Latest Articles

Acting as a proxy (HttpProxyModule)

by Usama Dar | December 2013 | Open Source

This article written by Usama Dar, the author of Nginx Module Extension, is a reference to the standard and optional HTTP modules, their synopsis, directives as well as practical configuration examples.

 

Read Acting as a proxy (HttpProxyModule) in full

Creating Identity and Resource Pools

by Farhan Ahmed Nadeem Prasenjit Sarkar | December 2013 | Architecture & Analysis Enterprise Articles Networking & Telephony

This article, created by Farhan Ahmed Nadeem and Prasenjit Sarkar, the authors of Implementing Cisco UCS Solutions, introduces identity and resource pools which include UUID, MAC addresses, WWN, and server pools.

The list of topics that will be covered in the article is as follows:

  • Understanding identity and resource pools
  • Learning to create a UUID pool
  • Learning to create a MAC pool
  • Learning to create a WWNN pool
  • Learning to create a WWPN pool
  • Understanding the server pool
  • Learning to create server pool membership and qualification policies
Read Creating Identity and Resource Pools in full

Social Engineering Attacks

by Rahul Singh Patel | December 2013 | Open Source Web Development

This article, written by Rahul Singh Patel, author of the book Kali Linux Social Engineering, introduces social engineering and attacks that currently the industry is facing in the form of e-mail, Advance Persistent Threats (APT).

Social refers to our day-to-day lives, which include both personal and professional aspects; while engineering means a defined way of performing a task by following certain steps to achieving the target. Social engineering is a term that describes a nontechnical intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures.

Read Social Engineering Attacks in full

Getting Started with Fusion Applications

by Faisal Ghadially Kalpit Parikh | December 2013 | Enterprise Articles Oracle

This article by Faisal Ghadially and Kalpit Parikh, the authors of Oracle Fusion Applications Administration Essentials, provides an architectural overview and an introduction to the technical components of Oracle Fusion Applications.

Read Getting Started with Fusion Applications in full

Planning a character's look

by Igor Uduslivii | December 2013 | Games Open Source

In this article by Igor Uduslivii author of iPhone Game Blueprints we will design how a game character will appear. Game worlds have become larger and give players plenty more adventure experiences. The heightened pictorial look of the characters increases players' empathy toward their avatars, generating greater feelings of exciting.

Read Planning a character's look in full
Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Resources
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software