Design Patterns in C#

Design Patterns in C#

Get hands-on experience with each Gang of Four design pattern using the latest version of C# (Visual Studio Community 2017). For each of the patterns, you’ll see at least one real-world scenario, a coding example, and a complete implementation including output. In the first part of Design Patterns in…

Introducing the MySQL 8 Document Store

Introducing the MySQL 8 Document Store

Learn the new Document Store feature of MySQL 8 and build applications around a mix of the best features from SQL and NoSQL database paradigms. Don’t allow yourself to be forced into one paradigm or the other, but combine both approaches by using the Document Store. MySQL 8…

Beginning Backup and Restore for SQL Server

Beginning Backup and Restore for SQL Server

Be guided through the techniques to back up and restore databases and files in SQL Server. Multiple techniques are presented for ensuring the integrity and consistency of database backups, as well as the reliability and manageability of restoring from backups. In today’s data-driven world, the most important asset…

Network Security Through Data Analysis, 2nd Edition

Network Security Through Data Analysis, 2nd Edition

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network…

CISSP For Dummies, 6th Edition

CISSP For Dummies, 6th Edition

Secure your CISSP certification! If you’re a security professional seeking your CISSP certification, this book is a perfect way to prepare for the exam. Covering in detail all eight domains, the expert advice inside gives you the key information you’ll need to pass the exam. Plus, you’ll get…

Intelligence-Driven Incident Response

Intelligence-Driven Incident Response

Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that information. With…

Asset Attack Vectors

Asset Attack Vectors

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data. Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a target. Attack surfaces are rapidly expanding to include not…

Azure and Xamarin Forms

Azure and Xamarin Forms

Discover how to create cross platform apps for Android, iOS and UWP using Azure services and C# with Xamarin Forms. This book illustrates how to utilize Azure cloud storage for serving up Azure SQL DB data through Azure App Services. The book starts by setting up Xamarin and…

SQL Primer

SQL Primer

Build a core level of competency in SQL so you can recognize the parts of queries and write simple SQL statements. SQL knowledge is essential for anyone involved in programming, data science, and data management. This book covers features of SQL that are standardized and common across most…