Article Network

Behind the Book: Oracle Database 11g R2 Performance Tuning Cookbook

by | April 2011 | Enterprise Articles Oracle

Behind the Book

Ever wondered what goes on behind the scenes when a book is published?

Follow the story, as it takes place, behind the Oracle Database 11g R2 Performance Tuning Cookbook

Read Behind the Book: Oracle Database 11g R2 Performance Tuning Cookbook in full

Behavior-driven Development with Selenium WebDriver

by Unmesh Gundecha | January 2013 | Open Source

Behavior-driven Development (BDD) is an agile software development practice that enhances the paradigm of Test Driven Development (TDD) and acceptance tests, and encourages the collaboration between developers, quality assurance, domain experts, and stakeholders. Behavior-driven Development was introduced by Dan North in the year 2003 in his seminal article available at http://dannorth.net/introducing-bdd/.

In this article by Unmesh Gundecha, author of Selenium Testing Tools Cookbook, we will cover:

  • Using Cucumber-JVM and Selenium WebDriver in Java for BDD

  • Using SpecFlow.NET and Selenium WebDriver in .NET for BDD

  • Using JBehave and Selenium WebDriver in Java

  • Using Capybara, Cucumber, and Selenium WebDriver in Ruby

Read Behavior-driven Development with Selenium WebDriver in full

Beating Back the Horde

by Jessica Chiang Sergio van Pul | February 2014 | Games

In this article by Sergio van Pul and Jessica Chiang, authors of Scratch Game Development Hotshot, we will make a game that is a bit more involved.

Read Beating Back the Horde in full

BatteryMonitor Application

by Steven F Daniel | November 2012 | Enterprise Articles

The BatteryMonitor application allows you to monitor the state and battery levels of your iOS device using the APIs that come with the iOS SDK. Each iOS device represents a unique set of properties that include the device's current physical orientation, its model name, and its battery state. It also provides access to the onboard hardware.

This article by Steven F Daniel, author of iPad Enterprise Application Development BluePrints, we will be taking a closer look at how we can use the Core Graphics framework to create and draw a gauge that will be use to present and visualize the total amount of battery life remaining on the iOS device, and then start to design the user interface for our app.

Read BatteryMonitor Application in full

Basics of Exception Handling Mechanism in JavaScript Testing

by Yuxian Eugene Liang | August 2010 | Beginner's Guides Open Source

In this article, by Liang Yuxian Eugene, author of JavaScript Testing Beginner's Guide, we will learn more about JavaScript testing. More specifically, we'll learn how to test more complex code, where there will be more interactions between entities.

More specifically, we'll cover the following:

  • Issues with combining scripts
  • Using JavaScript libraries
  • Deliberately throwing your own JavaScript errors
Read Basics of Exception Handling Mechanism in JavaScript Testing in full

Basic use of Local Storage

by Alex Libby | April 2013 | Web Development

In this article by Alex Libby, the author of the book, Instant HTML5 Local Storage How-to, we will discuss about HTML5 Local Storage.

When using HTML5 Local Storage, there are two types that you can use—local storage and session storage. We'll begin by looking at the former first, using a simple form as the basis for our article.

Read Basic use of Local Storage in full

Basic Skills, Traits, and Competencies of a Manager

by Rahul Goyal | May 2012 | Enterprise Articles

In India, being a Manager is highly valued. A majority of people see themselves taking a managerial position some day. However, can anyone become a manager? A really good manager? Are managers born or made? Do all managers, at least all good managers, share something in common?

When we look around and see the journeys being taken by different managers, their working styles and behaviors, we can hypothesize that:

  • Managers are born and made. Some folks have a natural flair to be a manager and some acquire essential skills to be a manager in a given situation.
  • Not everyone may enjoy being a manager. While you may be 'promoted' to become a manager, you may find that you don't really enjoy the time spent talking to people, driving them to results, and compiling status reports for your management.
  • It appears that good managers do have many things in common, even though they may have their own style of execution.

In this article by Rahul Goyal author of Management in India: Grow from an Accidental to a Successful Manager in the IT & Knowledge Industry , we will explore the skills, traits, talents, and competencies that are usually required and expected for playing a manager role, and also burst some myths surrounding managers.

Read Basic Skills, Traits, and Competencies of a Manager in full

Basic Security Approaches

by Benjamin Bahrenburg | September 2013 | Cookbooks Enterprise Articles

Basic Security Approaches, provides recipes on best practices for login management, storing credentials, and use of third party JavaScript encryption libraries.

In this article by Benjamin Bahrenburg the author of book Appcelerator Titanium Business Application Development Cookbook,will cover:

  • Implementing iOS data protection in Titanium
  • AES encryption using JavaScript
  • Basic authentication using Ti.Network.HTTPClient
  • Implementing a cross-platform passcode screen
  • Working with protected ZIP files on iOS
Read Basic Security Approaches in full

Basic Editing

by Joachim Ziebs | February 2013 | Web Graphics & Video

In this article by Joachim Ziebs, author of AfterShot Pro: Non-destructive photo editing and management , we will perform some basic editing:

  • Basic adjustments

  • Sharpening

  • Cropping

  • Tonal adjustments

  • Conversion to black and white

  • Straightening

Read Basic Editing in full

Basic Doctest in Python

by Daniel Arbuckle | January 2010 | Open Source

In this article by Daniel Arbuckle, we shall:

  • Learn the doctest language and syntax
  • Write doctests embedded in text files
Read Basic Doctest in Python in full

Basic Dijit Knowledge in Dojo

by Peter Svensson | December 2008 | AJAX Open Source

In this article by Peter Svensson, we will have a look at Dijit or Dojo Widget which is an instance of a Dojo class that lives in the page and usually has a DOM node associated with it. Examples are FloatingPane, Tree, NumberSpinner, and ValidationtextBox.

The basic premise of a Dijit is that you should be able to create any number of widgets of the same type on the same page, regardless of where on the page you choose to put them. Certain Dijits have special requirements, naturally, such as the Layout Containers, which assume that they are surrounding ContentPane Dijits.

In general, Dijits are very versatile and much time has been spent to assure portability and modularization of the Dijit system. Best of all, this is accessible to you as a developer as well.

Read Basic Dijit Knowledge in Dojo in full

Basic Concepts and Architecture of Cassandra

by Vijay Parthasarathy | November 2013 | Open Source Web Development

This article has been created by Vijay Parthasarathy, the author of Learning Cassandra for Administrators. The Apache Cassandra database is a linearly scalable and highly available distributed data store which doesn't compromise on performance and runs on commodity hardware. Cassandra's support for replicating across multiple datacenters / multiple discrete environments is the best in the industry. Cassandra provides high throughput with low latency without any single point of failure on commodity hardware.

Cassandra was inspired by the two papers published by Google (BigTable) in 2006 and Amazon (Dynamo) in 2007, after which Cassandra added more features. Cassandra is different from most of the NoSQL solutions in a lot of ways: the core assumption of most of the distributed NoSQL solutions is that Mean Time Between Failures (MTBF) of the whole system becomes negligible when the failures of individual nodes are independent, thus resulting in a highly reliable system.

 

Read Basic Concepts and Architecture of Cassandra in full

Basic Concepts

by Krishna Kumar | October 2013 | Open Source

This article by Krishna Kumar, the author of book Learning Physics Modeling with PhysX, provides an overview of the concepts that we use in PhysX. It will familiarize you with terms such as scene, actor, material, shape, and so on.

The topics covered in this article are as follows:

  • Initializing PhysX and creating the scene and actors
  • Creating shapes and materials and then assigning them to actors
  • Simulating and then shutting down PhysX
Read Basic Concepts in full

Basic Coding with HornetQ: Creating and Consuming Messages

by Piero Giacomelli | November 2012 | JBoss Java Open Source

Exchanging information in the form of short messages is becoming more and more important, so frameworks for doing this will be a key factor in software development. Messages and information can be exchanged at exponential speed with JBoss HornetQ asynchronous messaging middleware.

In this article by Piero Giacomelli, author of HornetQ Messaging Developer’s Guide, we will cover the following topics::

  • Installing Eclipse and NetBeans for developing with HornetQ on both Windows and Ubuntu
  • Setting up a development environment for working with HornetQ core API in Eclipse and NetBeans
  • Creating an example for producing and consuming messages in HornetQ in both a synchronous and an asynchronous way
  • Implementing some classes using the performance practice for managing core API connections, sessions, and clients
Read Basic Coding with HornetQ: Creating and Consuming Messages in full

Bar Reports in Zabbix 1.8

by Rihards Olups | April 2010 | Networking & Telephony

In this article by Rihards Olups, author of Zabbix 1.8 Network Monitoring, we will discuss the heavily configurable bar reports in detail.

Read Bar Reports in Zabbix 1.8 in full

Backup in PostgreSQL 9

by Simon Riggs | October 2010 | Open Source

In this article by Simon Riggs, author of PostgreSQL 9 Administration Cookbook, we will cover the following:

  • Understanding and controlling crash recovery
  • Planning backups
  • Hot logical backup of one database
  • Hot logical backup of all databases
  • Hot logical backup of all tables in a tablespace
  • Backup of database object definitions
  • Standalone hot physical database backup
  • Hot physical backup & Continuous Archiving
Read Backup in PostgreSQL 9 in full

BackTrack Forensics

by David De Smet Willie L. Pritchett | March 2013 | Cookbooks Networking & Telephony Open Source

Computer forensics involves using various means to analyze, report, and recover information from computers or digital storage media, generally for legal purposes. The outcome in general is to provide the information gathered in such a way that it is useful for the person requesting the information. This includes the recovery of passwords, analyzing computer break-ins or attempts, recovering data from a hard drive after it's been "erased", and so on. In the article by Willie Pritchett and David De Smet authors of BackTrack 5 Cookbook we will examine how BackTrack can be utilized for forensic purposes.

In this article, we will cover:

  • Intrusion detection and log analysis

  • Recursive directory encryption/decryption

  • Scanning for signs of rootkits

  • Recovering data from a problematic source

  • Retrieving a Windows password

  • Resetting a Windows password

  • Looking at the Windows registry entries

Read BackTrack Forensics in full

BackTrack 5: Attacking the Client

by Vivek Ramachandran | September 2011 | Beginner's Guides Open Source

In this article by Vivek Ramachandran, author of BackTrack 5 Wireless Penetration Testing Beginner’s Guide, we will focus on attacking the client. Most people exclude the client from their list when they think about WLAN security. This article will prove beyond doubt why the client is just as important as the access point when penetrating testing a WLAN network. The client can be either a connected or isolated un-associated client. We will look at various attacks, which can be used to target the client.

We will cover the following:

  • Honeypot and Mis-Association attacks
  • Caffe Latte attack
  • De-Authenticaton and Dis-Association attacks
  • Hirte attack
  • AP-less WPA-Personal cracking
Read BackTrack 5: Attacking the Client in full

BackTrack 5: Advanced WLAN Attacks

by Vivek Ramachandran | September 2011 | Linux Servers Open Source

Wireless Networks have become ubiquitous in today's world. Millions of people use them worldwide every day at their homes, offices, and public hotspots to log on to the Internet and do both personal and professional work.

In this article by Vivek Ramachandran, author of BackTrack 5 Wireless Penetration Testing Beginner’s Guide, we will look at how we can conduct advanced attacks. We will primarily focus on Man-in-the-Middle (MITM) attack, which requires a certain amount of skill and practice to conduct successfully. Once we have done this, we will use this MITM attack as a base to conduct more sophisticated attacks such as Eavesdropping and Session Hijacking.

We will cover the following:

  • Man-in-the-Middle attack
  • Wireless Eavesdropping using MITM
  • Session Hijacking using MITM
Read BackTrack 5: Advanced WLAN Attacks in full

BackTrack 4: Target Scoping

by Shakeel Ali Tedi Heriyanto | April 2011 | Linux Servers Open Source

This article by Shakeel Ali and Tedi Heriyanto, authors of BackTrack 4: Assuring Security by Penetration Testing, covers a scope process to provide necessary guidelines on formalizing the test requirements. A scope process will introduce and describe each factor that builds a practical roadmap towards test execution. This process integrates several key elements, such as gathering client requirements, preparing a test plan, profiling test boundaries, defining business objectives, and project management and scheduling. You will learn to acquire and manage the information about the target's test environment.

Read BackTrack 4: Target Scoping in full
Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Resources
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software