|
|||
With the latest updates and revised study material, this second edition of the Certified Information Systems Auditor Study Guide provides an excellent starting point for your CISA certification preparation. The book strengthens your grip on the core concepts through a three-step approach. First, it presents the fundamentals with easy-to-understand theoretical explanations. Next, it provides a list of key aspects that are crucial from the CISA exam perspective, ensuring you focus on important pointers for the exam. Finally, the book makes you an expert in specific topics by engaging you with self-assessment questions designed to align with the exam format, challenging you to apply your knowledge and sharpen your understanding. Moreover, the book comes with lifetime access to supplementary resources on an online platform, including CISA flashcards, practice questions, and valuable exam tips. With unlimited access to the website, you’ll have the flexibility to practice as many times as you desire, maximizing your exam readiness. By the end of this book, you’ll have developed the proficiency to successfully obtain the CISA certification and significantly upgrade your auditing career. |
|
|||
"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russian and Ukrainian history." — Anne Applebaum, bestselling author of Twilight of Democracy The true story of the most devastating act of cyberwarfare in history and the desperate hunt to identify and track the elite Russian agents behind it: "[A] chilling account of a Kremlin-led cyberattack, a new front in global conflict" ( Financial Times ). In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented ten billion dollars in damage—the largest, most destructive cyberattack the world had ever seen. The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in history: a group known as Sandworm. Working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike. A chilling, globe-spanning detective story, Sandworm considers the danger this force poses to our national security and stability. As the Kremlin's role in foreign government manipulation comes into greater focus, Sandworm exposes the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield. It reveals how the lines between digital and physical conflict, between wartime and peacetime, have begun to blur—with world-shaking implications. |
|
|||
This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers. If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the tools and techniques you'll need to take control of a Linux environment. First, you'll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you'll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You'll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to: - Cover your tracks by changing your network information and manipulating the rsyslog logging utility - Write a tool to scan for network connections, and connect and listen to wireless networks - Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email - Write a bash script to scan open ports for potential targets - Use and abuse services like MySQL, Apache web server, and OpenSSH - Build your own hacking tools, such as a remote video spy camera and a password cracker Hacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers ? |
|
|||
À mi-chemin entre Santa Barbara et Los Angeles, Ventura est une station touristique au charme désuet. Apple n’aurait pu trouver une localité plus appropriée pour baptiser la dix-neuvième version de son système d’exploitation : macOS Ventura semble aussi coincée et gênée que cette ville encaissée au fond d’une vallée. La convergence avec l’iPad a relancé le développement d’une plateforme qui était passée au second plan, mais sacrifie quelques-unes des spécificités qui ont fait la réputation du Mac. La disparition des Préférences Système, présente depuis la toute première version de macOS, concentre les pires travers de cette approche. Les centaines de paramètres du système ont été casés au chaussepied dans la nouvelle application Réglages Système, fortement inspirée de l’application Réglages d’iPadOS, qui abandonne les sections et les onglets au profit de listes interminables. Les options semblent avoir été réparties au petit bonheur la chance, les boutons et les listes ne sont pas loin d’être invisibles, et certaines fonctions sont cachées dans des fenêtres modales. À l’inverse, Stage Manager représente le meilleur de cette grande réflexion sur les principes de l’informatique personnelle. Apporte-t-il la logique de l’iPad à la gestion des fenêtres sur macOS, ou bien la logique du Mac à la gestion des fenêtres sur iPadOS ? Qu’importe ! Cette sorte de Mission Control permanent offre une nouvelle manière de travailler, moins rigide que le plein écran et moins chaotique que les fenêtres volantes, sans renier ni l’une ni l’autre. C’est une proposition intrigante, qui pourrait bien résoudre les frustrations de certains utilisateurs, sans pour autant s’imposer aux autres. Apple continue son grand travail de rapprochement, pour le meilleur comme pour le pire. Siri et Spotlight adoptent la même interface que sur iPadOS, mais perdent quelques fonctions au passage, comme les interactions avec le Finder. L’iPhone peut maintenant être utilisé comme une webcam, ce qui ne fait que rappeler à quel point le capteur intégré est médiocre. Mais ne boudons pas notre plaisir : la possibilité de partager sa photothèque, l’amélioration continue des applications Notes et Rappels, l’arrivée des applications Météo et Horloge, ou encore la refonte de l’application Maison, sont fort bienvenues. Reste que les ingénieurs de la firme de Cupertino semblent tiraillés en tous sens. Comment pourraient-ils continuer à pousser le raffinement de l’interface de macOS au plus haut degré, quand ils doivent aussi soutenir l’iPhone et muscler l’iPad, défricher le terrain de l’informatique vestimentaire et inventer le futur de la réalité augmentée ? La puissance des puces Apple Silicon magnifie la moindre imperfection du logiciel, et la folle cadence annuelle empêche d’apporter les corrections nécessaires. Voilà pourquoi ce guide n’a jamais été aussi important : les règles séculaires de conception des interfaces sont de moins en moins respectées, les fonctions sont de plus en plus cachées, les réglages sont de plus en plus complexes. Il faut s’armer d’une carte pour explorer le territoire de macOS, qui n’a jamais été autant semé d’embuches, mais qui n’a jamais autant recelé de surprises. J’espère que cette sixième édition entièrement consacrée à macOS Ventura saura vous guider. Bonne lecture ! |
|
|||
Dès lors que vous faites l’acquisition d’un appareil Apple (iPhone, iPad, iMac, MacBook, etc.), il vous est proposé lors du premier démarrage de celui-ci de fournir vos identifiants de connexion iCloud ou bien de créer un compte. Objectif : vous permettre tout à la fois de mettre vos précieuses données personnelles à l’abri et de les synchroniser sur tous vos appareils, qu’il s’agisse de vos mails, photos, vidéos, contacts, notes, mots de passe, etc.  Aujourd’hui, utiliser le cloud pour simplifier la gestion de ses fichiers et données est devenue une telle évidence que bon nombre d’utilisateurs stockent leurs données dans un cloud sans même s’en rendre compte.  Si le service s’avère fort pratique, son fonctionnement doit, comme toujours, être maîtrisé afin d’éviter toute déconvenue, du vol à la perte de données sensibles.  Compétence Mac vous propose un copieux guide pratique sur le sujet afin de profiter de tous les avantages du cloud, qu’il s’agisse de l’outil intégré iCloud d’Apple ou des autres services en ligne disponibles, tels que DropBox, IceDrive, Infomaniak, WeTransfer ou encore Smash.  Bonne découverte ! |
|
|||
Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire—why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited. Networks and systems can be hacked, but they can also be protected; when the “system” in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer’s bag of tricks. Examine the most common social engineering tricks used to gain access Discover which popular techniques generally don’t work in the real world Examine how our understanding of the science behind emotions and decisions can be used by social engineers Learn how social engineering factors into some of the biggest recent headlines Learn how to use these skills as a professional social engineer and secure your company Adopt effective counter-measures to keep hackers at bay By working from the social engineer’s playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts. Social Engineering gives you the inside information you need to mount an unshakeable defense. |
|
|||
Que vous veniez de faire l’acquisition d’un nouveau Mac ou que vous souhaitiez mettre à niveau le système d’exploitation de votre ordinateur actuel, ce nouveau livre signé Compétence Mac est fait pour vous. Proposé gratuitement au téléchargement ou déjà installé sur votre Mac flambant neuf, macOS 14 Sonoma (mise à jour 14.4 incluse) remplace l’ancien système d’exploitation macOS 13 Ventura. Chaque nouvelle mouture de macOS est l’occasion pour Apple de proposer de nouvelles fonctionnalités à son système d’exploitation, d’améliorer la sécurité face aux menaces venant de l’extérieur et enfin de corriger des dysfonctionnements liés aux logiciels ou aux matériels. Cette année encore, la nouvelle version du système d’exploitation macOS 14 Sonoma (mise à jour 14.4 incluse) ne déroge pas à la règle en apportant une myriade d’évolutions en tous genres. Parmi celles-ci, notons la personnalisation de l’arrière-plan du bureau, le retour en force des widgets qui deviennent désormais interactifs, le tout nouveau mode En veille, des appels par visioconférences également interactifs et dynamiques, une kyrielle de nouvelles options dans Safari, notamment concernant la navigation privée et la sécurité en ligne, un module de partage d’écran très qualitatif et ultra performant, une optimisation du système pour le jeu vidéo, le partage simplifié des mots de passe entre personnes de confiance, une application Messages remplies de nouvelles fonctionnalités, une meilleure protection de la confidentialité de vos données, et également une panoplie complète de nouveaux économiseurs d’écran. Impossible de lister ici de manière exhaustive l’ensemble des nouveautés, mais vous le constatez par vous-même : cette nouvelle version recèle un grand nombre de nouvelles fonctions et options fort appréciables au quotidien. Ce volume 2 se consacre principalement aux fonctions avancées de macOS 14 Sonoma (mise à jour 14.4 incluse). Bonne lecture ! |
|
|||
Auparavant, une fois un Mac acheté, il vous fallait installer de nombreuses applications, souvent payantes, afin de profiter pleinement de l’usage de votre ordinateur. Désormais, le web regorge d’applications disponibles en ligne présentant un double avantage. D’une part, une grande partie de ces logiciels, nommées webapps, sont gratuits. D’autre part, ils ne nécessitent aucune installation préalable. Dans certains cas, la création d’un compte en ligne n’est même pas requise. Pourquoi s’en priver ?  Cet ebook de Compétence Mac rassemble ainsi plus d’une soixantaine d’applis et de services en ligne gratuits sélectionnés pour leurs qualités fonctionnelles. Ils sont classés en deux catégories : Au quotidien et Loisirs. À vous la possibilité de traduire un document entier en un temps record, rédiger et mettre en forme un texte, retranscrire un fichier audio en texte, scanner son disque dur à distance, organiser son prochain voyage, télécharger des livres anciens, retoucher vos photos d’un simple clic, ou encore apprendre à jouer d’un instrument ou réaliser le plan en trois dimensions d’une pièce, de votre appartement ou de votre future maison. Bonne découverte ! |
|
|||
The smart guide to your smartphone—updated for the latest iOS and iPhone releases Fully updated to cover the newest features of iOS and the latest iPhone models, iPhone For Dummies helps you keep in touch with family and friends, take pictures, play games, follow the news, stream music and video, get a little work done, and just about everything else. This user-friendly guide walks you through the basics of calling, texting, FaceTiming, and discovering all the cool things your iPhone can do. You’ll benefit from the insight of a longtime Apple expert on how to make the most of your new (or old) iPhone and its features. These wildly popular devices get more useful all the time. Find out what’s in store for you with Apple’s latest releases—even if you’ve never owned an iPhone before. Discover the features of the latest iOS release and iPhone models Customize your settings and keep your phone secure Make the most of your camera and shoot high-quality videos Find little-known utilities and apps that will make your life easier iPhone For Dummies is the one-stop-shop for information on getting the most out of your new iPhone. New and inexperienced iPhone users will love this book. |
|
|||
The Internet's "killer app" is not the World Wide Web or Push technologies: it is humble electronic mail. More people use email than any other Internet application. As the number of email users swells, and as email takes on an ever greater role in personal and business communication, Internet mail protocols have become not just an enabling technology for messaging, but a programming interface on top of which core applications are built. Programming Internet Email unmasks the Internet Mail System and shows how a loose federation of connected networks have combined to form the world's largest and most heavily trafficked message system. Programming Internet Email tames the Internet's most popular messaging service. For programmers building applications on top of email capabilities, and power users trying to get under the hood of their own email systems, Programming Internet Email stands out as an essential guide and reference book. In typical O'Reilly fashion, Programming Internet Email covers the topic with nineteen tightly written chapters and five useful appendixes.Following a thorough introduction to the Internet Mail System, the book is divided into five parts: Part I covers email formats, from basic text messages to the guts of MIME. Secure email message formats (OpenPGP and S/MIME), mailbox formats and other commonly used formats are detailed in this reference section.Part II describes Internet email protocols: SMTP and ESMTP, POP3 and IMAP4. Each protocol is covered in detail to expose the Internet Mail System's inner workings.Part III provides a solid API reference for programmers working in Perl and Java. Class references are given for commonly used Perl modules that relate to email and the Java Mail API.Part IV provides clear and concise examples of how to incorporate email capabilities into your applications. Examples are given in both Perl and Java.Part V covers the future of email on the Internet. Means and methods for controlling spam email and newly proposed Internet mail protocols are discussed.Appendixes to Programming Internet Email provide a host of explanatory information and useful references for the programmer and avid user alike, including a comprehensive list of Internet RFCs relating to email, MIME types and a list of email related URLs. Programming Internet Email will answer all of your questions about mail and extend your abilities into this most popular messaging frontier. |
|
|||
*** Version 5: updated for macOS Big Sur *** macOS Catalina changes the default shell from bash to zsh. zsh will succeed bash as the default shell. bash has been the default shell in Mac OS X Terminal since the introduction of Mac OS X 10.3 Panther in 2003. Like many other Mac users, I have been using bash as the main shell for the last 16 years. In this book, I will document my experiences moving bash settings, configurations and scripts over to zsh.  This books explains - why Apple is changing the shell - implications for infrequent and expert Terminal users - how to move from bash to zsh - configuring zsh to be more productive - moving scripts from bash to zsh This books is based on and expands the successful blog post series on scriptingosx.com, scripting classes and presentations. All the topics will be illustrated with lots of useful examples and practical applications. |
|
|||
Vous avez sous les yeux l’édition 2023-2024 des nouveautés d’iOS (mise à jour avec iOS 17.4 incluse). Dans cette version dédiée à iOS 17, vous trouverez de nombreuses descriptions des nouvelles fonctions, et la manière de les mettre en œuvre. Certaines annonces, comme l’application Journal ou AirDrop à distance, sont prévues pour la fin de l’année. Cet ouvrage sera régulièrement mis à jour afin que vous ayez entre les mains un condensé presque exhaustif des nouvelles possibilités de votre appareil. Si vous avez récemment fait l’acquisition d’un iPhone 15, rendez-vous à notre chapitre consacré aux nouveautés spécifiques de cette gamme avec iOS 17 (mise à jour avec iOS 17.4 incluse). À présent, bonne découverte des nouveautés d’iOS et d’iPadOS ! |
|
|||
What will you learn from this book? Head First Java is a complete learning experience in Java and object-oriented programming. With this book, you'll learn the Java language with a unique method that goes beyond how-to manuals and helps you become a great programmer. Through puzzles, mysteries, and soul-searching interviews with famous Java objects, you'll quickly get up to speed on Java's fundamentals and advanced topics including lambdas, streams, generics, threading, networking, and the dreaded desktop GUI. If you have experience with another programming language, Head First Java will engage your brain with more modern approaches to coding--the sleeker, faster, and easier to read, write, and maintain Java of today. What's so special about this book? If you've read a Head First book, you know what to expect--a visually rich format designed for the way your brain works. If you haven't, you're in for a treat. With Head First Java , you'll learn Java through a multisensory experience that engages your mind, rather than by means of a text-heavy approach that puts you to sleep. |
|
|||
In my first few years as a developer I assumed that hard work was all I needed. Then I was passed over for a promotion and my manager couldn’t give me feedback on what areas to improve, so I could get to the senior engineer level. I was frustrated; even bitter: not as much about missing the promotion, but because of the lack of guidance. By the time I became a manager, I was determined to support engineers reporting to me with the kind of feedback and support I wish I would have gotten years earlier. And I did. While my team tripled over the next two years, people became visibly better engineers, and this progression was clear from performance reviews and promotions. This book is a summary of the advice I’ve given to software engineers over the years – and then some more. This book follows the structure of a “typical” career path for a software engineer, from starting out as a fresh-faced software developer, through being a role model senior/lead, all the way to the staff/principle/distinguished level. It summarizes what I’ve learned as a developer and how I’ve approached coaching engineers at different stages of their careers. We cover “soft” skills which become increasingly important as your seniority increases, and the “hard” parts of the job, like software engineering concepts and approaches which help you grow professionally. The names of levels and their expectations can – and do! – vary across companies. The higher “tier” a business is, the more tends to be expected of engineers, compared to lower tier places. For example, the “senior engineer” level has notoriously high expectations at. Google (L5 level) and Meta (E5 level,) compared to lower-tier companies. If you work at a higher-tier business, it may be useful to read the chapters about higher levels, and not only the level you’re currently interested in. The book is composed of six standalone parts, each made up of several chapters: Part 1: Developer Career Fundamentals Part 2: The Competent Software Developer Part 3: The Well-Rounded Senior Engineer Part 4: The Pragmatic Tech Lead Part 5: Role Model Staff and Principal Engineers Part 6: Conclusion Parts 1 and 6 apply to all engineering levels, from entry-level software developer, to principal-and-above engineer. Parts 2, 3, 4, and 5 cover increasingly senior engineering levels and group together topics in chapters, such as “Software Engineering,” “Collaboration,” “Getting Things Done,” etc. Naming and levels vary, but the principles of what makes a great engineer who is impactful at the individual, team, and organizational levels, are remarkably constant. No matter where you are in your career, I hope this book provides a fresh perspective and new ideas on how to grow as an engineer. Praise for the book “From performance reviews to P95 latency, from team dynamics to testing, Gergely demystifies all aspects of a software career. This book is well named: it really does feel like the missing guidebook for the whole industry.” – Tanya Reilly, senior principal engineer and author of The Staff Engineer's Path "Spanning a huge range of topics from technical to social in a concise manner, this belongs on the desk of any software engineer looking to grow their impact and their career. You'll reach for it again and again for sage advice in any situation." – James Stanier, Director of Engineering at Shopify, author of TheEngineeringManager.com |
|
|||
Amazon's Best History Book of the Month for July 2023 An invaluable guide to understanding how the internet has broken our brains—and what we can do to fix it.   The original internet was not designed to make us upset, distracted, confused, and outraged. But something unexpected happened at the turn of the last decade, when a handful of small features were quietly launched at social media companies with little fanfare. Together, they triggered a cascading set of dramatic changes to how media, politics, and society itself operate—inadvertently creating an Outrage Machine we cannot ignore. Author, designer, and media researcher Tobias Rose-Stockwell shares the defining shifts caused by these technologies, and how they have ignited a society-wide crisis of trust. Drawing from cutting-edge research and vivid personal anecdotes, Rose-Stockwell illustrates how social media has bound us to an unprecedented system of public performance, training us to react rather than reflect, and attack rather than debate. Outrage Machine reveals the triggers and tactics used to exploit our anger, unpacking how these tools hack our deep tribal instincts and psychological vulnerabilities, and how they have become opportunistic platforms for authoritarians and a threat to democratic norms everywhere. But this book is not just about the problem. In a story spanning continents and generations, Rose-Stockwell explores how every new media technology disrupts our ability to make sense of the world, from the printing press to the telegraph, from radio to television. Outrage Machine situates social media within a historical cycle of confusion, violence, and emerging tolerance. Using clear language and powerful illustrations, this book reveals the magnitude of the challenges we face, while offering realistic solutions and a promising pathway out. |
|
|||
A well designed, well written animated film has warmth, humor and charm. Since Steamboat Mickey, animators have been creating characters and films that are charming, warm and humorous, allowing people to connect with the animated medium. Animaton fans love the characters for a lifetime. This is the legacy of the countless animators and artists who created the classic characters and fun stories and the legacy of Disney Legend, Floyd Norman.  Written with wit and verve, Animated Life is a guided tour through an entire lifetime of techniques, practical hands-on advice and insight into an entire industry. A vital tutorial in animation's past, present and future for students who are now poised to be part of another new generation in the art form. Apply artistic magic to your own projects and garner valuable insight and inspiration from a True Disney legend. With valuable advice, critical comment, and inspiration for every student of the arts, Animated Life is a classic in the making with completely relevant techniques and tools for the contemporary animation or fine arts professional. |
|
|||
Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for the CCST Networking 100-150 exam. Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, Cisco Certified Support Technician CCST Networking 100-150 Official Cert Guide helps you master the concepts and techniques that ensure your exam success and is the only self-study resource approved by Cisco. Leading Cisco technology expert and best-selling author Russ White shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. This complete study package includes A test-preparation routine proven to help you pass the exam Do I Know This Already? quizzes, which allow you to decide how much time you need to spend on each section Exam Topic lists that make referencing easy Chapter-ending exercises, which help you drill on key concepts you must know thoroughly The powerful Pearson Test Prep Practice Test software, complete with hundreds of well-reviewed, exam-realistic questions, customization options, and detailed performance reports More than 5 hours of video mentoring from the author An online Flash Cards application to help you drill on Key Terms by chapter A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies Study plan suggestions and templates to help you organize and optimize your study time Content Update Program: This Cert Guide includes coverage of all the topics on the Cisco Certified Support Technician CCST Networking exam from the original exam blueprint. Visit ciscopress.com/newcerts for information on any digital updates for this book that align to Cisco exam blueprint version changes. The Cisco Certified Support Technician CCST Networking 100-150 Official Cert Guide walks you through all the exam topics found in the Cisco CCST exam. Topics covered include Standards and Concepts Addressing and Subnet Formats Endpoints and Media Types Infrastructure Diagnosing Problems Security Companion Website: The companion website contains more than 200 unique practice exam questions, practice exercises, a study planner, online flash cards, and more than 5 hours of video training. Pearson Test Prep online system requirements: Browsers: Chrome version 73 and above, Safari version 12 and above, Microsoft Edge 44 and above. Devices: Desktop and laptop computers, tablets running Android v8.0 and above or iPadOS v13 and above, smartphones running Android v8.0 and above or iOS v13 and above with a minimum screen size of 4.7”. Internet access required. Pearson Test Prep offline system requirements: Windows 11, Windows 10, Windows 8.1; Microsoft .NET Framework 4.5 Client; Pentium-class 1 GHz processor (or equivalent); 512 MB RAM; 650 MB disk space plus 50 MB for each downloaded practice exam; access to the Internet to register and download exam databases |
|
|||
В этой книге знаменитый Стив Круг, автор мирового бестселлера «Не заставляйте меня думать» (Don't Make Me Think: A Common Sense Approach to Web Usability), излагает принципы своего метода по улучшению юзабилити интернет-сайтов. В присущей ему ироничной манере автор описывает процесс тестирования и обнаружения проблем с юзабилити, а также их эффективного устранения. С помощью этой оригинальной как по форме, так и по содержанию книги вы научитесь оценивать удобство и функциональность любого сайта, вне зависимости от стадии его разработки. Автор объясняет, как концентрироваться на наиболее серьезных проблемах юзабилити и как быстро и эффективно их устранять. Книга предназначена для веб-дизайнеров, веб-программистов, менеджеров интернет-проектов и всех интересующихся вопросами юзабилити и дизайна интерфейсов. |
|
|||
What will you learn from this book? Want to learn the Python language without slogging your way through how-to manuals? With Head First Python , you'll quickly grasp Python's fundamentals by working with built-in data structures and functions. You'll build your very own web app, which—once it's ready for prime time—runs in the cloud. You'll learn how to wrangle data with Python, scrape data from the web, feed data to pandas, and interact with databases. This third edition is a complete learning experience that will help you become a bona fide Python programmer in no time. What's so special about this book? If you've read a Head First book, you know what to expect: a visually rich format designed for the way your brain works. If you haven't, you're in for a treat. With this book, you'll learn Python through a multisensory experience that engages your mind—rather than a text-heavy approach that puts you to sleep. |
|
|||
The book is the Who, What, When, Where, How and, very importantly, Why of Engineering Document Control with related "metadata" management and includes a comprehensive software guide, and free Access based DC software tool (time limited) with examples and drills etc. |
|
|||
Après des années à utiliser HomeKit, j’ai profité d’un déménagement pour vérifier si l’herbe n’était pas plus verte ailleurs. Lassé des limites de la domotique d’Apple et du manque d’évolutions de l’application Maison, j’ai tenté ma chance avec Home Assistant, une solution open source concurrente qui s’installe sur un ordinateur chez soi et qui peut remplacer entièrement HomeKit, Google Home et les autres. Après quelques mois, je suis ravi de mon choix et réconcilié avec la domotique, que j’automatise de plus en plus. Est-ce toutefois la solution faite pour vous ? Comment fonctionne-t-elle ? C’est ce que nous verrons ensemble dans ce livre qui se veut aussi pratique possible, avec des explications complètes sur Home Assistant, de son installation initiale aux automatisations les plus complexes, en passant par la connexion des appareils connectés et la création des tableaux de bord pour les contrôler.  Bonne lecture ! |
|
|||
Tracy Kidder's "riveting" ( Washington Post ) story of one company's efforts to bring a new microcomputer to market won both the Pulitzer Prize and the National Book Award and has become essential reading for understanding the history of the American tech industry. Computers have changed since 1981, when The Soul of a New Machine first examined the culture of the computer revolution. What has not changed is the feverish pace of the high-tech industry, the go-for-broke approach to business that has caused so many computer companies to win big (or go belly up), and the cult of pursuing mind-bending technological innovations. The Soul of a New Machine is an essential chapter in the history of the machine that revolutionized the world in the twentieth century. "Fascinating...A surprisingly gripping account of people at work." -- Wall Street Journal |
|
|||
For years, companies have rewarded their most effective engineers with management positions. But treating management as the default path for an engineer with leadership ability doesn't serve the industry well--or the engineer. The staff engineer's path allows engineers to contribute at a high level as role models, driving big projects, determining technical strategy, and raising everyone's skills. This in-depth book shows you how to understand your role, manage your time, master strategic thinking, and set the standard for technical work. You'll read about how to be a leader without direct authority, how to plan ahead to make the right technical decisions, and how to make everyone around you better, while still growing as an expert in your domain. By exploring the three pillars of a staff engineer's job, Tanya Reilly, a veteran of the staff engineer track, shows you how to: Take a broad, strategic view when thinking about your workDive into practical tactics for making projects succeedDetermine what "good engineering" means in your organization |
|
|||
An inspiring, comprehensive, step-by-step guide to creating a hit show, So You Want to Start a Podcast covers everything from hosting and guest booking to editing and marketing - while offering plenty of encouragement and insider stories along the way. Though they are the fastest-growing form of media, podcasts can actually be tricky to create—and even harder to sustain. Few know the secrets of successfully creating a knockout podcast better than Kristen Meinzer. An award-winning commentator, producer, and former director of nonfiction programming for Slate’s sister company, Panoply, Meinzer has also hosted three successful podcasts, reaching more than ten million listeners. Now, she shares her expertise, providing aspiring podcasters with crucial information and guidance to work smarter, not harder as they start their own audio forum. Meinzer believes that we each have a unique voice that deserves to be heard. But many of us may need some help transforming our ideas into reality. So You Want to Start a Podcast asks the tough but important questions to help budding podcasters define and achieve their goals, including: Why do you want to start a podcast? Think about specifically why you want to start a podcast versus a blog, zine, YouTube channel, Instagram feed, or other media outlet. Find out if a podcast is really the best way to tell your story—and what you really need (and don’t need!) in order to get started. What is your show about? For any advertiser, corporate partner, or press outlet, you need a snappy pitch. How would you describe what you want to do in two to three sentences? Who is your podcast for? Who are you trying to reach? How will your content and tone appeal to those listeners? How is your show going to be structured? Create a step-by-step map planning the show out. Think about length, segments, interviews, advice, news reads, and other aspects of successful podcasts you can adapt for your own. With this motivational how-to guide—the only one on the subject available—you’ll find the smart, bottom-line advice and inspiration you need to produce an entertaining and informative podcast and promote it to an audience that will love it. So You Want to Start a Podcast gives you the tools you need to start a podcast—and the insight to keep it thriving! |
|
|||
Classroom-tested by tens of thousands of students, this new edition of the bestselling intro to programming book is for anyone who wants to understand computer science. Learn about design, algorithms, testing, and debugging. Discover the fundamentals of programming with Python 3.6--a language that's used in millions of devices. Write programs to solve real-world problems, and come away with everything you need to produce quality code. This edition has been updated to use the new language features in Python 3.6. |