Thematik. Das Buch wurde für das CompTIA Authorized Curriculum geprüft und ist CAQC-zertifiziert.




Learn Website Hacking / Penetration Testing From Scratch

2018/04/22April 19, 2018

(image)

Learn website hacking and penetration testing from scratch About This Video Learn how to gather information about your target website and discover, exploit and fix a large number of vulnerabilities. Learn what can you do with the access you gained from exploiting these vulnerabilities and much more. In Detail Welcome to this comprehensive course on website and web application hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking. This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn how to set up a lab and install the required software to practice penetration testing on your own machine. Then you will learn about websites, how they work, what they rely on, what is meant by a web server, a database, and how all of these components work together to give us functioning websites. Once you understand how websites work we will start talking about how can we exploit these components and this method of communication to carry out a number of powerful attacks. This course will take you from a beginner to a more advanced level. By the time you finish, you will be able to launch attacks and test the security of websites and web applications in exactly the same way that black hat hackers would do, fix these vulnerabilities, and secure websites from them. All the attacks in this course are practical attacks that work against any real websites. For each vulnerability you will learn the basic exploitation, then you will learn advanced methods that will give you more privileges or allow you to bypass security measurements.




ARP Spoofing and Man In The Middle Attacks: Execution and Detection

2018/04/22April 18, 2018

(image)

Learn practical attacks to test the security of clients connected to a network and protect them About This Video You will learn how networks work, how devices communicate with each other, how the information is transferred in a wireless network, and how to map the current network. Discover all the connected clients, gather important information about these clients, and launch powerful attacks. In Detail In this course you will start as a beginner with no previous knowledge about penetration testing. The course is structured in a way that will take you through the basics of networking and how clients communicate with each other, then we will start talking about how we can exploit this method of communication to carry out a number of powerful attacks. This course focuses on the practical side of wireless penetration testing without neglecting the theory behind each attack - all the attacks explained in this course are launched against real devices. All the attacks in this course are practical attacks that work against any device connected to your network, so it does not matter what kind of device you are targeting. Each attack is explained in a simple way first so that you understand how it actually works - first you will learn the theory behind each attack and then you will learn how to carry out the attack using Kali Linux.




Network Hacking Continued - Intermediate to Advanced

2018/04/22April 19, 2018

(image)

Learn advanced techniques to hack into WiFi and wired networks About This Video You will learn a number of advanced techniques to gain access to various network configurations and various network encryptions. You will learn how to discover and target hidden networks t and to access secure networks without passwords. In Detail Welcome to this advanced network hacking course, designed to build up on what you already know about network hacking. It's recommended that you complete the network hacking section of the author's general ethical hacking course or finish his network hacking course before starting this course. Just like all of his other courses, this course is highly practical, whilst including the theory, but, since this is an advanced courseeach attack will be broken into its smaller components in order to understand how each of these components work; by the end of the course you will be able to mix these attacks and adopt attacks to suit different situations and different scenarios, and write your own man-in-the-middle scripts to implement your own man-in-the-middle attacks. Because this course builds on what you learn in the courses mentioned above, the main sections here have similar titles but the topics covered here are more advanced. Finally, at the end of the course, you will learn how to protect yourself and your systems from these attacks. All the attacks in this course are practical attacks that work against real computers. In each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real-life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adapt them to different scenarios and different operating systems.




RUST: The Easy Way

2018/04/22April 19, 2018

(image)

A beginner's guide to the fundamentals of Rust and writing efficient and secure codes About This Video Rust ecosystem and language fundamentals Rust's approach to memory management and safety without garbage collection Understanding the concepts of mutability, lifetime, generic types, traits, ownership, borrowing data, and many more. In Detail Rust, a system programming language, is best known for its key features—safety and speed—but it is much more than that. Rust is a popular language and this course is here to convince you that Rust lives up to the hype. This course covers the fundamentals of the Rust programming language, its core concepts, and best coding practices. It starts with the basics and goes on to explain how to get started by developing a simple Rust program. You will also learn immutability, conditionals, loops, arrays, and strings to enhance your programming skills. Moving ahead, you will get a deeper understanding of Rust, by acquiring knowledge of structures, enums, and functions. Furthermore, you will learn to test your programs using Cargo. Additionally, you will get an experience of generic data types, the idea behind lifetimes, and concurrency in Rust. Finally, at the end of the video course, you will be proficient enough to write better, safe, and maintainable code in Rust by building an application. All the code and supporting files for this course are available on Github at




Java 10 Features and Java 11 Preview

2018/04/22May 1, 2018

(image)

Learn the latest features in Java 10 and get a preview to Java 11. This video series includes five clips: Java Roadmap . The first clip in this series introduces us to Java 10 including the roadmap of the language. Learn the history of Java, as well as about the previous versions and their most prominent features. Java 10 Features . The second clip in this series explains Java 10 functionality, starting with the biggest changes like local-variable type interfence all the way to docker awareness. New APIs . The third clip in this series explores the 72 new APIs included in the standard library and their usages. Changes in the JVM and Language Specification . The fourth clip in this series explains the noteworthy changes in JVM and Language Specification, mostly tied to local-variable type interfence. Java 11 Preview . The fifth clip in this series explores the possible functionlity of Java 11 and the long term roadmap for future Java projects, as well as Java’s future in general.




Learn from the Experts about Cloud Computing: Terren Peterson

2018/04/22April 23, 2018

(image)

In this Learn from the Experts interview, Nikki McDonald talks to Terren Peterson about how Capital One implemented its cloud strategy, including what factors drove the company's decision to adopt cloud computing, the challenges of migrating to the cloud, and what tools his company uses to evaluate, monitor, and manage its cloud-based services, applications, and infrastructure.