In this article written by K. Siva Prasad Reddy, who has also authored the article Java Persistence with MyBatis 3, we will understand why MyBatis is useful.
There are many Java-based persistence frameworks, however MyBatis became popular because of the following reasons:
- It Eliminates a lot of JDBC boilerplate code
- It has a low learning curve
- It works well with legacy databases
- It embraces SQL
- It provides support for integration with Spring and Guice frameworks
- It provides support for integration with third-party cache libraries
- It induces better performance
Read Why MyBatis in full
This article by Tochi Eke-Okoro, author of Instant Wijmo Widgets How-to [Instant], opens the reader to a world of aesthetic user interface widgets made available by Wijmo. It exhibits, via a step-wise approach, simple methods of creating and customizing various widgets, and how to display them including the Column Bar Chart and Bubble Chart options.Read Wijmo Widgets in full
Microsoft Windows PowerShell 3.0 First Look will ensure that you have a great overview of the numerous new features and changes found in the most recent version of the language. Through simple examples and succinct chapters, this book will quickly bring readers up to speed with need to know information about the newest version of PowerShell.
In this article by Adam Driscoll, author of Microsoft Windows PowerShell 3.0 First Look, we'll see:
- A selection of new cmdlets found in the core PowerShell modules
- A selection of new modules and cmdlets found in Windows 8 and Windows Server 2012
The article, Windows 8 with VMware View, covers the important aspects of VMware View. This article by Ramesh Geddam and Prasenjit Sarkar, authors of the book Instant VMware View Virtualization How-to , covers the deployment of VMware View on Windows 8, and also explains the steps necessary to build a virtual machine on Windows.Read Windows 8 with VMware View in full
The default configuration for Windows Azure Diagnostics captures some data but does not persist it. Consequently, the diagnostics configuration should be modified at role startup. In this article by Neil Mackenzie, author of Microsoft Windows Azure Development Cookbook, the Initializing the configuration of Windows Azure Diagnostics recipe, shows us how to do this programmatically, which is the normal way to do it. In the Using a configuration file with Windows Azure Diagnostics recipe, we see how to use a configuration file to do this, which is necessary in a VM role.Read Windows Azure Diagnostics: Initializing the Configuration and Using a Configuration File in full
In this article by Geoff Webber-Cross, author of the book Learning Windows Azure Mobile Services for Windows 8 and Windows Phone 8, we will have a look at how push Notifications allow us to expand our application's user experience outside the bounds of the app with live tile updates, toast notifications, and badges in Windows 8. Windows Azure Mobile Services makes it very easy for us to trigger notifications via Windows Notifications Service (WNS) (for Store apps), Microsoft Push Notification Service (MPNS) (for Windows Phone 8 apps), Apple Notifications Service (ANS), and Google Notifications Service (GCM). We're going to discuss how to configure Windows 8 and Windows Phone applications to allow notifications, send different types of notifications using scripts, and create a list of devices to manage our user's notification channels.Read Windows Azure Mobile Services - Implementing Push Notifications using in full
Windows Azure Service Bus offers features that are not offered by any other cloud platform on the market. One important feature is the Service Bus that enables you to connect your on-premise services to Windows Azure services and beyond. The Access Control Service enables you to easily authenticate users without having to write complex authentication code ourselves. By using Windows Identity Framework (WIF) and supporting identity providers such as Live ID, Yahoo, and Facebook, it will be easy to use these identity providers as the main authentication mechanism in our own services.
In this article by Riccardo Becker, author of Windows Azure programming patterns for Start-ups, we will provide a systematic guide on how to integrate with Facebook. AppFabric also contains AppFabric applications, an easy way to develop and deploy composite applications. Another interesting feature is the caching feature that AppFabric offers.Read Windows Azure Service Bus: Key Features in full
The development environment of choice in this article by Stefan Björnander is the Visual Studio from Microsoft. In this article we also study the Microsoft Foundation Classes (MFC).
- Visual Studio provides us with a few Wizards—tools that help us generate code. The Application Wizard creates an application framework (a skeleton application) to which we add the specific logic and behavior of our application.
- When developing a Windows application, the Document/View model comes in handy. The application is divided into a document object that holds the data and performs the logic, and one or more views that take care of user input and display information on the screen.
- When an event occurs (the user clicks the mouse, the window is resized) a message is sent to the application, it is caught by a view object and is passed on to the document object. There are hundreds of messages in the Windows system. However, we only catch those that interest us.
- The device context can be viewed both as a canvas to paint on and as a toolbox holding pens and brushes.
- When we finish an application, we may want it to occur in the same state when we launch it the next time. This can be archived by storing vital values in the registry.
- Serialization is an elegant way of storing and loading values to and from a file. The framework takes care of naming, opening, and closing the file, all we have to do is to fill in the unique values of the application.
- The cursor has different appearances on different occasions. There are several predefined cursors we can use.
The WiX toolset ships with several User Interface wizards that are ready to use out of the box. We'll briefly discuss each of the available sets and then move on to learning how to create your own from scratch. In this article by Nick Ramirez, author of the book WiX: A Developer's Guide to Windows Installer XML, you'll learn about:
- Adding dialogs into the InstallUISequence
- Linking one dialog to another to form a complete wizard
- Getting basic text and window styling working
- Including necessary dialogs like those needed to display errors
In this article by Jonathan Marbutt and Robb Schiefer Jr., authors of Windows Phone 7 Silverlight Cookbook, we will take a deep dive into the location API for Windows Phone 7 by building an application to help navigate during travel and another to map the user's location.
In this article we will cover:
- Tracking latitude and longitude
- Tracking altitude, speed, and course
- Saving battery by using a location wisely
- Using location services with the emulator
- Mapping your location
In this article by Tomasz Szostak, author of Windows Phone 8 Application Development Essentials, we will cover:
- Principles for UI/UX
This article by Jayaram Krishnaswamy introduces the reader accustomed to working with the traditional graphic user interface in earlier versions of VB to Windows Presentation Foundation. Importantly, it introduces the reader to the XAML's declarative format and what it means in the design interface of VS 2008. WPF can do a great deal more than what is described in this article. The power of markup extensions such as declarative binding, dynamic resource, template binding and many others are not discussed. It is hoped that the reader will be up and running WPF projects based on his previous experience after reading this article.Read Windows Presentation Foundation Project - Basics of Working in full
As you start to use Wireshark, you will realize that there are a wide variety of things that you can do with it. This article by Abhinav Singh, author of Instant Wireshark Starter [Instant], will teach you all about working with packet streams, the most commonly performed tasks and most commonly used feature in Wireshark.Read Wireshark: Working with Packet Streams in full
Most likely, today, some hacker tried to crack your WordPress site, its data and content. Maybe that was just a one-off from some bored kid. Just as likely, it was an automated hit, trying dozens of attacks to find a soft spot. Then again, quite likely it was both. What we must do is to solidify your WordPress and other logins so you can securely administrate while keeping your data and credentials flying well under the radar. We'll put the best web protocols to work, along with added defenses, chiefly from Apache.
In this article by Olly Connelly, author of WordPress 3.0 Ultimate Security, we will cover:
- IP deny with mod_access
- Password protect directories
- Authentication with mod_auth
- Better passwords with mod_auth_digest
- More authentication methods
Many local and online risks double up to threaten sites and servers as well, and in some cases the opposite is true. With our web assets though, given their constant availability and valuable prizes for the successful assailant, malicious possibilities, and the temptation to exploit those rocket our subject’s risk factor, off the chart, to a sky-high level.
In this article by Olly Connelly, author of WordPress 3.0 Ultimate Security, we will cover:
- Sizing up vulnerabilities to WordPress and its third party code
- Addressing the frailties of and attacks to your server-side environment
It stands to reason that we can't properly secure a WordPress site until we have a heads-up on its vulnerabilities and the threats it faces. So let's kick off by ensuring awareness.
In this article by Olly Connelly, author of WordPress 3.0 Ultimate Security, we'll set the scene by introducing the hackers and their tricks and considering how the former plies the latter against a site, whether directly or indirectly:
- Knowing the enemy, the variety of mindset, and the levels of skill
- Considering physical security and the threat from social engineering
- Weighing up OS security, allow vs. deny policies and open vs. closed source
- Mulling over malware in its many shapes and forms
- Assessing risks from local devices such as PCs and routers
- Treading carefully in the malicious minefield that is the web
WordPress is a popular content management system (CMS), most renowned for its use as a blogging / publishing application. According to usage statistics tracker, BuiltWith (http://builtWith.com), WordPress is considered to be the most popular blogging software on the planet—not bad for something that has only been around officially since 2003.
In this article by Brian Bondari and Everett Griffiths, authors of WordPress 3 Plugin Development Essentials, we will learn about a special type of WordPress plugin: the widget. The architecture of widgets has undergone a radical change starting with the release of WordPress 2.8, so now we must talk about Object Oriented programming. We will learn a bit about its power as we extend the WP_Widget class to create our widget. We will also learn how to create a preference page in the manager so we can store our plugin's configuration details.Read WordPress 3: Building a Widget in full
In this article by Paul Thewlis, author of WordPress 3 For Business Bloggers, we'll look at one of the most important aspects of your blog—design. We'll begin by considering some of the principles of good blog design. Even if your blog is already up and running, this article will allow you to critically evaluate its design and replace your current theme with a custom-designed one. This article includes:
- The principles of blog design
- How to implement your blog design using CSS and HTML
WordPress is a flexible and powerful tool that's ideal for creating both blog and non-blog websites. You can customize the features, incorporate your own design, and even write your own plug-ins with ease.
To celebrate the publication of the WordPress 3 Ultimate Security, Packt is offering a series of attractive discounts on all WordPress books.
* Buy any WordPress print book and get 20% off
* Buy any WordPress eBook and get 30% off
This offer will last for a limited period only. Grab your copy now !