Downloaad PDF Learning Laravel 4 Application Development Develop real-world web applications in Laravel 4 using its refined and expressive syntax by Hardik Dangar



Sinopsis

In this chapter we are going to look at what MVC is and how it fits in web development. We will also look into some of the unique features of the Laravel framework, and we will see later what Laravel 4 offers us and how it is helpful to the developers.

There comes a time in every developer's life where you really want to change the way you work. You want to organize your code; you really care about how you are dividing things and try to refactor your code. You try to learn advanced patterns so that you can manage things, and as you move project-by-project, you develop a framework around your code, which you will use each time you create a new project. You are beginning to realize there are other options too such as Frameworks.

Frameworks are developed by the community, and you start to explore them and realize that there are some really good patterns. You also realize that a lot of the grunt work, which you have to do at the time of project initiation, has been done in the framework so that you can enjoy the experience of coding. You think you were stupid enough to not use this in your projects in the first place. You start thinking about objects, classes, patterns, and procedures.

Then it strikes to you, the moment of truth, and you decide to put yourself in the shoes of the framework. This is where this book helps you by guiding you step-by-step through the real-world application development via Laravel 4 Framework. I have chosen to walk you carefully through the real-world application development where scopes change, and you have to be ready for constantly changing your code. I will show you how you can effectively use Laravel to minimize the impact of changes and how you can develop applications that take away the pain you feel as a developer when changes constantly evolve in your application.


Content

  1. Welcome to the World of Laravel
  2. Let's Begin the Journey
  3. Creating a Simple CRUD Application in Hours 
  4. Building a Real-life Application with Laravel 4 – The Foldagram
  5. Creating a Cart Package for Our Application
  6. User Management and Payment Gateway Integration
  7. The Admin Section
  8. Building a RESTful API with Laravel – Store Locator
  9. Optimizing and Securing Our Applications
  10. Deploying Laravel Applications
  11. Creating a Workflow and Useful Laravel Packages and Tools





Download PDF Learning Three.js: The JavaScript 3D Library for WebGL Create and animate stunning 3D graphics using the open source Three.js JavaScript library by Jos Dirksen

Download PDF Learning Three.js: The JavaScript 3D Library for WebGL Create and animate stunning 3D graphics using the open source Three.js JavaScript library by Jos Dirksen

Sinopsis

Modern browsers are slowly getting more powerful features that can be accessed directly from JavaScript. You can easily add video and audio with the new HTML5 tags and create interactive components through the use of the HTML5 canvas. A rather new addition to this feature set is the support of WebGL. With WebGL you can directly make use of the processing resources of your graphics card and create high-performance 2D and 3D computer graphics. Programming WebGL directly from JavaScript to create and animate 3D scenes is a very complex and error-prone process. Three.js is a library that makes this a lot easier. The following list shows some of the things that Three.js makes easy:

  • Creating simple and complex 3D geometries
  • Animating and moving objects through a 3D scene
  • Applying textures and materials to your objects
  • Loading objects from 3D modeling software
  • Creating 2D sprite-based graphics


Content


  1. Creating Your First 3D Scene with Three.js
  2. Working with the Basic Components That Make Up a Three.js Scene
  3. Working with the Different Light Sources Available in Three.js
  4. Working with the Three.js Materials
  5. Learning to Work with Geometries
  6. Using Advanced Geometries and Binary Operations
  7. Particles and the Particle System
  8. Creating and Loading Advanced Meshes and Geometries
  9. Animations and Moving the Camera
  10. Loading and Working with Textures
  11. Custom Shaders and Render Post Processing
  12. Adding Physics to Your Scene with Physijs






Download PDF Zope™ Bible by Michael R. Bernstein, Scott Robertson, and the Codeit Development Team

Download PDF Zope™ Bible by Michael R. Bernstein, Scott Robertson, and the Codeit Development Team

Sinopsis

If you are picking up this book, you probably fall into one of three categories: the tech book browser who wants to know what the application with the funny name is, the Web developer who is looking into application platforms to develop on top of, or your company’s HTML resource, looking for something that will help you build the intranet your boss wants online yesterday. No matter which of these categories you fall under, this book is for you. Not only do we explain what Zope is and how it can help you, but we also get into the nitty-gritty of building Web applications in Zope from back to front.

Put quite simply, Zope is an open source Web application server. Published by Zope Corporation (formerly Digital Creations) and supported by a large, active community of users, it was designed with the idea in mind that a successful Web application requires the collaboration of many people in an organization. Zope runs on almost all UNIX systems, as well as on Windows, plus it can be run with most Web servers or its own built-in Web server. The few platforms that are not officially supported (such as Apple MacOS) nevertheless have their own community supporters who can almost certainly provide a version of Zope pre-compiled for your platform. Since Zope is open source, you also always have the option (as a last resort) of compiling Zope for your platform yourself with some assistance from the community. In practice, this is rarely necessary.


Content

  1. Getting Started with Zope
  2. Overview of Zope
  3.  Installation
  4. Zope Objects and the Management Interface
  5. Document Template Markup Language
  6. Object-Oriented Programming and Python
  7. Building Zope Products
  8. From Packages to Products
  9. Creating an AddressBook Application
  10. Enhancing the AddressBook
  11. Zope Product Security
  12. Creating a Multi-User AddressBook
  13. Zope Management
  14. Content Management Strategies
  15. Database Management
  16. User Management and Security
  17. Advanced Zope Concepts
  18. Core Zope Components
  19. Scripting Zope
  20. ZClasses
  21. Searching Content
  22. Zope Page Templates
  23. Debugging
  24. Alternative Methods of Running Zope



Download PDF Java and XML Your visual blueprint for creating Java-enhanced Web programs by Paul Whitehead, Dr. Ernest Friedman-Hill, and Emily Vander Veer



Sinopsis

In an object-oriented language, a program is divided into many separate units called objects. You can program and understand each type of object in isolation. Breaking a program into small, well-defined pieces in this way makes object-oriented programs easier to write, to understand, and to change.
 
An object typically includes two parts. First, it includes information. Just as each object in the real world has a color, a size, and a weight, Java objects contain their own unique data. Secondly, objects include instructions for working with this data; for example, a Button object might include instructions for drawing a button on the computer screen and for reacting to mouse clicks. Each set of instructions is termed a method. In general, doing useful work in Java consists mainly of asking objects to perform methods for you. An object responds to such a request by following the instructions that the method contains. Having all the instructions and data broken up into objects makes Java software modular, and thus easier to understand one piece at a time. Object-oriented languages also promote software reuse — that is, you may define a kind of object and use it in several different programs unchanged.

 

Content

  1.  INTRODUCING JAVA AND XML
  2. JAVA BASICS
  3. JAVA PROGRAMMING
  4. XML BASICS
  5. XML DOCUMENT TYPE DEFINITIONS
  6. XML SCHEMAS
  7. THE SAX API
  8. THE DOM
  9. JDOM
  10. JAXP



Download PDF CSS Hacks and Filters Making Cascading Style Sheets Work by Joseph Lowery


Sinopsis

I’ll be upfront about it: I wrote this book for myself. I was working on one too many sites with impossible browser-spanning specs while trying to harness the demanding CSS requirements, both self- and client-driven.While I found a wealth of information about CSS hacks and filters on the Web, it was overwhelming. I wanted a central resource that I could rely on to quickly give me the solutions I needed with the deeper understanding I craved. I couldn’t find it in any one place—so I wrote it.
 
My hope, and fervent belief, is that there are a lot of designers in the same boat. CSS has come on in a whirlwind and the reality of the browser situation demands that you deal with it on its own terms or get blown away. There are, of course, numerous ways to handle CSS display issues. Rather than try to force one method to the exclusion of others, this book offers the full gamut of techniques. For example, if you don’t feel comfortable applying multiple hacks to adapt a single style sheet, you can use any of the JavaScript or server-side methods for serving the right CSS file to the right browser. I did, however, attempt to ensure that whatever suggestions I made validated; where there was no recourse, the invalid technique is noted as such.
 
CSS Hacks and Filters follows, roughly, an old-to-new, simple-to-complex structure. The oldest browsers CSS designers are still struggling with are covered first, followed by more up-to-date, standards-based browsers. Internet Explorer’s proprietary conditional comment technology is important enough (given Internet Explorer’s continued prevalence and CSS bugs) to deserve a chapter by itself. In all these early chapters, I tackled real-world CSS problems and explained how the hacks covered can solve them. Later chapters explore the intersection of CSS with other Web technologies such as JavaScript, the Document Object Model (DOM), and application servers. Graphics and other visual media weigh heavily in the modern Web, and manipulating them properly with CSS is the subject of Chapter 7. Accessibility is a well-deserved hot button and techniques for applying CSS in a responsible fashion are explored in Chapter 8.
 
The latter portion of the book is intended to offer practical examples for designers trying to put it all together—and keep it there. You’ll find separate chapters on CSS layouts, navigations systems, and debugging. My ongoing work with Dreamweaver persuaded me to present a couple of additional real-world chapters to address the use of CSS in Macromedia’s world-class and widely used authoring tool: one chapter is on core CSS use in Dreamweaver and the other concerns Dreamweaver templates and CSS. This “getting-it-done” attitude is carried over into the two appendixes. The resources listed in Appendix A should give you a full spectrum of jumpingoff places, and the tables in Appendix B are intended to help you find a safe place to land.



Content

  1.  Why Hack CSS?
  2.  Filtering CSS for Older Browsers
  3. Hiding CSS from Newer Browsers
  4. Applying Conditional Comments
  5. Scripting JavaScript and Document Object Model Hacks
  6. Coding Server-Side Solutions
  7. Enhancing Graphics and Media with CSS
  8. Maintaining Accessibility with CSS
  9. Integrated CSS Hack Layouts
  10. Building Navigation Systems
  11. Troubleshooting CSS
  12. Implementing CSS Hacks in Dreamweaver
  13. Creating CSS-Savvy Dreamweaver Templates







Download PDF Build Your Own Web Site Go High Tech At Low Cost by David Karlins

Download PDF Web Design: The Complete Reference Second Edition by Thomas Powell


Sinopsis


Most discussions of Web design get off track in short order, because what people mean by the expression varies so dramatically. While everyone has some sense of what Web design is, few seem able to define it exactly. Certain components, such as graphic design or programming, are a part of any discussion, but their importance in the construction of sites varies from person to person and from site to site. Some consider the creation and organization of content or, more formally, the information architecture—as the most important aspect of Web design. Other factors ease of use, the value and function of the site within an organization’s overall operations, and site delivery, among many others remain firmly within the realm of Web design. With influences from library science, graphic design, programming, networking, user interface design, usability, and a variety of other sources, Web design is truly a multidisciplinary field.

Defining Web Design
There are five areas that cover the major facets of Web design:
 
  • Content This includes the form and organization of a site’s content. This can range from the way text is written to how it is organized, presented, and structured using a markup technology such as HTML.
  • Visuals This refers to the screen layout used in a site. The layout is usually created using HTML, CSS, or even Flash and may include graphic elements either as decoration or for navigation. The visual aspect of the site is the most obvious aspect of Web design, but it is not the sole, or most important, aspect of the discipline.
  • Technology While the use of various core Web technologies such as HTML or CSS fall into this category, technology in this context more commonly refers to the various interactive elements of a site, particularly those built using programming techniques. Such elements range from client-side scripting languages like JavaScript to server-side applications such as Java servlets.
  • Delivery The speed and reliability of a site’s delivery over the Internet or an internal corporate network are related to the server hardware/software used and to the network architecture employed.
  • Purpose The reason the site exists, often related to an economic issue, is arguably the most important part of Web design. This element should be considered in all decisions involving the other areas.


Content

  1.  Foundation
  2. What Is Web Design?
  3. User-Centered Design
  4. The Web Medium
  5. The Web Design Process 
  6. Evaluating Web Sites 
  7. Site Organization and Navigation
  8.  Site Types and Architectures 
  9. Navigation Theory
  10. Basic Navigation Practices
  11. Search
  12. Site Maps and Other Navigational Aids
  13. Elements of Page Design
  14. Pages and Layout
  15. Text
  16. Color
  17. Images
  18. GUI Widgets and Forms
  19. Technology and Web Design
  20. Web Technology Best Practices
  21. Site Delivery and Management



Download PDF CWNA® Certified Wireless Network Administrator Official Study Guide Third Edition by David D. Coleman



Sinopsis


If you have purchased this book or if you are thinking about purchasing this book, you probably have some interest in taking the CWNA® (Certified Wireless Network Administrator) certifi cation exam or in learning more about what the CWNA certification exam is about. We would like to congratulate you on this fi rst step, and we hope that our book can help you on your journey. Wireless networking is one of the hottest technologies on the market. As with many fast-growing technologies, the demand for knowledgeable people is often greater than the supply. The CWNA certifi cation is one way to prove that you have the knowledge and skills to support this growing industry. This Study Guide was written with that goal in mind.
This book was written to help teach you about wireless networking so that you have the knowledge needed not only to pass the CWNA certifi cation test, but also to be able to design, install, and support wireless networks. We have included review questions at the end of each chapter to help you test your knowledge and prepare for the test. We have also included labs, white papers, videos, and presentations on the book’s website (www.sybex.com/go/cwna3e) to further facilitate your learning.
Before we tell you about the certifi cation process and requirements, we must mention that this information may have changed by the time you are taking your test. We recommend that you visit www.cwnp.com as you prepare to study for your test to determine what the current objectives and requirements are.

If you have ever prepared to take a certifi cation test for a technology that you are unfamiliar with, you know that you are not only studying to learn a different technology, but probably also learning about an industry that you are unfamiliar with. Read on and we will tell you about CWNP.
CWNP is an abbreviation for Certifi ed Wireless Network Professional. There is no CWNP test. The CWNP program develops courseware and certifi cation exams for wireless LAN technologies in the computer networking industry. The CWNP certifi cation program is a vendor-neutral program.
The objective of CWNP is to certify people on wireless networking, not on a specifi c vendor’s product. Yes, at times the authors of this book and the creators of the certifi cation will talk about, demonstrate, or even teach how to use a specifi c product; however, the goal is the overall understanding of wireless, not the product itself. If you learned to drive a car, you had to physically sit and practice in one. When you think back and reminisce, you probably do not tell someone you learned to drive a Ford; you probably say you learned to drive using a Ford.
There are seven wireless certifi cations offered by the CWNP program: CWTS: Certified Wireless Technology Specialist CWTS is an entry-level enterprise WLAN certifi cation and a recommended prerequisite for the CWNA certifi cation. This certifi cation is geared specifi cally toward both WLAN sales and support staff for the enterprise WLAN industry. The CWTS certifi cation verifi es that sales and support staff are specialists in WLAN technology and have all the fundamental knowledge, tools, and terminology
to more effectively sell and support WLAN technologies.
CWNA: Certified Wireless Network Administrator The CWNA certifi cation is a foundation-level Wi-Fi certifi cation; however, it is not considered an entry-level technology certifi cation. Individuals taking this exam (exam PW0-105) typically have a solid grasp on network basics such as the OSI model, IP addressing, PC hardware, and network operating systems. Many candidates already hold other industry-recognized certifi cations, such as the CompTIA Network+ or Cisco CCNA, and are looking for the CWNA certifi cation to enhance or complement existing skills.

CWSP: Certified Wireless Security Professional The CWSP certifi cation exam (PW0-204) is focused on standards-based wireless security protocols, security policy, and secure wireless network design. This certifi cation introduces candidates to many of the technologies and techniques that intruders use to compromise wireless networks and that administrators use to protect wireless networks. With recent advances in wireless security, WLANs can be secured beyond their wired counterparts.
CWDP: Certified Wireless Design Professional The CWDP certifi cation exam (PW0-250) is a professional-level career certifi cation for networkers who are already CWNA certifi ed and have a thorough understanding of RF technologies and applications of 802.11 networks. This certification prepares WLAN professionals to properly design wireless LANs for different applications to perform optimally in different environments.
CWAP: Certified Wireless Analysis Professional The CWAP certifi cation exam (PW0-270) is a professional-level career certifi cation for networkers who are already CWNA certifi ed and have a thorough understanding of RF technologies and applications of 802.11 networks. This certification provides an in-depth look at 802.11 operations and prepares WLAN professionals to be able to perform, interpret, and understand wireless packet and spectrum analysis.
CWNE: Certified Wireless Network Expert The CWNE certifi cation is the highest-level certifi cation in the CWNP program. By successfully completing the CWNE requirements, you will have demonstrated that you have the most advanced skills available in today’s wireless LAN market. The CWNE certifi cation requires CWNA, CWAP, CWDP, and CWAP certifi cations. To earn the CWNE certifi cation, a rigorous application must be submitted and approved by CWNP’s review team.


Content

  1. Overview of Wireless Standards, Organizations, and Fundamentals
  2. Radio Frequency Fundamentals
  3. Radio Frequency Components, Measurements, and Mathematics
  4. Radio Frequency Signal and Antenna Concepts
  5. IEEE 802.11 Standards
  6. Wireless Networks and Spread Spectrum Technologies
  7. Wireless LAN Topologies
  8. 802.11 Medium Access
  9. 802.11 MAC Architecture
  10. WLAN Architecture
  11. WLAN Deployment and Vertical Markets
  12. WLAN Troubleshooting
  13. 802.11 Network Security Architecture
  14. Wireless Attacks, Intrusion Monitoring, and Policy
  15. Radio Frequency Site Survey Fundamentals
  16. Site Survey Systems and Devices
  17. Power over Ethernet (PoE)
  18. High Throughput (HT) and 802.11n


Download PDF WEB DESIGN IN A NUTSHELL Third Edition by Jennifer Niederst Robbins


Sinopsis

A great sea change has taken place in web development in the last six or seven years (and since the last edition of this book). Standards compliance is the name of the game in web design these days. After years of browser competition, HTML hacking, and other practices born out of the lack of guiding principles, we are all finally recognizing the benefits of abiding by the rules. That means using clean and logical HTML or XHTML for marking up content, Cascading Style Sheets for all matters of presentation, and a single Document Object Model for scripting. As of this writing, we are still in a period of transition. New approaches need to be learned; old habits need to be shaken. Eventually, standards-based design will be second nature. The good news is that the developers of the tools we use to view and create web pages are making strides toward full standards support. With everyone on the same page, web production has the potential to be more efficient, less costly, and forward compatible. This chapter introduces the current web standards and the way they impact web design.

Content

  1. Web Standards
  2. Designing for a Variety of Browsers
  3. Designing for a Variety of Displays
  4. A Beginner’s Guide to the Server
  5. Accessibility
  6. Internationalization
  7. Introduction to XML
  8. HTML and XHTML Overview
  9. Document Structure
  10. Text Elements
  11. Creating Links
  12. Images and Objects
  13. Tables
  14. Frames
  15. Forms
  16. Cascading Style Sheets Fundamentals
  17. Selectors
  18. Font and Text Properties
  19. Basic Box Properties
  20. Color and Backgrounds
  21. Floating and Positioning
  22. CSS for Tables
  23. Lists and Generated Content
  24. CSS Techniques
  25. Managing Browser Bugs: Workarounds,Hacks,and Filters
  26. Introduction to JavaScript
  27. DOM Scripting
  28. Web Graphics Overview
  29. GIF Format
  30. JPEG Format
  31. PNG Format
  32. Animated GIFs
  33. Audio on the Web
  34. Video on the Web
  35. The Flash Platform
  36. Printing from the Web



Download PDF Web Crawling and Data Mining with Apache Nutch Perform web crawling and apply data mining in your application by Zakir Laliwala


Sinopsis

Apache Nutch is a very robust and scalable tool for web crawling; it can be integrated with the scripting language Python for web crawling. You can use it whenever your application contains huge data and you want to apply crawling on your data.

This chapter covers the introduction to Apache Nutch and its installation, and also guides you on crawling, parsing, and creating plugins with Apache Nutch. It will start from the basics of how to install Apache Nutch and then will gradually take you to the crawling of a website and creating your own plugin.

Content

  1. Introduction to Apache Nutch
  2. Installing and configuring Apache Nutch
  3. Crawling your website using the crawl script 
  4. Crawling the Web, the CrawlDb, and URL filters
  5. Parsing and parse filters
  6. The Apache Nutch plugin
  7. Understanding the Nutch Plugin architecture
  8. Deployment, Sharding, and AJAX Solr with Apache Nutch
  9. Deployment of Apache Solr
  10. Sharding using Apache Solr
  11. Working with AJAX Solr
  12. Integration of Apache Nutch with Apache Hadoop and Eclipse
  13. Integrating Apache Nutch with Apache Hadoop
  14. Configuring Apache Nutch with Eclipse
  15. Apache Nutch with Gora, Accumulo, and MySQL
  16. Introduction to Apache Accumulo
  17. Introduction to Apache Gora
  18. Use of Apache Gora
  19. Integration of Apache Nutch with Apache Accumulo
  20. Integration of Apache Nutch with MySQL



Download PDF Building a Web Site FOR DUMMIES Second Edition by David Crowder


Sinopsis

Maybe you already have your own Web site and you’re not quite satisfied with it. Or perhaps you’re still in the planning stages and want to know what you can do to make your site as good as it can be. You’ve been to Web sites that have all the bells and whistles, and you wouldn’t be human if you weren’t just a wee bit envious. Well, now you can have it all, too. In this book, I show you some of the best stuff around, and I tell you just how to go about putting it on your site.

Keep this book next to your computer and never lend it to anybody. It’s far too precious for that. Make your friends buy their own copies. If you need to make space on your bookshelf, throw away anything else you own to make room for it. When you travel, take it with you. Hold it in your arms at night and tell it how much you love it.

Each chapter is a stand-alone entity. (Don’t you just love that word?) You don’t have to read the whole thing, and it’s a rare person who will read it from cover to cover right off the bat. Go ahead — hit the table of contents or the index and jump to the parts you’re most interested in. But don’t forget to explore the rest
of the book after you’re done with the parts that excite you most. You won’t regret spending the time — you’ll find wonders in every chapter.

Content

  1. Moving from Web Page to Web Site
  2. Adding Sparkle to Your Site
  3. Good Content Makes Contented Visitors
  4. Raking In the Bucks
  5. Publishing and Publicizing Your Site
  6. The Part of Tens



Download PDF Web Marketing That Work Confressions From The Market Trenches by Adam Franklin


Sinopsis

In April 2013 Adam wrote a blog post titled ‘Marketing Experiments: Email content that gets clicked’. The post was live for six months before it was linked to by the popular Buffer blog (see the link at the end of this chapter). This drove a surge of qualified visitors to our own blog. One particular visitor arrived at our blog and read the article, which ended with an offer to download our free Web Strategy Planning Template. In doing so, he happily exchanged his name and email address and opted in to receive further communications from us. He received our Bluewire News emails for three months before enquiring to see how he could engage our services. He’s approved our proposal and will become a client. All initiated from one blog post six months before.
Content

  1. Your web universe: content, web and inbound marketing
  2. Web strategy: defining your buyer personas
  3. Flagship content: the cornerstone of your web marketing
  4. Content marketing: know, like and trust
  5. Web marketing metrics and reporting ROI
  6. Building your own website
  7. Landing pages: design, psychology and leads
  8. Email marketing: the ultimate tool for web marketers
  9. From blogging to content marketing: attracting leads, not just readers
  10. Video, audio and image publishing: YouTube, webinars, infographics and podcasts
  11. Publishing content and finding your editorial rhythm
  12. Search and keywords: search engine optimisation
  13. PR on the web: influencer outreach
  14. The secret to online is offline: events and speaking
  15. How to sell online while keeping your integrity
  16. Social media in action: strategy and guidelines
  17. LinkedIn: the essential social network for business
  18. Facebook: a gold mine for marketers
  19. Twitter: a communication revolution
  20. The road ahead




Basics of Hacking and Penetration Testing Second Edition By Petrick Engebretson


Sinopsis

This book is meant to be a very gentle yet thorough guide to the world of hacking and penetration testing. It is specifically aimed at helping you master the basic steps needed to complete a hack or penetration test without overwhelming you. By the time you finish this book, you will have a solid understanding of the penetration testing process and you will be comfortable with the basic tools needed to complete the job.

To be clear, this book is aimed at people who are new to the world of hacking and penetration testing, for those with little or no previous experience, for those who are frustrated by the inability to see the big picture (how the various tools and phases fit together), for a person who wants to quickly get up-to-speed on with the seminal tools and methods for penetration testing, or for anyone looking to expand their knowledge of offensive security.

In short, this book is written for anyone who is interested in computer security, hacking, or penetration testing but has no prior experience and is not sure where to begin. A colleague and I call this concept “zero entry hacking” (ZEH), much like modern-day swimming pools. Zero entry pools gradually slope from the dry end to the deep end, allowing swimmers to wade in without feeling overwhelmed or have a fear of drowning. The “zero entry” concept allows everyone the ability to use the pool regardless of age or swimming ability. This book employs a similar technique. ZEH is designed to expose you to the basic concepts without overwhelming you. Completion of this book utilizing the ZEH process will prepare you for advanced courses, topics, and books.


Download SQL Injection Attacks and Defense, 2nd Edition By Justin Clake


Sinopsis

People say they know what SQL injection is, but all they have heard about or experienced are trivial examples. SQL injection is one of the most devastating vulnerabilities that impact a business, as it can lead to exposure of all of the sensitive information stored in an application’s database, including handy information such as usernames, passwords, names, addresses, phone numbers, and credit card details.

So, what exactly is SQL injection? It is the vulnerability that results when you give an attacker the ability to influence the Structured Query Language (SQL) queries that an application passes to a back-end database. By being able to influence what is passed to the database, the attacker can leverage the syntax and capabilities of SQL itself, as well as the power and flexibility of supporting database functionality and operating system functionality available to the database. SQL injection is not a vulnerability that exclusively affects Web applications; any code that accepts input from an untrusted source and then uses that input to form dynamic SQL statements could be vulnerable (e.g. “fat client” applications in a client/server architecture). In the past, SQL injection was more typically leveraged against server side databases, however with the current HTML5 specification, an attacker could equally execute JavaScript or other codes in order to interact with a client-side database to steal data. Similarly with mobile applications (such as on the Android platform) malicious applications and/or client side script can be leveraged in similar ways (see labs.mwrinfosecurity.com/notices/webcontentresolver/ for more info).

SQL injection has probably existed since SQL databases were first connected to Web applications. However, Rain Forest Puppy is widely credited with its discovery or at least for bringing it to the public’s attention. On Christmas Day 1998, Rain Forest Puppy wrote an article titled “NT Web Technology Vulnerabilities” for Phrack (www.phrack.com/issues.html?issue=54&id=8#article), an e-zine written by and for hackers. Rain Forest Puppy also released an advisory on SQL injection (“How I hacked PacketStorm,” located at www.wiretrip.net/rfp/txt/rfp2k01.txt) in early 2000 that detailed how SQL injection was used to compromise a popular Web site. Since then, many researchers have developed and refined techniques for exploiting SQL injection. However, to this day many developers and security professionals still do not understand it well.

In this chapter, we will look at the causes of SQL injection. We will start with an overview
of how Web applications are commonly structured to provide some context for understanding
how SQL injection occurs. We will then look at what causes SQL injection in an application at
the code level, and what development practices and behaviors lead us to this.


Download PHP Advanced and Object : Oriented Programming Third Edition By Ullman, Larry


Sinopsis

The career of a PHP programmer normally starts with writing individual scripts, each dedicated to a single purpose. From there you begin using more and more files, building up Web applications. Eventually you might develop sites on your own server and, if you’re lucky, balanced over multiple servers. No matter how large your projects are, learning new and improved ways to develop Web applications is an important part of the life of the PHP programmer.

In this chapter, the focus is on developing Web applications beyond the beginner or intermediate level. We begin with an explanation of how to modularize a Web site. Then you’ll learn a bit about the Apache Web server, including using its mod_rewrite feature that makes Search Engine Optimization (SEO)-friendly URLs. The chapter ends with a discussion of controlling the browser caching.

Modularizing a Web Site

In my experience, the arc of a program-mer’s development starts with writing one-page applications that do just a single thing. Over time, the work will evolve into multipage sites, involving templates and state management. After more and more experience, some seasoned PHP developers start doing the same amount of work in fewer pages, such as having the same script both display and handle a form instead of using two separate files. Or, conversely, the advanced PHP programmer may start generating exponentially more scripts, each of which doing far less, by focusing each script on a particular task. This last approach is the premise behind modularizing a Web site.

For an example of modularizing a site, I’ll create a dummy Web site (i.e., it won’t do much) that’s broken into its individual components. The new knowledge here will be how those components are separated, organized, and put back together. Instead of having individual pages (contact.php, about.php, index.php, etc.), the entire application will also be run through one index page. That page will include the appropriate content module based on values passed in the URL.



Download Oracle 12c for Dummies By Chris Ruel & Wessler


Sinopsis

elcome to the exciting world of Oracle 12c database administration! Few things are as exciting as starting a new journey, and you certainly have a thrilling ride ahead of you. Luckily, the authors of this book, your guides in this adventure, can help smooth out any bumps in the road and point out the things you want to see. With decades of combined Oracle experience managing hundreds of databases for many clients, we hope to make understanding the Oracle database a fun, enlightening experience. Oracle is a large company with a diverse portfolio of software and hardware. It seems like every other week Oracle releases some new product or acquires another company. Don’t let the overwhelming nature of the big picture discourage you. This book imparts the fundamental knowledge of database administration. An Oracle career is a constant learning process. Establishing a solid understanding of the building blocks behind the database engine will vault you into a successful Oracle career.

The foundation of almost all of Oracle’s products is the database, and Oracle databases are the best in the world. Understanding how Oracle databases work and how to manage them successfully is the first step to opening an awful lot of doors. Starting at this level is key. After reading this book, you will be well on your way to an interesting career filled with challenges and plenty of opportunity.

Every year we see companies grow and accumulate data at a staggering rate, and that rate is accelerating. Relational database theory first came out in the early 1970s, and database design and technology continue to evolve and become more powerful every year. Oracle is at the forefront of this evolution, and the knowledge of Oracle 12c that you gain from this book puts you in the driver’s seat for your database career. Hop into your high-performance Oracle ride for an exciting journey!




Download PDF Getting StartED Building Website By Alexander Dawson



Sinopsis

So you want to build your very own website? That’s awesome! By picking up this book you have taken the first step in making your wish come true. A lot of stigma exists about the difficulty of building websites, but you can take comfort in the fact that almost anyone with a computer and access to the Internet can produce a website! It might take you a while to get through this book, because it goes into more depth than some other beginner books to equip you better for all possible scenarios. Hopefully, once you finish this book, you will want to learn more about the subjects discussed, but if I can offer you a single piece of advice before starting on your quest it is “stay calm and don’t panic.” After all, creating a website can be a lot of fun!

Your Expectations

You probably have a number of expectations for this book based on what you want to learn. Basic details of what you should expect are provided within each chapter of this book, but the following general rules apply and state exactly what kind of experience you should get as you begin reading. From this book, you should expect.