packt publishing PDF: 1 to 10 of 100 results fetched - page 1 [an]

C++17 By Example: Practical projects to get you up and running with C++17
Discover the impressive capabilities of C++ and learn the skills you need to implement it in real lifeKey Features
  • Leverage the power of C++ language constructs to build effective software
  • Learn about file handling and pointers
  • Build visually appealing GUI by using the power of Qt5
  • Get a deeper understanding of how to program C++ for a specific purpose by implementing a Domain Specific Language
Book DescriptionC++ is a general-purpose programming language built with a bias towards embedded programming and systems programming. Over the years, C++ has evolved and is used to develop software for many different sectors. Given its versatility and robustness, C++is a wonderful language to start your coding journey with. This book covers exciting projects built in C++ that show how to implement the language in different scenarios. While developing these projects, you will not only learn the language constructs but also how you can use C++ to meet your software requirements.The book starts with a brief introduction to C++ language constructs where you will learn essential concepts that are required to understand the projects covered in the book. The first module will build a library management system that will teach you how to perform efficient file handling and use pointers in your software. To give you a taste of GUI programming, the next module will build graphical applications using Qt 5. You will then be introduced to game design in C++ and build two interesting games. The final module will teach you how C++ can be used to create a Domain Specific Language. After reading this book, you will have mastered core programming concepts in C++, and how to implement them effectively.What you will learn
  • Create object-oriented hierarchies and how to compile, link, and execute a simple program
  • Implement classes with linked lists, templates, inheritance, operator overloading, and exception handling
  • Efficient file handling and pointer structures
  • Dynamic allocation and deallocation along with marshmallowing
  • Qt features, including menus, toolbars, caret handling, and more
  • Implement a Domain Specific Language in C++
Who this book is forThis book is for developers who would like to develop software in C++. Basic programming experience would be an added advantage. Table of Contents
  • Getting Started with C++
  • Data Structures and Algorithms
  • Building a Library Management System
  • Library Management System with Pointers
  • Qt Graphical Applications
  • Enhancing the Qt Graphical Applications
  • The Games
  • The Computer Plays
  • A Domain-Specific Language
  • Advanced Domain-Specific Language
  • Published by: Packt Publishing | Publication date: 02/26/2018
    Kindle book details: Kindle Edition, 442 pages

    Microservice Patterns and Best Practices: Explore patterns like CQRS and event sourcing to create scalable, maintainable, and testable microservices
    Explore the concepts and tools you need to discover the world of microservices with various design patternsKey Features
    • Get to grips with the microservice architecture and build enterprise-ready microservice applications
    • Learn design patterns and the best practices while building a microservice application
    • Obtain hands-on techniques and tools to create high-performing microservices resilient to possible fails
    Book DescriptionMicroservices are a hot trend in the development world right now. Many enterprises have adopted this approach to achieve agility and the continuous delivery of applications to gain a competitive advantage. This book will take you through different design patterns at different stages of the microservice application development along with their best practices.Microservice Patterns and Best Practices starts with the learning of microservices key concepts and showing how to make the right choices while designing microservices. You will then move onto internal microservices application patterns, such as caching strategy, asynchronism, CQRS and event sourcing, circuit breaker, and bulkheads. As you progress, you'll learn the design patterns of microservices.The book will guide you on where to use the perfect design pattern at the application development stage and how to break monolithic application into microservices. You will also be taken through the best practices and patterns involved while testing, securing, and deploying your microservice application. At the end of the book, you will easily be able to create interoperable microservices, which are testable and prepared for optimum performance.What you will learn
    • How to break monolithic application into microservices
    • Implement caching strategies, CQRS and event sourcing, and circuit breaker patterns
    • Incorporate different microservice design patterns, such as shared data, aggregator, proxy, and chained
    • Utilize consolidate testing patterns such as integration, signature, and monkey tests
    • Secure microservices with JWT, API gateway, and single sign on
    • Deploy microservices with continuous integration or delivery, Blue-Green deployment
    Who this book is forThis book is for architects and senior developers who would like implement microservice design patterns in their enterprise application development. The book assumes some prior programming knowledge. Table of Contents
  • Understanding the Microservice Concepts
  • The Microservice Tools
  • Internal Patterns
  • Microservice Ecosystem
  • Shared Data Microservice Design Pattern
  • Aggregator Microservice Design Pattern
  • Proxy Microservice Design Pattern
  • Chained Microservice Design Pattern
  • Branch Microservice Design Pattern
  • Asynchronous Messaging Microservice
  • Microservices Working Together
  • Testing Microservices
  • Monitoring Security and Deployment
  • Published by: Packt Publishing | Publication date: 01/31/2018
    Kindle book details: Kindle Edition, 366 pages

    Learning Node.js Development: Learn the fundamentals of Node.js, and deploy and test Node.js applications on the web
    A comprehensive, easy-to-follow guide to creating complete Node apps and understanding how to build, deploy, and test your own apps.Key Features
    • Entirely project-based and practical
    • Explains the "Why" of Node.js features, not just the "how", providing you with a deep understanding and enabling you to easily apply concepts in your own applications
    • Covers the full range of technologies around Node.js – NPM, version control with Git, and much more
    Book DescriptionLearning Node.js Development is a practical, project-based book that provides you with all you need to get started as a Node.js developer. Node is a ubiquitous technology on the modern web, and an essential part of any web developers' toolkit. If you are looking to create real-world Node applications, or you want to switch careers or launch a side project to generate some extra income, then you're in the right place. This book has been written around a single goal—turning you into a professional Node developer capable of developing, testing, and deploying real-world production applications. Learning Node.js Development is built from the ground up around the latest version of Node.js (version 9.x.x). You'll be learning all the cutting-edge features available only in the latest software versions.This book cuts through the mass of information available around Node and delivers the essential skills that you need to become a Node developer. It takes you through creating complete apps and understanding how to build, deploy, and test your own Node apps. It maps out everything in a comprehensive, easy-to-follow package designed to get you up and running quickly.What you will learn
    • Learn the fundamentals of Node
    • Build apps that respond to user input
    • Master working with servers
    • Learn how to test and debug applications
    • Deploy and update your apps in the real world
    • Create responsive asynchronous web applications
    Who this book is forThis book targets anyone looking to launch their own Node applications, switch careers, or freelance as a Node developer. You should have a basic understanding of JavaScript in order to follow this course. Table of Contents
  • Getting Set Up
  • Node Fundamentals - Part 1
  • Node Fundamentals - Part 2
  • Node Fundamentals - Part 3
  • Basics of Asynchronous Programming in Node.js
  • Callbacks in Asynchronous Programming
  • Promises in asynchronous programming
  • Web Servers in Node
  • Deploying Applications to Web
  • Testing the Node Application part 1
  • Testing the Node Application part 2
  • Author: Andrew Mead
    Published by: Packt Publishing | Publication date: 01/31/2018
    Kindle book details: Kindle Edition, 658 pages

    Mastering Kubernetes: Large scale container deployment and management
    Key Features
    • This practical guide demystifies Kubernetes and ensures that your clusters are always available, scalable, and up to date
    • Discover new features such as autoscaling, rolling updates, resource quotas, and cluster size
    • Master the skills of designing and deploying large clusters on various cloud platforms
    Book DescriptionKubernetes is an open source system to automate the deployment, scaling, and management of containerized applications. If you are running more than just a few containers or want automated management of your containers, you need Kubernetes.This book mainly focuses on the advanced management of Kubernetes clusters. It covers problems that arise when you start using container orchestration in production. We start by giving you an overview of the guiding principles in Kubernetes design and show you the best practises in the fields of security, high availability, and cluster federation.You will discover how to run complex stateful microservices on Kubernetes including advanced features as horizontal pod autoscaling, rolling updates, resource quotas, and persistent storage back ends. Using real-world use cases, we explain the options for network configuration and provides guidelines on how to set up, operate, and troubleshoot various Kubernetes networking plugins. Finally, we cover custom resource development and utilization in automation and maintenance workflows.By the end of this book, you'll know everything you need to know to go from intermediate to advanced level.What you will learn
    • Architect a robust Kubernetes cluster for long-time operation
    • Discover the advantages of running Kubernetes on GCE, AWS, Azure, and bare metal
    • See the identity model of Kubernetes and options for cluster federation
    • Monitor and troubleshoot Kubernetes clusters and run a highly available Kubernetes
    • Create and configure custom Kubernetes resources and use third-party resources in your automation workflows
    • Discover the art of running complex stateful applications in your container environment
    • Deliver applications as standard packages
    About the AuthorGigi Sayfan is the chief system architect of VRVIU?a stealth virtual reality start-up. Gigi has been developing software professionally for more than 20 years in domains as diverse as instant messaging, morphing, chip fabrication process control, embedded multi-media application for game consoles, brain-inspired machine learning, custom browser development, web services for 3D distributed game platforms, and most recently IoT/sensors.He has written production code every day in many programming languages such as C, C , C#, Python, Java, Delphi, JavaScript, and even Cobol and PowerBuilder for operating systems such as Windows (3.11 through 7), Linux, Mac OSX, Lynx (embedded), and Sony Playstation. His technical expertise includes databases, low-level networking, distributed systems, unorthodox user interfaces, and the general software development lifecycle.Table of Contents
  • Understanding Kubernetes Architecture
  • Creating Kubernetes Clusters
  • Monitoring, Logging, and Troubleshooting
  • High Availability and Reliability
  • Configuring Kubernetes Security, Limits, and Accounts
  • Using Critical Kubernetes Resources
  • Handling Kubernetes Storage
  • Running Stateful Application with Kubernetes
  • Rolling Updates, Scalability and Quotas
  • Advanced Kubernetes Networking
  • Running Kubernetes on Multiple Clouds and Cluster Federation
  • Customizing Kubernetes - API and Plugins
  • Handling the Kubernetes Package Manager
  • The Future of Kubernetes
  • Author: Gigi Sayfan
    Published by: Packt Publishing | Publication date: 05/25/2017
    Kindle book details: Kindle Edition, 426 pages

    Git Essentials - Second Edition: Create, merge, and distribute code with Git, the most powerful and flexible versioning system available
    Dive and explore into the latest addons of the latest Git.About This Book
    • Master all the basic concepts of Git to protect your code and make it easier to evolve
    • Use Git proficiently, and learn how to resolve day-by-day challenges easily
    • This step-by-step guide is packed with examples to help you learn and work with Git's internals
    Who This Book Is ForIf you are a software developer with little or no experience of versioning systems, or you are familiar with other centralized versioning systems, then this book is for you.If you have experience in server and system management and need to broaden your use of Git from a DevOps perspective, this book contains everything you need.What You Will Learn
    • Master Git fundamentals
    • Be able to "visualize," even with the help of a valid GUI tool
    • Write principal commands in a shell
    • Figure out the right strategy to run change your daily work with few or no annoyances
    • Explore the tools used to migrate to Git from the Subversion versioning system without losing your development history
    • Plan new projects and repositories with ease, using online services, or local network resources
    In DetailSince its inception, Git has attracted skilled developers due to its robust, powerful, and reliable features. Its incredibly fast branching ability transformed a piece of code from a niche tool for Linux Kernel developers into a mainstream distributed versioning system. Like most powerful tools, Git can be hard to approach since it has a lot of commands, subcommands, and options that easily confuse newcomers.The 2nd edition of this very successful book will help you overcome this fear and become adept in all the basic tasks in Git. Building upon the success of the first book, we start with a brief step-by-step installation guide; after this, you'll delve into the essentials of Git. For those of you who have bought the first edition, this time we go into internals in far greater depth, talking less about theory and using much more practical examples.The book serves as a primer for topics to follow, such as branching and merging, creating and managing a GitHub personal repository, and fork and pull requests. You'll then learn the art of cherry-picking, taking only the commits you want, followed by Git blame. Finally, we'll see how to interoperate with a Subversion server, covering the concepts and commands needed to convert an SVN repository into a Git repository.To conclude, this is a collection of resources, links, and appendices to satisfy even the most curious.Style and approachThis short guide will help you understand the concepts and fundamentals of GIT is a step-by-step manner.
    Published by: Packt Publishing | Publication date: 11/08/2017
    Kindle book details: Kindle Edition, 238 pages

    Enterprise Cloud Security and Governance: Efficiently set data protection and privacy principles
    Build a resilient cloud architecture to tackle data disasters with easeKey Features
    • Gain a firm grasp of Cloud data security and governance, irrespective of your Cloud platform
    • Practical examples to ensure you secure your Cloud environment efficiently
    • A step-by-step guide that will teach you the unique techniques and methodologies of Cloud data governance
    Book DescriptionModern day businesses and enterprises are moving to the Cloud, to improve efficiency and speed, achieve flexibility and cost effectiveness, and for on-demand Cloud services. However, enterprise Cloud security remains a major concern because migrating to the public Cloud requires transferring some control over organizational assets to the Cloud provider. There are chances these assets can be mismanaged and therefore, as a Cloud security professional, you need to be armed with techniques to help businesses minimize the risks and misuse of business data.The book starts with the basics of Cloud security and offers an understanding of various policies, governance, and compliance challenges in Cloud. This helps you build a strong foundation before you dive deep into understanding what it takes to design a secured network infrastructure and a well-architected application using various security services in the Cloud environment.Automating security tasks, such as Server Hardening with Ansible, and other automation services, such as Monit, will monitor other security daemons and take the necessary action in case these security daemons are stopped maliciously. In short, this book has everything you need to secure your Cloud environment with. It is your ticket to obtain industry-adopted best practices for developing a secure, highly available, and fault-tolerant architecture for organizations.What you will learn
    • Configure your firewall and Network ACL
    • Protect your system against DDOS and application-level attacks
    • Explore cryptography and data security for your cloud
    • Get to grips with configuration management tools to automate your security tasks
    • Perform vulnerability scanning with the help of the standard tools in the industry
    • Learn about central log management
    Who This Book Is ForIf you are a cloud security professional who wants to ensure cloud security and data governance no matter the environment, then this book is for you. A basic understanding of working on any cloud platform would be beneficial.Table of Contents
  • Fundamentals of Cloud Security
  • Defense-In-Depth Based Approach
  • Designing Defensive Network Infrastructure
  • Server Hardening is vital
  • Cryptography & Data Security
  • Automation is Key to Security
  • Vulnerability Assessment, Pentest & Patch Management
  • Security Logging & Monitoring
  • First Responder
  • Best Practices
  • Author: Zeal Vora
    Published by: Packt Publishing | Publication date: 12/29/2017
    Kindle book details: Kindle Edition, 410 pages

    Python Penetration Testing Cookbook: Practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation
    Over 50 hands-on recipes to help you pen test networks using Python, discover vulnerabilities, and find a recovery pathAbout This Book
    • Learn to detect and avoid various types of attack that put system privacy at risk
    • Enhance your knowledge of wireless application concepts and information gathering through practical recipes
    • Learn a pragmatic way to penetration-test using Python, build efficient code, and save time
    Who This Book Is ForIf you are a developer with prior knowledge of using Python for penetration testing and if you want an overview of scripting tasks to consider while penetration testing, this book will give you a lot of useful code for your toolkit.What You Will Learn
    • Learn to configure Python in different environment setups.
    • Find an IP address from a web page using BeautifulSoup and Scrapy
    • Discover different types of packet sniffing script to sniff network packets
    • Master layer-2 and TCP/ IP attacks
    • Master techniques for exploit development for Windows and Linux
    • Incorporate various network- and packet-sniffing techniques using Raw sockets and Scrapy
    In DetailPenetration testing is the use of tools and code to attack a system in order to assess its vulnerabilities to external threats. Python allows pen testers to create their own tools. Since Python is a highly valued pen-testing language, there are many native libraries and Python bindings available specifically for pen-testing tasks.Python Penetration Testing Cookbook begins by teaching you how to extract information from web pages. You will learn how to build an intrusion detection system using network sniffing techniques. Next, you will find out how to scan your networks to ensure performance and quality, and how to carry out wireless pen testing on your network to avoid cyber attacks. After that, we’ll discuss the different kinds of network attack. Next, you’ll get to grips with designing your own torrent detection program. We’ll take you through common vulnerability scenarios and then cover buffer overflow exploitation so you can detect insecure coding. Finally, you’ll master PE code injection methods to safeguard your network.Style and approachThis book takes a recipe-based approach to solving real-world problems in pen testing. It is structured in stages from the initial assessment of a system through exploitation to post-exploitation tests, and provides scripts that can be used or modified for in-depth penetration testing.
    Author: Rejah Rehim
    Published by: Packt Publishing | Publication date: 11/28/2017
    Kindle book details: Kindle Edition, 226 pages

    Metasploit Penetration Testing Cookbook: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework, 3rd Edition
    Over 100 recipes for penetration testing using Metasploit and virtual machinesKey Features
    • Special focus on the latest operating systems, exploits, and penetration testing techniques
    • Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures
    • Automate post exploitation with AutoRunScript
    • Exploit Android devices, record audio and video, send and read SMS, read call logs, and much more
    • Build and analyze Metasploit modules in Ruby
    • Integrate Metasploit with other penetration testing tools
    Book DescriptionMetasploit is the world's leading penetration testing tool and helps security and IT professionals find, exploit, and validate vulnerabilities. Metasploit allows penetration testing automation, password auditing, web application scanning, social engineering, post exploitation, evidence collection, and reporting. Metasploit's integration with InsightVM (or Nexpose), Nessus, OpenVas, and other vulnerability scanners provides a validation solution that simplifies vulnerability prioritization and remediation reporting. Teams can collaborate in Metasploit and present their findings in consolidated reports.In this book, you will go through great recipes that will allow you to start using Metasploit effectively. With an ever increasing level of complexity, and covering everything from the fundamentals to more advanced features in Metasploit, this book is not just for beginners but also for professionals keen to master this awesome tool.You will begin by building your lab environment, setting up Metasploit, and learning how to perform intelligence gathering, threat modeling, vulnerability analysis, exploitation, and post exploitation—all inside Metasploit. You will learn how to create and customize payloads to evade anti-virus software and bypass an organization's defenses, exploit server vulnerabilities, attack client systems, compromise mobile phones, automate post exploitation, install backdoors, run keyloggers, highjack webcams, port public exploits to the framework, create your own modules, and much more.What you will learn
    • Set up a complete penetration testing environment using Metasploit and virtual machines
    • Master the world's leading penetration testing tool and use it in professional penetration testing
    • Make the most of Metasploit with PostgreSQL, importing scan results, using workspaces, hosts, loot, notes, services, vulnerabilities, and exploit results
    • Use Metasploit with the Penetration Testing Execution Standard methodology
    • Use MSFvenom efficiently to generate payloads and backdoor files, and create shellcode
    • Leverage Metasploit's advanced options, upgrade sessions, use proxies, use Meterpreter sleep control, and change timeouts to be stealthy
    Who this book is forIf you are a Security professional or pentester and want to get into vulnerability exploitation and make the most of the Metasploit framework, then this book is for you. Some prior understanding of penetration testing and Metasploit is required. Table of Contents
  • Metasploit Quick Tips for Security Professionals
  • Information Gathering and Scanning
  • Server-Side Exploitation
  • Meterpreter
  • Post-Exploitation
  • Using MSFvenom
  • Client-Side Exploitation and Antivirus Bypass
  • Social-Engineer Toolkit
  • Working with Modules for Penetration Testing
  • Exploring Exploits
  • Wireless Network Penetration Testing
  • Cloud Penetration Testing
  • Best Practices
  • Published by: Packt Publishing | Publication date: 02/26/2018
    Kindle book details: Kindle Edition, 426 pages

    Kali Linux Wireless Penetration Testing Cookbook: Identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security
    Over 60 powerful recipes to scan, exploit, and crack wireless networks for ethical purposesKey Features
    • Expose wireless security threats through the eyes of an attacker,
    • Recipes to help you proactively identify vulnerabilities and apply intelligent remediation,
    • Acquire and apply key wireless pentesting skills used by industry experts
    Book DescriptionMore and more organizations are moving towards wireless networks, and Wi-Fi is a popular choice. The security of wireless networks is more important than ever before due to the widespread usage of Wi-Fi networks. This book contains recipes that will enable you to maximize the success of your wireless network testing using the advanced ethical hacking features of Kali Linux.This book will go through techniques associated with a wide range of wireless penetration tasks, including WLAN discovery scanning, WEP cracking, WPA/WPA2 cracking, attacking access point systems, operating system identification, vulnerability mapping, and validation of results. You will learn how to utilize the arsenal of tools available in Kali Linux to penetrate any wireless networking environment. You will also be shown how to identify remote services, how to assess security risks, and how various attacks are performed.By finishing the recipes, you will feel confident conducting wireless penetration tests and will be able to protect yourself or your organization from wireless security threats.What you will learn
    • Deploy and configure a wireless cyber lab that resembles an enterprise production environment
    • Install Kali Linux 2017.3 on your laptop and configure the wireless adapter
    • Learn the fundamentals of commonly used wireless penetration testing techniques
    • Scan and enumerate Wireless LANs and access points
    • Use vulnerability scanning techniques to reveal flaws and weaknesses
    • Attack Access Points to gain access to critical networks
    Who This Book Is ForIf you are a security professional, administrator, and a network professional who wants to enhance their wireless penetration testing skills and knowledge then this book is for you. Some prior experience with networking security and concepts is expected.Table of Contents
  • Kali Linux and Wireless Networking
  • Attacking Access Controls
  • Integrity of Wireless
  • Impacting Confidentiality
  • Reducing availability
  • Authentication attacks
  • Bluetooth Attacks
  • Published by: Packt Publishing | Publication date: 12/13/2017
    Kindle book details: Kindle Edition, 216 pages

    Mastering Object-oriented Python - Transform Your Approach to Python Programming
    Key Features
    • Create applications with flexible logging, powerful configuration and command-line options, automated unit tests, and good documentation
    • Use the Python special methods to integrate seamlessly with built-in features and the standard library
    • Design classes to support object persistence in JSON, YAML, Pickle, CSV, XML, Shelve, and SQL
    Book DescriptionAn object-oriented approach to Python web development gives you a much more fully-realised experience of the language. The flexibility and power of Python, combined with the improvements in design, coding and software maintenance that object-oriented programming allows, is built to respond to the challenges of increasingly more complex and data-intensive application development, making difficult tasks much more manageable. This book has been designed to make this sophisticated approach to programming easier to learn quickly, providing you with a clear and coherent learning journey.Beginning by looking at a range of design patterns for the _init_() method, you will learn how to effectively use a range of Pythonâs special methods to create classes that integrate with Pythonâs built-in features, and find detailed explorations and demonstrations of callables and contexts, containers and collections, numbers, and decorators and mixins, with a focus on best practices for effective and successful design. The book also features information that demonstrates how to create persistent objects using JSON, YAML, Pickle, CSV, XML, Shelve and SQL and shows you how to transmit objects between processes. Going further into OOP, youâll find expert information on logging, warnings, unit testing as well as working with the command line.Structured in 3 parts to make the complexity of OOP more manageable - Pythonic Classes via Special Methods, Persistence and Serialization and Testing, Debugging, Deploying, and Maintaining â this book offers deep insight into OOP that will help you develop expert level object-oriented Python skills.What you will learn
    • Create applications with flexible logging, powerful configuration and command-line options, automated unit tests, and good documentation
    • Get to grips with different design patterns for the __init__() method
    • Design callable objects and context managers
    • Perform object serialization in formats such as JSON, YAML, Pickle, CSV, and XML
    • Map Python objects to a SQL database using the built-in SQLite module
    • Transmit Python objects via RESTful web services
    • Devise strategies for automated unit testing, including how to use the doctest and the unittest.mock module
    • Parse command-line arguments and integrate this with configuration files and environment variables
    About the AuthorSteven F. Lott has been programming since the 70s, when computers were large, expensive, and rare. As a contract software developer and architect, he has worked on hundreds of projects, from very small to very large. He's been using Python to solve business problems for over 10 years.Table of Contents
  • The _init_() Method
  • Integrating Seamlessly with Basic Python Special Methods
  • Attribute Access, Properties, and Descriptors
  • The ABCs of Consistent Design
  • Using Callables and Contexts
  • Creating Contrainers and Collections
  • Creating Numbers
  • Decorators and Mixins: Cross-Cutting Aspects
  • Serializing and Saving â JSON, YAML, Pickle, CSV, and XML
  • Storing and Retrieving Objects via Shelve
  • Storing and Retrieving Objects via SQLite
  • Transmitting and Sharing Objects
  • Configuration Files and Persistence
  • The Logging and Warning Modules
  • Designing for Testability
  • Coping with the Command Line
  • The Module and Package Design
  • Quality and Documentation
  • Published by: Packt Publishing | Publication date: 04/22/2014
    Kindle book details: Kindle Edition, 636 pages
    [1] 2345Next