2016/10/25August 31, 2016(image)
Get your code under control in a series of small, specific steps About This Book Learn to extract and replace legacy artifacts, Improve your application from the ground up while keeping your codebase fully operational, Improve the quality of your legacy applications. Who This Book Is For PHP developers from all skill levels will be able to get value from this book and will be able to transform their spaghetti code applications to clean, modular applications. If you are in the midst of a legacy refactor or you find yourself in a state of despair caused by the code you have inherited, this is the book for you. All you need is to have PHP 5.0 installed, and you’re all set to change the way you maintain and deploy your code! What You Will Learn Replace global and new with dependency injection Extract SQL statements to gateways Convert action logic to controllers Remove repeated logic in page scripts Create maintainable PHP code from crufty legacy PHP In Detail Have you noticed that your legacy PHP application is composed of page scripts placed directly in the document root of the web server? Or, do your page scripts, along with any other classes and functions, combine the concerns of model, view, and controller into the same scope? Is the majority of the logical flow incorporated as include files and global functions rather than class methods? Working with such a legacy application feels like dragging your feet through mud, doesn’t it?This book will show you how to modernize your application in terms of practice and technique, rather than in terms of using tools like frameworks and libraries, by extracting and replacing its legacy artifacts. We will use a step-by-step approach, moving slowly and methodically, to improve your application from the ground up. We’ll show you how dependency injection can replace both the new and global dependencies. We’ll also show you how to change the presentation logic to view files and the action logic to a controller. Moreover, we’ll keep your application running the whole time. Each completed step in the process will keep your codebase fully operational with higher quality. When we are done, you will be able to breeze through your code like the wind. Your code will be autoloaded, dependency-injected, unit-tested, layer-separated, and front-controlled. Most of the very limited code we will add to your application is specific to this book. We will be improving ourselves as programmers, as well as improving the quality of our legacy application. Style and approach This book gives developers an easy-to-follow, practical and powerful process to bring their applications up to a modern baseline. Each step in the book is practical, self-contained and moves you closer to the end goal you seek: maintainable code. As you follow the exercises in the book, the author almost anticipates your questions and you will have the answers, ready to be implemented on your project. Downloading the example code for this book. You can download the example code files for all Packt books you have purchased from your account at http://www.PacktPub.com . If you purchased this book elsewhere, you can visit http://www.PacktPub.com/support and register to have the code file.
2016/10/25August 31, 2016(image)
Automating the Continuous Deployment Pipeline with Containerized Microservices About This Book First principles of devops, Ansible, Docker, Kubernetes, microservices Architect your software in a better and more efficient way with microservices packed as immutable containers Practical guide describing an extremely modern and advanced devops toolchain that can be improved continuously Who This Book Is For If you are an intermediate-level developer who wants to master the whole microservices development and deployment lifecycle using some of the latest and greatest practices and tools, this is the book for you. Familiarity with the basics of Devops and Continuous Deployment will be useful. What You Will Learn Get to grips with the fundamentals of Devops Architect efficient software in a better and more efficient way with the help of microservices Use Docker, Kubernetes, Ansible, Ubuntu, Docker Swarm and more Implement fast, reliable and continuous deployments with zero-downtime and ability to roll-back Learn about centralized logging and monitoring of your cluster Design self-healing systems capable of recovery from both hardware and software failures In Detail Building a complete modern devops toolchain requires not only the whole microservices development and a complete deployment lifecycle, but also the latest and greatest practices and tools. Victor Farcic argues from first principles how to build a devops toolchain. This book shows you how to chain together Docker, Kubernetes, Ansible, Ubuntu, and other tools to build the complete devops toolkit. Style and approach This book follows a unique, hands-on approach familiarizing you to the Devops 2.0 toolkit in a very practical manner. Although there will be a lot of theory, you won't be able to complete this book by reading it in a metro on a way to work. You'll need to be in front of your computer and get your hands dirty. Downloading the example code for this book. You can download the example code files for all Packt books you have purchased from your account at http://www.PacktPub.com . If you purchased this book elsewhere, you can visit http://www.PacktPub.com/support and register to have the code file.
2016/10/25November 2, 2016(image)
There’s growing interest in learning how to analyze streaming data in large-scale systems such as web traffic, financial transactions, machine logs, industrial sensors, and many others. But analyzing data streams at scale has been difficult to do well—until now. This practical book delivers a deep introduction to Apache Flink, a highly innovative open source stream processor with a surprising range of capabilities.
2016/10/25October 20, 2016(image)
Why do best practices in software development matter? What are those practices in the first place? This video presents 10 key best practices for quality software development, explains why they are important to how you develop software, and shows how each practice relates to each other and the big picture of software development. You’ll learn how to set software development goals and metrics, how to determine if your software is "done", and more in this theory and practice course that uses running software examples to illustrate how these best practices are deployed in real life. Master the practices serious professionals use to create quality software Learn about version control and how to keep track of code versions and branches Understand the need for separate development, test, acceptance, and production environments Review the importance of continuous testing and explore the different types of tests Discover why you should automate deployment and when to use 3rd party code Understand the need for documentation and how to make sure you have "just enough" Learn to standardize the development process and enforce code quality standards An all-round expert in software engineering and software quality, Zeeger Lubsen has worked for the past eight years as a consultant with the Netherlands based Software Improvement Group. A former developer for Octavalent and EXS Data Systems, Zeeger is a Professional Scrum Master who holds a Master of Science in Computer Science degree from the Delft University of Technology.
2016/10/25October 17, 2016(image)
Hadoop and Spark are the stars of the Big Data world. This course covers the basics of Spark and how to use Spark and Hadoop together for big data analytics. Designed for developers, architects, and data analysts with a fundamental understanding of Hadoop, it begins with an overview of how Hadoop and Spark are used in today's big data ecosystem before moving into hands-on labs that demonstrate Spark and Spark-Hadoop integration. You'll learn about the Spark shell, RDDs, and DataFrames; how to query data in Hadoop Hive Tables from Spark; and how to develop Spark applications and run them on YARN. Discover how to integrate the Hadoop and Spark big data analytics platforms Get access to 11 hands-on labs demonstrating the core aspects of Hadoop-Spark integration Learn the basics of the Spark framework: Spark shell, RDDs and DataFrames Explore methods for analyzing data in Hadoop HDFS and Hive using Spark Gain an understanding on how to write Spark applications and run them on YARN Sujee Maniyam is the co-founder of Elephant Scale, a Big Data training company specializing in Hadoop, NoSQL, and data science. An open-source author/developer since 2000, Sujee ran the analytics company CoverCake for five years, founded the Santa Clara Big Data Guru Meet-Up, developed a Hadoop course for Intel, worked as a software engineer for IBM for six years, and is co-author of the O'Reilly title HBase Design Patterns. He earned a Bachelor of Science in Computer Engineering from the University of Melbourne and holds certifications in both Hadoop and Spark.
2016/10/25October 19, 2016(image)
As workloads are being offloaded to IBM® z Systems™ based cloud environments, it is important to ensure that these workloads and environments are secure. This IBM Redbooks® publication describes the necessary steps to secure your environment for all of the components that are involved in a z Systems cloud infrastructure that uses IBM z/VM® and Linux on z Systems. The audience for this book is IT architects and those planning to use z Systems for their cloud environments.
2016/10/25September 3, 2016(image)
Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. Over 100,000 professionals are certified worldwide, with many more joining their ranks. This new third edition is aligned to cover all of the material in the most current version of the exam’s Common Body of Knowledge. All domains are covered as completely and concisely as possible, giving users the best possible chance of acing the exam. Completely updated for the most current version of the exam’s Common Body of Knowledge Provides the only guide you need for last-minute studying Answers the toughest questions and highlights core topics Streamlined for maximum efficiency of study, making it ideal for professionals updating their certification or for those taking the test for the first time
2016/10/25October 28, 2016(image)
Peering Carrier Ethernet Networks starts with providing background information on the evolution of important concepts and building blocks that have led to the current state of high bandwidth and high performance Ethernet technology in order to support current and emerging customer applications. The background information covered includes an overview of Public Switched Telephone Networks (PSTN) to describe circuit switching, multiplexing, and voice digitization that lead to the development of T1/T3 and SONET/SDH for transport. It interleaves these developments with changes in the regulatory regime. It also covers the evolution of various important building blocks in data networks as well as the development of Hybrid-Fiber-Coaxial (HFC) networks and wireless networks, and describes how the multifarious access modes are helping in the growth of customer base while the convergence in backhaul is helping to meet the increased demand for bandwidth and to reduce latency and jitter, and eliminating the limitations of supporting multiple protocols. Additional coverage includes: Carrier Ethernet networks technical standards, which describe how service providers can offer services to "off-net" customers using peered Carrier Ethernet networks Description of the taxonomy of customers and their current and emerging applications at Layer 2 and Layer 3 on peered Carrier Ethernet networks The book concludes by describing some next steps in the Ethernet technology, peering Carrier Ethernet networks and OSS/BSS systems to meeting the growing demands and emerging trends Detailed coverage of end-to-end services across wide area data networks Consolidates in one ready reference the latest applied research in this rapidly evolving field Provides the context, advantages, and industry standards for peering Carrier Ethernet networks
2016/10/25October 21, 2016(image)
Unleash the power of Python scripting to execute effective and efficient penetration tests About This Book Sharpen your pentesting skills with Python Develop your fluency with Python to write sharper scripts for rigorous security testing Get stuck into some of the most powerful tools in the security world Who This Book Is For If you are a Python programmer or a security researcher who has basic knowledge of Python programming and wants to learn about penetration testing with the help of Python, this course is ideal for you. Even if you are new to the field of ethical hacking, this course can help you find the vulnerabilities in your system so that you are ready to tackle any kind of attack or intrusion. What You Will Learn Familiarize yourself with the generation of Metasploit resource files and use the Metasploit Remote Procedure Call to automate exploit generation and execution Exploit the Remote File Inclusion to gain administrative access to systems with Python and other scripting languages Crack an organization's Internet perimeter and chain exploits to gain deeper access to an organization's resources Explore wireless traffic with the help of various programs and perform wireless attacks with Python programs Gather passive information from a website using automated scripts and perform XSS, SQL injection, and parameter tampering attacks Develop complicated header-based attacks through Python In Detail Cybercriminals are always one step ahead, when it comes to tools and techniques. This means you need to use the same tools and adopt the same mindset to properly secure your software. This course shows you how to do just that, demonstrating how effective Python can be for powerful pentesting that keeps your software safe. Comprising of three key modules, follow each one to push your Python and security skills to the next level. In the first module, we’ll show you how to get to grips with the fundamentals. This means you’ll quickly find out how to tackle some of the common challenges facing pentesters using custom Python tools designed specifically for your needs. You’ll also learn what tools to use and when, giving you complete confidence when deploying your pentester tools to combat any potential threat. In the next module you’ll begin hacking into the application layer. Covering everything from parameter tampering, DDoS, XXS and SQL injection, it will build on the knowledge and skills you learned in the first module to make you an even more fluent security expert. Finally in the third module, you’ll find more than 60 Python pentesting recipes. We think this will soon become your trusted resource for any pentesting situation. This Learning Path combines some of the best that Packt has to offer in one complete, curated package. It includes content from the following Packt products: Learning Penetration Testing with Python by Christopher Duffy Python Penetration Testing Essentials by Mohit Python Web Penetration Testing Cookbook by Cameron Buchanan,Terry Ip, Andrew Mabbitt, Benjamin May and Dave Mound Style and approach This course provides a quick access to powerful, modern tools, and customizable scripts to kick-start the creation of your own Python web penetration testing toolbox. Downloading the example code for this book. You can download the example code files for all Packt books you have purchased from your account at http://www.PacktPub.com . If you purchased this book elsewhere, you can visit http://www.PacktPub.com/support and register to have the code file.
2016/10/25October 21, 2016(image)
Master the art of creating scalable, concurrent, and reactive applications using Akka About This Book This book will help you cure anemic models with domain-driven design We cover major Akka programming concepts such as concurrency, scalability, and reactivity You will learn concepts like Event Sourcing and CQRS via Akka Persistence, Akka Streams, Akka Http as well as Akka Clustering Who This Book Is For If you want to use the Lightbend platform to create highly performant reactive applications, then this book is for you. If you are a Scala developer looking for techniques to use all features of the new Akka release and want to incorporate these solutions in your current or new projects, then this book is for you. Expert Java developers who want to build scalable, concurrent, and reactive application will find this book helpful. What You Will Learn Use Akka actors to enable parallel execution Build out domain-driven design based components like entities and aggregates Respond to command requests on that aggregate root that affect the internal state Leverage Akka Persistence, protobuf and Cassandra to save the persistent state of you entities Build out complex processing graphs with the Graph Builder DSL Understand the dynamic push/pull nature of backpressure handling within Akka Streams Route HTTP requests to an actor and return a response Deploy actor instances across a set of nodes via ConductR for high availability In Detail For a programmer, writing multi-threaded applications is critical as it is important to break large tasks into smaller ones and run them simultaneously. Akka is a distributed computing toolkit that uses the abstraction of the Actor model, enabling developers to build correct, concurrent, and distributed applications using Java and Scala with ease. The book begins with a quick introduction that simplifies concurrent programming with actors. We then proceed to master all aspects of domain-driven design. We’ll teach you how to scale out with Akka Remoting/Clustering. Finally, we introduce Conductr as a means to deploy to and manage microservices across a cluster. Style and approach This comprehensive, fast-paced guide is packed with several real-world use cases that will help you understand concepts, issues, and resolutions while using Akka to create highly performant, scalable, and concurrency-proof reactive applications. Downloading the example code for this book. You can download the example code files for all Packt books you have purchased from your account at http://www.PacktPub.com . If you purchased this book elsewhere, you can visit http://www.PacktPub.com/support and register to have the code file.