Practical XMPP

Author: Lloyd Watkin,David Koelle

Publisher: Packt Publishing Ltd

ISBN: 1785282093

Category: Computers

Page: 248

View: 6253

DOWNLOAD NOW »
Unleash the power of XMPP in order to build exciting, real-time, federated applications based on open standards in a secure and highly scalable fashion About This Book Learn about the fundamentals of XMPP and be able to work with the core functionality both server-side and in the browser Build a simple 1-to-1 chat (the “Hello World” of XMPP), explore multi-user chat, publish subscribe systems, and work with a decentralized social network Author Lloyd Watkins is a member of the XMPP standards committee Who This Book Is For If you want to learn about the fundamentals of XMPP, be able to work with the core functionality both server-side and in the browser then this book is for you.No knowledge of XMPP is required, or of TCP/IP networking. It's important that you already know how to build applications of some form, and are looking get a better understanding of how to implement XMPP for one or more of its many uses. You should be interested in the decentralized web, know HTML, and likely know JavaScript and NodeJS. You will probably know JSON, and hopefully XML (this is the native output of XMPP). What You Will Learn Install and configure an XMPP server and use it to connect from a traditional desktop client and send a message Build a simple server-side application that will respond to messages from our logged in desktop client Install and run XMPP-FTW, connect to the server from the browser, and handle incoming/outgoing messages Connect to a multi-user chat room, send/receive stanzas, add a room password, join a protected room, set the room's subject, and change a user's affiliation Get to grips with the publish-subscribe extension of XMPP and use it to build a pusher system that can make any website real-time Build a simple XMPP component and create an extension for XMPP-FTW that allows you to use your own custom format Build an XMPP version of the classic game “Pong” In Detail XMPP (eXtensible Messaging and Presence Protocol) is a messaging protocol that enables communication between two or more devices via the Internet. With this book, developers will learn about the fundamentals of XMPP, be able to work with the core functionality both server-side and in the browser, as well as starting to explore several of the protocol extensions. You will not only have a solid grasp of XMPP and how it works, but will also be able to use the protocol to build real-world applications that utilize the power of XMPP. By the end of this book, you will know more about networking applications in general, and have a good understanding of how to extend XMPP, as well as using it in sample applications. Style and approach Through a number of hands-on projects, this book shows you how to build usable applications that highlights a feature of XMPP.

Moodle 3.x Developer's Guide

Author: Ian Wild

Publisher: Packt Publishing Ltd

ISBN: 1786469545

Category: Computers

Page: 368

View: 6224

DOWNLOAD NOW »
Effortlessly ensure your application's code quality from day 1 About This Book Customize your Moodle 3.x app. Leverage the new features of Moodle 3.x by diving deep into the Moodle development eco-system. Cater to heavy user traffic, customize learning requirements and create custom third party plugins. Who This Book Is For This book is for Moodle developers who are familiar with the basic Moodle functionality and have an understanding of the types of scenarios in which the Moodle platform can be usefully employed. You must have medium-level PHP programming knowledge. You should be familiar with HTML and XML protocols. You do not need to have prior knowledge of Moodle-specific terminology What You Will Learn Work with the different types of custom modules that can be written for Moodle 3.x Understand how to author custom modules so they conform to the agreed Moodle 3.x development guidelines Get familiar with the Moodle 3.x architecture—its internal and external APIs Customize Moodle 3.x so it can integrate seamlessly with third-party applications of any kind Build a new course format to specify the layout of a course Implement third-party graphics libraries in your plugins Build plugins that can be themed easily Provide custom APIs that will provide the means to automate Moodle 3 in real time In Detail The new and revamped Moodle is the top choice for developers to create cutting edge e-learning apps that cater to different user's segments and are visually appealing as well. This book explains how the Moodle 3.x platform provides a framework that allows developers to create a customized e-learning solution. It begins with an exploration of the different types of plugin.. We then continue with an investigation of creating new courses. You will create a custom plugin that pulls in resources from a third-party repository. Then you'll learn how users can be assigned to courses and granted the necessary permissions. Furthermore, you will develop a custom user home. At the end of the book, we'll discuss the Web Services API to fully automate Moodle 3.x in real time. Style and approach This book takes a step-by-step practical approach with every step explained in great detail using practical examples. You will create custom plugins from scratch with the examples shown and create new modules as well as extensions with the examples presented.

Practical Android Projects

Author: Lucas Jordan,Pieter Greyling

Publisher: Apress

ISBN: 1430232439

Category: Computers

Page: 424

View: 9364

DOWNLOAD NOW »
Take a practical approach to becoming a leading-edge Android developer, learning by example while combining the many technologies needed to create a successful, up-to-date web app. Practical Android Projects introduces the Android software development kit and development tools of the trade, and then dives into building cool-looking and fun apps that put Android's amazing capabilities to work. Android is the powerful, full-featured, open source mobile platform that powers phones like Google Nexus, Motorola Droid, Samsung Galaxy S, and a variety of HTC phones and tablet computers. This book helps you quickly get Android projects up and running with the free and open source Eclipse, NetBeans, and IntelliJ IDEA IDEs. Then you build and extend mobile applications using the Android SDK, Java, Scripting Layer for Android (SL4A), and languages such as Python, Ruby, Javascript/HTML, Flex/AIR, and Lua. What you’ll learn In Practical Android Projects, you’ll work on real-world projects such as: Hosting an Android BASIC interpreter Extending your Java-based Android applications with embedded Lua Scripting your Android device with SL4A Adding Twitter and Facebook to your applications Using 2D graphics and animations for casual games Creating cross-platform apps with Javascript/HTML and Flex with AIR Who this book is for Practical Android Projects is for any developer new to the Android platform who wants to learn to build mobile applications. Knowledge of the fundamentals of Java programming is assumed. Table of Contents Android Fundamentals Development Tools in Practice Roll Your Own Android Scripting Environment Embedding Lua in Android Applications Introducing SL4A: The Scripting Layer for Android Creating a GUI with HTML/JavaScript and AIR Using REST with Facebook and Twitter Using the Google App Engine with Android Game Development: Graphics Game Development: Animation App Inventor

Practical Internet of Things Security

Design a security framework for an Internet connected ecosystem, 2nd Edition

Author: Brian Russell,Drew Van Duren

Publisher: Packt Publishing Ltd

ISBN: 1788622847

Category: Computers

Page: 382

View: 8391

DOWNLOAD NOW »
A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world Key Features Learn best practices to secure your data from the device to the cloud Use systems security engineering and privacy-by-design principles to design a secure IoT ecosystem A practical guide that will help you design and implement cyber security strategies for your organization Book Description With the advent of the Internet of Things (IoT), businesses have to defend against new types of threat. The business ecosystem now includes the cloud computing infrastructure, mobile and fixed endpoints that open up new attack surfaces. It therefore becomes critical to ensure that cybersecurity threats are contained to a minimum when implementing new IoT services and solutions. This book shows you how to implement cybersecurity solutions, IoT design best practices, and risk mitigation methodologies to address device and infrastructure threats to IoT solutions. In this second edition, you will go through some typical and unique vulnerabilities seen within various layers of the IoT technology stack and also learn new ways in which IT and physical threats interact. You will then explore the different engineering approaches a developer/manufacturer might take to securely design and deploy IoT devices. Furthermore, you will securely develop your own custom additions for an enterprise IoT implementation. You will also be provided with actionable guidance through setting up a cryptographic infrastructure for your IoT implementations. You will then be guided on the selection and configuration of Identity and Access Management solutions for an IoT implementation. In conclusion, you will explore cloud security architectures and security best practices for operating and managing cross-organizational, multi-domain IoT deployments. What you will learn Discuss the need for separate security requirements and apply security engineering principles on IoT devices Master the operational aspects of planning, deploying, managing, monitoring, and detecting the remediation and disposal of IoT systems Use Blockchain solutions for IoT authenticity and integrity Explore additional privacy features emerging in the IoT industry, such as anonymity, tracking issues, and countermeasures Design a fog computing architecture to support IoT edge analytics Detect and respond to IoT security incidents and compromises Who this book is for This book targets IT Security Professionals and Security Engineers (including pentesters, security architects and ethical hackers) who would like to ensure the security of their organization's data when connected through the IoT. Business analysts and managers will also find this book useful.

Advances in Practical Applications of Heterogeneous Multi-Agent Systems - The PAAMS Collection

12th International Conference, PAAMS 2014, Salamanca, Spain, June 4-6, 2014. Proceedings

Author: Yves Demazeau,Franco Zambonelli,Juan M. Corchado Rodríguez,Javier Bajo Pérez

Publisher: Springer

ISBN: 3319075519

Category: Computers

Page: 392

View: 3350

DOWNLOAD NOW »
This book constitutes the refereed proceedings of the 12th International Conference on Practical Applications of Agents and Multi-Agent Systems, PAAMS 2014, held in Salamanca, Spain, in June 2014. The 12 revised full papers and 14 short papers were carefully reviewed and selected from 52 submissions and are presented together with 19 demonstrations. The papers report on the application and validation of agent-based models, methods, and technologies in a number of key application areas, including: agent-oriented software engineering, conversations, motion coordination and unmanned aerial vehicles, web and service systems, robotics exploration, smart cities and infrastructures, and social systems.

XMPP: The Definitive Guide

Building Real-Time Applications with Jabber Technologies

Author: Peter Saint-Andre,Kevin Smith,Remko Tronçon

Publisher: "O'Reilly Media, Inc."

ISBN: 9780596555597

Category: Computers

Page: 310

View: 3845

DOWNLOAD NOW »
This practical book provides everything you need to know about the Extensible Messaging and Presence Protocol (XMPP). This open technology for real-time communication is used in many diverse applications such as instant messaging, Voice over IP, real-time collaboration, social networking, microblogging, lightweight middleware, cloud computing, and more. XMPP: The Definitive Guide walks you through the thought processes and design decisions involved in building a complete XMPP-enabled application, and adding real-time interfaces to existing applications. You'll not only learn simple yet powerful XMPP tools, but you'll also discover, through real-world developer stories, how common XMPP "building blocks" can help solve particular classes of problems. With this book, you will: Learn the basics of XMPP technologies, including architectural issues, addressing, and communication primitives Understand the terminology of XMPP and learn about the wealth of XMPP servers, clients, and code libraries Become familiar with the XMPP concepts and services you need to solve common problems Construct a complete business application or real-time service with XMPP Every day, more software developers and service providers are using XMPP for real-time applications, and with the help of XMPP: The Definitive Guide, you can, too.

Professional XMPP Programming with JavaScript and JQuery

Author: Jack Moffitt

Publisher: John Wiley & Sons

ISBN: 0470540710

Category: Computers

Page: 455

View: 5806

DOWNLOAD NOW »
Provides information on using XMPP to build applications or add new features to current applications, covering such topics as the debugging console, the identica client, service discovery, event handling, and plugins.

Cloud Computing: A Practical Approach

Author: Toby Velte,Anthony Velte,Robert Elsenpeter

Publisher: McGraw Hill Professional

ISBN: 0071626956

Category: Computers

Page: 400

View: 3527

DOWNLOAD NOW »
"The promise of cloud computing is here. These pages provide the 'eyes wide open' insights you need to transform your business." --Christopher Crowhurst, Vice President, Strategic Technology, Thomson Reuters A Down-to-Earth Guide to Cloud Computing Cloud Computing: A Practical Approach provides a comprehensive look at the emerging paradigm of Internet-based enterprise applications and services. This accessible book offers a broad introduction to cloud computing, reviews a wide variety of currently available solutions, and discusses the cost savings and organizational and operational benefits. You'll find details on essential topics, such as hardware, platforms, standards, migration, security, and storage. You'll also learn what other organizations are doing and where they're headed with cloud computing. If your company is considering the move from a traditional network infrastructure to a cutting-edge cloud solution, you need this strategic guide. Cloud Computing: A Practical Approach covers: Costs, benefits, security issues, regulatory concerns, and limitations Service providers, including Google, Microsoft, Amazon, Yahoo, IBM, EMC/VMware, Salesforce.com, and others Hardware, infrastructure, clients, platforms, applications, services, and storage Standards, including HTTP, HTML, DHTML, XMPP, SSL, and OpenID Web services, such as REST, SOAP, and JSON Platform as a Service (PaaS), Software as a Service (SaaS), and Software plus Services (S+S) Custom application development environments, frameworks, strategies, and solutions Local clouds, thin clients, and virtualization Migration, best practices, and emerging standards

The Second Machine Age

Wie die nächste digitale Revolution unser aller Leben verändern wird

Author: Erik Brynjolfsson,Andrew McAfee

Publisher: Plassen Verlag

ISBN: 3864702224

Category: Political Science

Page: 368

View: 9983

DOWNLOAD NOW »
Computer sind mittlerweile so intelligent geworden, dass die nächste industrielle Revolution unmittelbar bevorsteht. Wer profitiert, wer verliert? Antworten auf diese Fragen bietet das neue Buch der Technologie-Profis Erik Brynjolfsson und Andrew McAfee. Seit Jahren arbeiten wir mit Computern - und Computer für uns. Mittlerweile sind die Maschinen so intelligent geworden, dass sie zu Leistungen fähig sind, die vor Kurzem noch undenkbar waren: Sie fahren Auto, sie schreiben eigene Texte - und sie besiegen Großmeister im Schach. Dieser Entwicklungssprung ist nur der Anfang. In ihrem neuen Buch zeigen zwei renommierte Professoren, welch atemberaubende Entwicklungen uns noch bevorstehen: Die zweite industrielle Revolution kommt! Welche Auswirkungen wird das haben? Welche Chancen winken, welche Risiken drohen? Was geschieht dabei mit den Menschen, was mit der Umwelt? Und was werden Gesellschaft und Politik tun, um die Auswirkungen dieser "neuen digitalen Intelligenz" für alle bestmöglich zu gestalten? Dieses Buch nimmt Sie mit auf eine Reise in eine Zukunft, die schon längst begonnen hat.

Raspberry-Pi-Kochbuch

Lösungen für alle Software- und Hardware-Probleme. Für alle Versionen inklusive Pi 3 & Zero

Author: Simon Monk

Publisher: O'Reilly

ISBN: 396010118X

Category: Business & Economics

Page: 484

View: 1488

DOWNLOAD NOW »
Das Raspberry-Pi-Universum wächst täglich. Ständig werden neue Erweiterungs-Boards und Software-Bibliotheken für den Single-Board-Computer entwickelt. Die zweite Ausgabe dieses beliebten Kochbuchs bietet mehr als 240 Hands-on-Rezepte für den Betrieb des kleinen Low-Cost-Computers mit Linux und für die Programmierung des Pi mit Python. Außerdem erläutert es die Anbindung von Sensoren, Motoren und anderer Hardware, einschließlich Arduino und das Internet der Dinge. Power-Maker und Autor Simon Monk vermittelt grundlegendes Know-how, das Ihnen hilft, auch neue Technologien und Entwicklungen zu verstehen und so mit dem Raspberry-Pi-Ökosystem mitzuwachsen. Dieses Kochbuch ist ideal für Programmierer und Bastler, die mit dem Pi bereits erste Erfahrungen gemacht haben. Alle Codebeispiele sind auf der Website zum Buch verfügbar. - Richten Sie Ihren Raspberry Pi ein und verbinden Sie ihn mit dem Netz. - Arbeiten Sie mit seinem Linux-basierten Betriebssystem Raspbian. - Lernen Sie, den Pi mit Python zu programmieren. - Verleihen Sie Ihrem Pi "Augen" für Anwendungen, die maschinelles Sehen erfordern. - Steuern Sie Hardware über den GPIO-Anschluss. - Verwenden Sie den Raspberry Pi, um unterschiedliche Motoren zu betreiben. - Arbeiten Sie mit Schaltern, Tastaturen und anderen digitalen Eingaben. - Verwenden Sie Sensoren zur Messung von Temperatur, Licht und Entfernung. - Realisieren Sie auf verschiedenen Wegen eine Verbindung zu IoT-Geräten. - Entwerfen Sie dynamische Projekte mit Raspberry Pi und dem Arduino.

MySQL Tutorial

Die kompakte Einführung in die Arbeit mit MySQL

Author: Luke Welling,Laura Thomson

Publisher: Pearson Deutschland GmbH

ISBN: 9783827321695

Category:

Page: 286

View: 1334

DOWNLOAD NOW »

Practical Design of Ships and Mobile Units

Proceedings of the Seventh International Symposium on Practical Design of Ships and Mobile Units, the Netherlands, September 1998

Author: Marinus Willem Cornelis Oosterveld,S. G. Tan

Publisher: Elsevier Science Limited

ISBN: N.A

Category: Transportation

Page: 1089

View: 6834

DOWNLOAD NOW »
These proceedings contain the papers presented at the 7th International Symposium on Practical Design of Ships and Mobile Units. The symposium was held at the Congress Centre in The Hague, The Netherlands on 20-25 September, 1998.The overall aim of PRADS conferences is to advance the design of ships and mobile marine structures through the exchange of knowledge and the promotion of discussions on relevant topics in the fields of naval architecture and marine and offshore engineering. Greater international co-operation of this kind can help improve design and production methods and so increase the efficiency, economy and safety of ships and mobile units. The main themes of this symposium are design synthesis, production, ship hydromechanics, ship structures and materials and offshore engineering. Some topics which attracted many papers were design loads, design for ultimate strength, impact of safety and environment, grounding and collision, resistance and flow, seakeeping, fatigue considerations and propulsor and propulsion systems.

Java in a nutshell

deutsche Ausgabe für Java 1.4

Author: David Flanagan

Publisher: O'Reilly Germany

ISBN: 9783897213326

Category: Java (Computer program language)

Page: 1084

View: 2449

DOWNLOAD NOW »

Tough Sh*t

Ein Fettsack mischt Hollywood auf!

Author: Kevin Smith

Publisher: Heyne Verlag

ISBN: 3641098440

Category: Performing Arts

Page: 336

View: 8652

DOWNLOAD NOW »
DER Kevin Smith? Der Typ, der vor Jahrtausenden diesen Film »Clerks« gedreht hat? Ist der nicht mal mit seinem fetten Arsch aus einem Flugzeug geworfen worden? Was sollte man von dem schon lernen? Wie wär’s damit: Er veränderte die Art, Filme zu machen, im Alter von 23. Seitdem macht er, was er will – und wird dafür bezahlt. Er dreht Filme, schreibt Comics, besitzt einen Laden und hat sich ein einzigartiges Podcast-Imperium aufgebaut. Fakt ist: Kevin Smith hat den Erfolgscode geknackt. Aber wie hat der Fettsack das bloß geschafft?

Integriertes Management vernetzter Systeme

Konzepte, Architekturen und deren betrieblicher Einsatz

Author: Heinz-Gerd Hegering,Sebastian Abeck,Bernhard Neumair

Publisher: N.A

ISBN: 9783932588167

Category: Computer network architectures

Page: 607

View: 8304

DOWNLOAD NOW »

Learning Internet of Things

Author: Peter Waher

Publisher: Packt Publishing Ltd

ISBN: 1783553545

Category: Computers

Page: 242

View: 5062

DOWNLOAD NOW »
If you're a developer or electronics engineer who is curious about Internet of Things, then this is the book for you. With only a rudimentary understanding of electronics, Raspberry Pi, or similar credit-card sized computers, and some programming experience using managed code such as C# or Java, you will be taught to develop state-of-the-art solutions for Internet of Things in an instant.

Hacking mit Security Onion

Sicherheit im Netzwerk überwachen: Daten erfassen und sammeln, analysieren und Angriffe rechtzeitig erkennen

Author: Chris Sanders,Jason Smith

Publisher: Franzis Verlag

ISBN: 3645204962

Category: Computers

Page: 560

View: 4924

DOWNLOAD NOW »
Sie können noch so viel in Hardware, Software und Abwehrmechanismen investieren, absolute Sicherheit für Ihre IT-Infrastruktur wird es nicht geben. Wenn Hacker sich wirklich anstrengen, werden sie auch in Ihr System gelangen. Sollte das geschehen, müssen Sie sowohl technisch als auch organisatorisch so aufgestellt sein, dass Sie die Gegenwart eines Hackers erkennen und darauf reagieren können. Sie müssen in der Lage sein, einen Zwischenfall zu deklarieren und die Angreifer aus Ihrem Netzwerk zu vertreiben, bevor sie erheblichen Schaden anrichten. Das ist Network Security Monitoring (NSM). Lernen Sie von dem leitenden Sicherheitsanalytiker Sanders die Feinheiten des Network Security Monitoring kennen. Konzepte verstehen und Network Security Monitoring mit Open-Source-Tools durchführen: Lernen Sie die drei NSM-Phasen kennen, um diese in der Praxis anzuwenden. Die praktische Umsetzung der NSM erfolgt mit vielen Open-Source-Werkzeugen wie z. B. Bro, Daemonlogger, Dumpcap, Justniffer, Honeyd, Httpry, Netsniff-NG, Sguil, SiLK, Snorby Snort, Squert, Suricata, TShark und Wireshark. Anhand von ausführlichen Beispielen lernen Sie, die Tools effizient in Ihrem Netzwerk einzusetzen.