|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General
A project-based guide to help you create, package, and deploy
desktop applications on multiple platforms using modern JavaScript
frameworks Key Features Use your web development skills with
JavaScript and Node.js to build desktop applications for macOS and
Windows Develop desktop versions of popular mobile applications
that are similar to Slack, Spotify, and more Design desktop apps
with automatic updates and real-time analytics capabilities Book
DescriptionThe Electron framework allows you to use modern web
technologies to build applications that share the same code across
all operating systems and platforms. This also helps designers to
easily transition from the web to the desktop. Electron Projects
guides you through building cross-platform Electron apps with
modern web technologies and JavaScript frameworks such as Angular,
React.js, and Vue.js. You'll explore the process of configuring
modern JavaScript frameworks and UI libraries, real-time analytics
and automatic updates, and interactions with the operating system.
You'll get hands-on with building a basic Electron app, before
moving on to implement a Markdown Editor. In addition to this,
you'll be able to experiment with major JavaScript frameworks such
as Angular and Vue.js, discovering ways to integrate them with
Electron apps for building cross-platform desktop apps. Later,
you'll learn to build a screenshot snipping tool, a mini-game, and
a music player, while also gaining insights into analytics, bug
tracking, and licensing. You'll then get to grips with building a
chat app, an eBook generator and finally a simple digital wallet
app. By the end of this book, you'll have experience in building a
variety of projects and project templates that will help you to
apply your knowledge when creating your own cross-platform
applications. What you will learn Initialize Node.js, Node Package
Manager (NPM), and JavaScript to set up your app Integrate Phaser
with Electron to build a simple 2D game Improve app quality by
adding an error tracking system and crash reports Implement group
chat features and event handling capabilities using Firebase
Integrate a WordPress-like rich-text editor into your app Build
Electron applications using a single codebase Who this book is
forThis book is for JavaScript developers who want to explore the
Electron framework for building desktop apps. Working knowledge of
modern frontend JavaScript frameworks and Node.js is assumed. No
prior knowledge of desktop development is required.
Over 50 practical recipes that will help you develop and deliver
high-quality and reliable cloud-centric Azure serverless
applications for your organization Key Features Leverage practical
use cases to build a robust serverless environment Enhance Azure
Functions with continuous deployment using Visual Studio Team
Services Deploy and manage cost-effective and highly available
serverless applications using Azure Functions Book
DescriptionMicrosoft provides a solution for easily running small
segments of code in the cloud with Azure Functions. The second
edition of Azure Serverless Computing Cookbook starts with
intermediate-level recipes on serverless computing along with some
use cases demonstrating the benefits and key features of Azure
Functions. You'll explore the core aspects of Azure Functions, such
as the services it provides, how you can develop and write Azure
Functions, and how to monitor and troubleshoot them. As you make
your way through the chapters, you'll get practical recipes on
integrating DevOps with Azure Functions, and providing continuous
integration and continuous deployment with Azure DevOps. This book
also provides hands-on, step-by-step tutorials based on real-world
serverless use cases to guide you through configuring and setting
up your serverless environments with ease. You will also learn how
to build solutions for complex, real-world, workflow-based
scenarios quickly and with minimal code using Durable Functions. In
the concluding chapters, you will ensure enterprise-level security
within your serverless environment. The most common tips and tricks
that you need to be aware of when working with Azure Functions on
production environments will also be covered in this book. By the
end of this book, you will have all the skills required for working
with serverless code architecture, providing continuous delivery to
your users. What you will learn Integrate Azure Functions with
other Azure services Understand cloud application development using
Azure Functions Employ durable functions for developing reliable
and durable serverless applications Use SendGrid and Twilio
services Explore code reusability and refactoring in Azure
Functions Configure serverless applications in a production
environment Who this book is forIf you are a cloud administrator,
architect, or developer who wants to build scalable systems and
deploy serverless applications with Azure Functions, then the Azure
Serverless Computing Cookbook is for you. Hands-on experience with
Microsoft Azure core services is required.
Create simple to advanced shell scripts and enhance your system
functionality with effective recipes Key Features Automate tedious
and repetitive tasks Create several novel applications ranging from
a simple IRC logger to a Web Scraper Manage your system efficiently
by becoming a seasoned Bash user Book DescriptionIn Linux, one of
the most commonly used and most powerful tools is the Bash shell.
With its collection of engaging recipes, Bash Cookbook takes you
through a series of exercises designed to teach you how to
effectively use the Bash shell in order to create and execute your
own scripts. The book starts by introducing you to the basics of
using the Bash shell, also teaching you the fundamentals of
generating any input from a command. With the help of a number of
exercises, you will get to grips with the automation of daily tasks
for sysadmins and power users. Once you have a hands-on
understanding of the subject, you will move on to exploring more
advanced projects that can solve real-world problems
comprehensively on a Linux system. In addition to this, you will
discover projects such as creating an application with a menu,
beginning scripts on startup, parsing and displaying human-readable
information, and executing remote commands with authentication
using self-generated Secure Shell (SSH) keys. By the end of this
book, you will have gained significant experience of solving
real-world problems, from automating routine tasks to managing your
systems and creating your own scripts. What you will learn
Understand the basics of Bash shell scripting on a Linux system
Gain working knowledge of how redirections and pipes interact
Retrieve and parse input or output of any command Automate tasks
such as data collection and creating and applying a patch Create a
script that acts like a program with different features Customize
your Bash shell and discover neat tricks to extend your programs
Compile and install shell and log commands on your system's console
using Syslog Who this book is forThe Bash Cookbook is for you if
you are a power user or system administrator involved in writing
Bash scripts in order to automate tasks. This book is also ideal if
you are interested in learning how to automate complex daily tasks.
As human activities moved to the digital domain, so did all the
well-known malicious behaviors including fraud, theft, and other
trickery. There is no silver bullet, and each security threat calls
for a specific answer. One specific threat is that applications
accept malformed inputs, and in many cases it is possible to craft
inputs that let an intruder take full control over the target
computer system. The nature of systems programming languages lies
at the heart of the problem. Rather than rewriting decades of
well-tested functionality, this book examines ways to live with the
(programming) sins of the past while shoring up security in the
most efficient manner possible. We explore a range of different
options, each making significant progress towards securing legacy
programs from malicious inputs. The solutions explored include
enforcement-type defenses, which excludes certain program
executions because they never arise during normal operation.
Another strand explores the idea of presenting adversaries with a
moving target that unpredictably changes its attack surface thanks
to randomization. We also cover tandem execution ideas where the
compromise of one executing clone causes it to diverge from another
thus revealing adversarial activities. The main purpose of this
book is to provide readers with some of the most influential works
on run-time exploits and defenses. We hope that the material in
this book will inspire readers and generate new ideas and
paradigms.
Build applications and infrastructures that leverage
Function-as-a-Service and Docker Key Features - Implement
containerization in Serverless/FaaS environments - Utilize Docker
as a functional unit of work for Serverless/FaaS platforms - Use
Docker as a portable infrastructure for Serverless Applications
Book DescriptionServerless applications have gained a lot of
popularity among developers and are currently the buzzwords in the
tech market. Docker and serverless are two terms that go
hand-in-hand. This book will start by explaining serverless and
Function-as-a-Service (FaaS) concepts, and why they are important.
Then, it will introduce the concepts of containerization and how
Docker fits into the Serverless ideology. It will explore the
architectures and components of three major Docker-based FaaS
platforms, how to deploy and how to use their CLI. Then, this book
will discuss how to set up and operate a production-grade Docker
cluster. We will cover all concepts of FaaS frameworks with
practical use cases, followed by deploying and orchestrating these
serverless systems using Docker. Finally, we will also explore
advanced topics and prototypes for FaaS architectures in the last
chapter. By the end of this book, you will be in a position to
build and deploy your own FaaS platform using Docker. What you will
learn Learn what Serverless and FaaS applications are Get
acquainted with the architectures of three major serverless systems
Explore how Docker technologies can help develop Serverless
applications Create and maintain FaaS infrastructures Set up Docker
infrastructures to serve as on-premises FaaS infrastructures Define
functions for Serverless applications with Docker containers Who
this book is forIf you are a Developer, a Docker Engineer, a DevOps
Engineer, or any stakeholder interested in learning the use of
Docker on Serverless environments then this book is for you.
Text processing and pattern matching simplified Key Features
-Master the fastest and most elegant big data munging language
-Implement text processing and pattern matching using the advanced
features of AWK and GAWK -Implement debugging and inter-process
communication using GAWK Book DescriptionAWK is one of the most
primitive and powerful utilities which exists in all Unix and
Unix-like distributions. It is used as a command-line utility when
performing a basic text-processing operation, and as programming
language when dealing with complex text-processing and mining
tasks. With this book, you will have the required expertise to
practice advanced AWK programming in real-life examples. The book
starts off with an introduction to AWK essentials. You will then be
introduced to regular expressions, AWK variables and constants,
arrays and AWK functions and more. The book then delves deeper into
more complex tasks, such as printing formatted output in AWK,
control flow statements, GNU's implementation of AWK covering the
advanced features of GNU AWK, such as network communication,
debugging, and inter-process communication in the GAWK programming
language which is not easily possible with AWK. By the end of this
book, the reader will have worked on the practical implementation
of text processing and pattern matching using AWK to perform
routine tasks. What you will learn -Create and use different
expressions and control flow statements in AWK -Use Regular
Expressions with AWK for effective text-processing -Use built-in
and user-defined variables to write AWK programs -Use redirections
in AWK programs and create structured reports -Handle non-decimal
input, 2-way inter-process communication with Gawk -Create small
scripts to reformat data to match patterns and process texts Who
this book is forThis book is for developers or analysts who are
inclined to learn how to do text processing and data extraction in
a Unix-like environment. Basic understanding of Linux operating
system and shell scripting will help you to get the most out of the
book.
Leverage Office 365 to increase your organization's efficiency by
managing users, domains, licenses, and much more in your
organization with most powerful subscription software. Key Features
Get acquainted with the basics of Office 365 Configure and manage
workloads efficiently using Office 365 A comprehensive guide
covering every aspect of planning, and managing this multifaceted
collaboration system. Book DescriptionOffice 365 is suite of
advanced collaboration tools used by many well known organizations
and their system administrators. This book starts with an
introduction to Office 365 and its basic fundamentals. Then we move
towards workload management and deployment. You will delve into
identities, authentications, and managing office 365. We also cover
concepts such as collaboration with Microsoft teams and tools such
as Delve and Skype for collaboration. Towards the end of the book,
you'll master monitoring and security concepts. By the end of this
book, you will have hands-on experience working with Office 365 and
its collaboration tools and services What you will learn Learn how
to implement Office 365 from scratch and how to use best practices
to be a successful Office 365 professional Understand Microsoft
productivity services to take your organization or business to the
next level by increasing productivity. Learn how workloads and
applications interact and integrate with each other Learn to manage
Skype for Business Online Get support and monitor service health
with Office 365 Manage and administer identities and groups
efficiently Who this book is forIf you are working as a system
administration or an IT professional and are keen to learn the
fundamentals of Office 365, then this book is for you. No prior
knowledge of office 365 is necessary.
Delve deep into various security aspects of AWS to build and
maintain a secured environment Key Features Learn to secure your
network, infrastructure, data, and applications in AWS cloud Use
AWS managed security services to automate security Dive deep into
various aspects such as the security model, compliance, access
management and much more to build and maintain a secured
environment Explore Cloud Adoption Framework (CAF) and its
components Embedded with assessments that will help you revise the
concepts you have learned in this book Book DescriptionWith
organizations moving their workloads, applications, and
infrastructure to the cloud at an unprecedented pace, security of
all these resources has been a paradigm shift for all those who are
responsible for security; experts, novices, and apprentices alike.
This book focuses on using native AWS security features and managed
AWS services to help you achieve continuous security. Starting with
an introduction to Virtual Private Cloud (VPC) to secure your AWS
VPC, you will quickly explore various components that make up VPC
such as subnets, security groups, various gateways, and many more.
You will also learn to protect data in the AWS platform for various
AWS services by encrypting and decrypting data in AWS. You will
also learn to secure web and mobile applications in AWS cloud. This
book is ideal for all IT professionals, system administrators,
security analysts, solution architects, and chief information
security officers who are responsible for securing workloads in AWS
for their organizations. This book is embedded with useful
assessments that will help you revise the concepts you have learned
in this book. What you will learn Get familiar with VPC components,
features, and benefits Learn to create and secure your private
network in AWS Explore encryption and decryption fundamentals
Understand monitoring, logging, and auditing in AWS Ensure data
security in AWS Secure your web and mobile applications in AWS
Learn security best practices for IAM, VPC, shared security
responsibility model, and so on Who this book is forThis book is
for all IT professionals, system administrators, security analysts,
solution architects, and chief information security officers who
are responsible for securing workloads in AWS for their
organizations.
Explore the high-in demand core DevOps strategies with powerful
DevOps tools such as Ansible, Jenkins, and Chef Key Features Get
acquainted with methodologies and tools of the DevOps framework
Perform continuous integration, delivery, deployment, and
monitoring using DevOps tools Explore popular tools such as Git,
Jenkins, Maven, Gerrit, Nexus, Selenium, and so on Embedded with
assessments that will help you revise the concepts you have learned
in this book Book DescriptionDevOps is the most widely used
software engineering culture and practice that aim sat software
development and operation. Continuous integration is a cornerstone
technique of DevOps that merges software code updates from
developers into a shared central mainline. This book takes a
practical approach and covers the tools and strategies of DevOps.
It starts with familiarizing you with DevOps framework and then
shows how toper form continuous delivery, integration, and
deployment with DevOps. You will explore DevOps process maturity
frameworks and progression models with checklist templates for each
phase of DevOps. You will also be familiar with agile terminology,
methodology, and the benefits accrued by an organization by
adopting it. You will also get acquainted with popular tools such
as Git, Jenkins ,Maven, Gerrit, Nexus, Selenium, and so on.You will
learn configuration, automation, and the implementation of
infrastructure automation (Infrastructure as Code) with tools such
as Chef and Ansible. This book is ideal for engineers, architects,
and developers, who wish to learn the core strategies of DevOps.
What you will learn Get familiar with life cycle models, maturity
states, progression and best practices of DevOps frameworks Learn
to set up Jenkins and integrate it with Git Know how to build jobs
and perform testing with Jenkins Implement infrastructure
automation (Infrastructure as Code) with tools such as Chef and
Ansible Understand continuous monitoring process with tools such as
Splunk and Nagios Learn how Splunk improves the code quality Who
this book is forThis book is for engineers, architects, and
developers, who wish to learn the core strategies of DevOps.
Deploy and configure vSphere infrastructure and learn to
effectively create and administer vSphere virtual machines Key
Features Implement advanced network virtualization techniques
Configure and administer vSphere high availability Enhance your
data center virtualization skills with practice questions and mock
tests Book DescriptionThis exam guide enables you to install,
configure, and manage the vSphere 6.5 infrastructure in all its
components: vCenter Server, ESXi hosts, and virtual machines, while
helping you to prepare for the industry standard certification.
This data center book will assist you in automating administration
tasks and enhancing your environment's capabilities. You will begin
with an introduction to all aspects related to security,
networking, and storage in vSphere 6.5. Next, you will learn about
resource management and understand how to back up and restore the
vSphere 6.5 infrastructure. As you advance, you will also cover
troubleshooting, deployment, availability, and virtual machine
management. This is followed by two mock tests that will test your
knowledge and challenge your understanding of all the topics
included in the exam. By the end of this book, you will not only
have learned about virtualization and its techniques, but you'll
also be prepared to pass the VCP6.5-DCV (2V0-622) exam. What you
will learn Deploy and configure vSphere infrastructure Create and
administer vSphere virtual machines Optimize, secure, and
troubleshoot all vSphere components Implement vSphere HA on a vSAN
cluster Understand how to back up and restore your vSphere 6.5
infrastructure Test your understanding of key concepts required
through sample questions Who this book is forIf you are interested
in achieving Data Center Virtualization certification, this is the
book is for you. You will also benefit from this book if you are a
system administrator or network engineer. Some prior knowledge of
virtualization can assist you in understanding key concepts covered
in the book.
Whether you use a standalone Unix system, routinely provide administrative support for a larger shared system, or just want an understanding of basic administrative functions, Essential System Administration is for you. This comprehensive and invaluable book combines the author's years of practical experience with technical expertise to help you manage Unix systems as productively and painlessly as possible.
|
|