In this article by João P. Soares Fernandes, the author of Moodle 2.5 Multimedia, we will focus essentially on web-based applications for creating multimedia.Read Understanding Web-based Applications and Other Multimedia Forms in full
There is a good possibility that your potential clients will not understand the benefits of performing a full penetration test. Simply enumerating the known vulnerabilities in a network environment is not suffcient to truly understand the effectiveness of the corporation's combined security controls; we need to prove that the vulnerabilities found have a potential to impact the bottom line. After all, this is what your clients need to know and understand about their environment.
In this article by Lee Allen, author of the book Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide, we will review some interesting techniques and methods that will let us understand the true security posture of the network environment we are testing.Items of interest discussed in this article include the following:
- Transferring files to and from the victim machine
- Password cracking with John the Ripper
- Brute forcing with THC Hydra
- Metasploit—learn it and love it
IBM Cognos Planning allows you to create highly complex models using its advanced forecasting algorithms and scenario planning facilities. With this capability at your disposal, you may be tempted to build a model that "does everything at the push of the button". This article by Rich Babaran summarizes the key steps of the Model Development Process. Over the course of this article, you will learn how to:
- Design the model template in Analyst
- Build the Contributor application
- Enter and review plans in the Contributor Web user interface
- Publish and report on planning data
- Maintain the planning models
- Latitude and longitude
- The accuracy of the latitude and longitude
- The accuracy of the altitude information
In this article series by Ian Lackey and Michael Washington, we will be exploring the core functionality of the DotNetNuke architecture. We will be using the Source Code version of DotNetNuke 5.2.2 that can be downloaded from the DotNetNuke CodePlex site. We will start with an overview of the architecture, touching on key concepts employed by DotNetNuke. After this, we will examine some of the major sections that make up the framework. Finally, after we learn about the objects that make up the core, we will follow a request for a page through this process to find out how each page is dynamically created.Read Understanding the DotNetNuke Core Architecture- An Extension in full
In this article series by Ian Lackey and Michael Washington, we will be exploring the core functionality of the DotNetNuke architecture. We will be using the Source Code version of DotNetNuke 5.2.2 that can be downloaded from the DotNetNuke CodePlex site. We will start with an overview of the architecture, touching on key concepts employed by DotNetNuke. After this, we will examine some of the major sections that make up the framework. Finally, after we learn about the objects that make up the core, we will follow a request for a page through this process to find out how each page is dynamically created.Read Understanding the DotNetNuke Core Architecture in full
In this article by David J. Parker, author of Microsoft Visio 2010 Business Process Diagramming and Validation, we will discuss Microsoft Visio ShapeSheet™ and the key sections, rows, and cells, along with the functions available for writing ShapeSheet™ formulae, where relevant for structured diagrams.Read Understanding ShapeSheet™ in Microsoft Visio 2010 in full
The core of any Enterprise Service Bus (ESB) revolves around the definition of services and the way in which these services communicate with each other. How you choose to break up your application into services, whether dealing with the integration of legacy components or designing new functionality, and how they communicate can have a large effect on the performance, flexibility and resilience of your application.
In this article by Kevin Conner and Magesh Kumar Bojan, author of http://www.packtpub.com/jboss-esb-beginners-guide/book/pd/JBoss-abr1/021... " target="_blank">JBoss ESB Beginner's Guide, we will cover JBoss ESB Services, explaining the structure of the ESB message, the mechanics behind the Action Pipeline and the choices you have for implementing actions.
You will learn about:
- The structure of ESB messages and how to validate them
- The configuration mechanism within JBoss ESB
- The service pipeline and service actions
- Service chaining and continuations
- Transactional behavior and its effect on the pipeline
- Security context and its propagation
In this article by Hans-Jürgen Schönig and Zoltan Böszörmenyi, authors of PostgreSQL Replication, we will cover the following:
- Understanding the concepts behind PITR
- Configuring PostreSQL for PITR
- Running pg_basebackup
- Recovering PostgreSQL to a certain point in time
In this article by Sujoy Acharya, author of the book Test-Driven Development with Mockito, we will cover different styles of TDD and write code using them. Generally, the outside-in approach covers use case level functionality or is intended for acceptance tests. These tests provide regression suits and system documentation; if they fail, user/customer acceptance also fails.Read Understanding outside-in in full
This article by Maurizio Turatti and Maurizio Pillitu, the authors of Instant Apache Maven Starter, introduces the most important terms of the Maven vocabulary.
In this article, we will cover the following:
A Maven project
Parent (also known as POM Inheritance)
This article by Cristina Nicolàs Lorente and Laura Nicolàs Lorente, the author of Microsoft Dynamics NAV Financial Management provides a brief introduction on master data.Read Understanding master data in full
In this article by Garry Turkington the author of Hadoop Beginner's Guide, we will be:
- Understanding how key/value pairs are the basis of Hadoop tasks
- Learning the various stages of a MapReduce job
- Examining the workings of the map, reduce, and optional combined stages in detail
- Looking at the Java API for Hadoop and use it to develop some simple MapReduce jobs
- Learning about Hadoop input and output
In this article by Tessa Blakeley Silver, author of Wordpress 3.0 jQuery, we will understand the following:
- What WordPress themes are and do
- The basics of creating your own WordPress themes
In this article by Frank LaVigne, author of Microsoft Silverlight 4 Business Application Development, we shall understand Expression Blend and how to use it in conjunction with Visual Studio.Read Understanding Expression Blend and How to Use it with Silverlight 4 in full
This article is about routes the request interfaces to your application. We have seen and used some routes in the previous articles, but there is much more to routes than creating one by giving a name and including a callback function to handle the request.
In this article by Hage Yaapa, author of Express Web Application Development, you will get a deeper insight into how routes work and how you can customize them to make your application more flexible and powerful.
You will learn the following in this article.
How to define routes
How to handle routes
How to organize routes
In this article by Philip Herron, author of the Learning Cython Programming, will start to get serious with Cython and will discuss how to describe C declarations with respect to Cython along with calling conventions and type conversion.Read Understanding Cython in full
The key objective driving service-oriented architecture is to move the IT organization closer to the business. Creation of services and their assembly into composite applications and processes is the mechanism by which IT can move to be more responsive to the business. However, it is the provision of real-time business information via dashboards that really gives business the confidence that IT can deliver. In this article by Matt Wright, we will examine how to use BAM (Business Activity Monitoring).Read Understanding Business Activity Monitoring in Oracle SOA Suite in full