Sebanyak 1165 item atau buku ditemukan

Designing Mobile Interfaces

Describes the techniques of effective mobile interface design, covering such topics as composition, widgets, audio, labels and indicators, and text and character input.

Describes the techniques of effective mobile interface design, covering such topics as composition, widgets, audio, labels and indicators, and text and character input.

Hadoop Operations

For system administrators tasked with the job of maintaining large and complex Hadoop clusters, this book explains the particulars of Hadoop operations, from planning, installing, and configuring the system to providing ongoing maintenance.

For system administrators tasked with the job of maintaining large and complex Hadoop clusters, this book explains the particulars of Hadoop operations, from planning, installing, and configuring the system to providing ongoing maintenance.

Make a Mind-Controlled Arduino Robot

Use Your Brain as a Remote

Build a robot that responds to electrical activity in your brain—it’s easy and fun. If you’re familiar with Arduino and have basic mechanical building skills, this book will show you how to construct a robot that plays sounds, blinks lights, and reacts to signals from an affordable electroencephalography (EEG) headband. Concentrate and the robot will move. Focus more and it will go faster. Let your mind wander and the robot will slow down. You’ll find complete instructions for building a simple robot chassis with servos, wheels, sensors, LEDs, and a speaker. You also get the code to program the Arduino microcontroller to receive wireless signals from the EEG. Your robot will astound anyone who wears the EEG headband. This book will help you: Connect an inexpensive EEG device to Arduino Build a robot platform on wheels Calculate a percentage value from a potentiometer reading Mix colors with an RGB LED Play tones with a piezo speaker Write a program that makes the robot avoid boundaries Create simple movement routines

This book will help you: Connect an inexpensive EEG device to Arduino Build a robot platform on wheels Calculate a percentage value from a potentiometer reading Mix colors with an RGB LED Play tones with a piezo speaker Write a program that ...

Asterisk: The Definitive Guide

Design a complete Voice over IP (VoIP) or traditional PBX system with Asterisk, even if you have only basic telecommunications knowledge. This bestselling guide makes it easy, with a detailed roadmap that shows you how to install and configure this open source software, whether you’re upgrading your existing phone system or starting from scratch. Ideal for Linux administrators, developers, and power users, this updated edition shows you how to write a basic dialplan step-by-step, and brings you up to speed on the features in Asterisk 11, the latest long-term support release from Digium. You’ll quickly gain working knowledge to build a simple yet inclusive system. Integrate Asterisk with analog, VoIP, and digital telephony systems Build an interactive dialplan, using best practices for more advanced features Delve into voicemail options, such as storing messages in a database Connect to external services including Google Talk, XMPP, and calendars Incorporate Asterisk features and functions into a relational database to facilitate information sharing Learn how to use Asterisk’s security, call routing, and faxing features Monitor and control your system with the Asterisk Manager Interface (AMI) Plan for expansion by learning tools for building distributed systems

This bestselling guide makes it easy, with a detailed roadmap that shows you how to install and configure this open source software, whether you’re upgrading your existing phone system or starting from scratch.

What is DevOps?

Have we entered the age of NoOps infrastructures? Hardly. Old-style system administrators may be disappearing in the face of automation and cloud computing, but operations have become more significant than ever. As this O’Reilly Radar Report explains, we’re moving into a more complex arrangement known as "DevOps." Mike Loukides, O’Reilly’s VP of Content Strategy, provides an incisive look into this new world of operations, where IT specialists are becoming part of the development team. In an environment with thousands of servers, these specialists now write the code that maintains the infrastructure. Even applications that run in the cloud have to be resilient and fault tolerant, need to be monitored, and must adjust to huge swings in load. That was underscored by Amazon’s EBS outage last year. From the discussions at O’Reilly’s Velocity Conference, it’s evident that many operations specialists are quickly adapting to the DevOps reality. But as a whole, the industry has just scratched the surface. This report tells you why.

" Mike Loukides, O’Reilly’s VP of Content Strategy, provides an incisive look into this new world of operations, where IT specialists are becoming part of the development team.

Packet Guide to Core Network Protocols

Take an in-depth tour of core Internet protocols and learn how they work together to move data packets from one network to another. With this concise book, you'll delve into the aspects of each protocol, including operation basics and security risks, and learn the function of network hardware such as switches and routers. Ideal for beginning network engineers, each chapter in this book includes a set of review questions, as well as practical, hands-on lab exercises. Understand basic network architecture, and how protocols and functions fit together Learn the structure and operation of the Ethernet protocol Examine TCP/IP, including the protocol fields, operations, and addressing used for networks Explore the address resolution process in a typical IPv4 network Become familiar with switches, access points, routers, and other network components that process packets Discover how the Internet Control Message Protocol (ICMP) provides error messages during network operations Learn about the network mask (subnetting) and how it helps determine the network

With this concise book, you'll delve into the aspects of each protocol, including operation basics and security risks, and learn the function of network hardware such as switches and routers.

Mercurial: The Definitive Guide

The Definitive Guide

This instructive book takes you step by step through ways to track, merge, and manage both open source and commercial software projects with Mercurial, using Windows, Mac OS X, Linux, Solaris, and other systems. Mercurial is the easiest system to learn when it comes to distributed revision control. And it's a very flexible tool that's ideal whether you're a lone programmer working on a small project, or part of a huge team dealing with thousands of files. Mercurial permits a countless variety of development and collaboration methods, and this book offers several concrete suggestions to get you started. This guide will help you: Learn the basics of working with a repository, changesets, and revisions Merge changes from separate repositories Set up Mercurial to work with files on a daily basis, including which ones to track Get examples and tools for setting up various workflow models Manage a project that's making progress on multiple fronts at once Find and fix mistakes by isolating problem sources Use hooks to perform actions automatically in response to repository events Customize the output of Mercurial Mercurial: The Definitive Guide maintains a strong focus on simplicity to help you learn Mercurial quickly and thoroughly.

This guide will help you: Learn the basics of working with a repository, changesets, and revisions Merge changes from separate repositories Set up Mercurial to work with files on a daily basis, including which ones to track Get examples and ...

VMware Cookbook

A Real-World Guide to Effective VMware Use

With scores of step-by-step solutions, this cookbook helps you work with VMware ESXi in a wide range of network environments. You’ll not only learn the basics—how to pool resources from hardware servers, computer clusters, networks, and storage, and then distribute them among virtual machines—but also how to overcome the stumbling blocks you’ll encounter when you monitor systems, troubleshoot problems, and deal with security. This expanded second edition covers recent advances in vCloud Director and vShield cloud security. Ideal for system administrators of any level, VMware Cookbook also includes valuable information to help you determine your virtualization needs. Move into the cloud with vCloud Director, and secure virtual datacenters with vSphere Secure and monitor your virtual environment from the command line Manage disk, SSD, and SAN storage implementation and configuration Discover options for managing resources, such as clustering, shares, and hot add/hotplug support Configure logical and physical networks, including virtual switches and software and hardware adapters Make virtual machine replication easier by automating ESXi installations Gain valuable tips for configuration and fine-tuning

This expanded second edition covers recent advances in vCloud Director and vShield cloud security.

Creating Photomontages with Photoshop: A Designer's Notebook

A guide to using Photoshop to create photomontages, featuring the work and commentary of digital imaging professionals, graphic artists, illustrators, and photographers such as Didier Cr?et?e, Lamia Dhib, and Odile Pascal.

A guide to using Photoshop to create photomontages, featuring the work and commentary of digital imaging professionals, graphic artists, illustrators, and photographers such as Didier Cr?et?e, Lamia Dhib, and Odile Pascal.

Internet Forensics

Because it's so large and unregulated, the Internet is a fertile breeding ground for all kinds of scams and schemes. Usually it's your credit card number they're after, and they won't stop there. Not just mere annoyances, these scams are real crimes, with real victims. Now, thanks to Internet Forensics from O'Reilly, there's something you can do about it. This practical guide to defending against Internet fraud gives you the skills you need to uncover the origins of the spammers, con artists, and identity thieves that plague the Internet. Targeted primarily at the developer community, Internet Forensics shows you how to extract the information that lies hidden in every email message, web page, and web server on the Internet. It describes the lengths the bad guys will go to cover their tracks, and offers tricks that you can use to see through their disguises. You'll also gain an understanding for how the Internet functions, and how spammers use these protocols to their devious advantage. The book is organized around the core technologies of the Internet-email, web sites, servers, and browsers. Chapters describe how these are used and abused and show you how information hidden in each of them can be revealed. Short examples illustrate all the major techniques that are discussed. The ethical and legal issues that arise in the uncovering of Internet abuse are also addressed. Not surprisingly, the audience for Internet Forensics is boundless. For developers, it's a serious foray into the world of Internet security; for weekend surfers fed up with spam, it's an entertaining and fun guide that lets them play amateur detective from the safe confines of their home or office.

The book is organized around the core technologies of the Internet-email, web sites, servers, and browsers. Chapters describe how these are used and abused and show you how information hidden in each of them can be revealed.