Designing Bots
From Facebook Messenger to Kik, and from Slack bots to Google Assistant, Amazon Alexa, and email bots, the new conversational apps are revolutionizing the way we interact with software. This practical guide shows you how to design and build great conversational experiences and delightful bots that help people be more productive, whether it's for a new consumer service or an enterprise efficiency product. Ideal for designers, product managers, and entrepreneurs, this book explores what works and what doesn't in real-world bot examples, and provides practical design patterns for your bot-building toolbox. You'll learn how to use an effective onboarding process, outline different flows, define a bot personality, and choose the right balance of rich control and text. Explore different bot use-cases and design best practices Understand bot anatomy--such as brand and personality, conversations, advanced UI controls--and their associated design patterns Learn steps for building a Facebook Messenger consumer bot and a Slack business bot Explore the lessons learned and shared experiences of designers and entrepreneurs who have built bots Design and prototype your first bot, and experiment with user feedback
Jump Start Responsive Web Design
It used to be so simple. You made a website or application to work on a 15" monitor and, incompatibilities between browsers aside, you were done. Then along came mobile phones with web browsers and they ruined all our easy lives. Worse than that, people loved browsing the web on them! Fortunately, by using responsive web design techniques, you can use one set of HTML, CSS and JavaScript, and display appropriate elements in an appropriate way to suit each platform. In Jump Start Responsive Web Design, you'l learn responsive techniques to make your designs look magnificent on any device, future-proof them, and reduce development time and budget. RWD helps you deal with the very real problem of not knowing where and how your application will be used. Completely overhauled for its second edition, this book covers: What does responsive really mean?Semantic page structureGrid systemsResponsive Images and mediaMedia queriesResponsive content
Tragic Design
Bad design is everywhere, and its cost is much higher than we think. In this thought-provoking book, authors Jonathan Shariat and Cynthia Savard Saucier explain how poorly designed products can anger, sadden, exclude, and even kill people who use them. The designers responsible certainly didn't intend harm, so what can you do to avoid making similar mistakes? Tragic Design examines real case studies that show how certain design choices adversely affected users, and includes in-depth interviews with authorities in the design industry. Pick up this book and learn how you can be an agent of change in the design community and at your company. You'll explore: Designs that can kill, including the bad interface that doomed a young cancer patient Designs that anger, through impolite technology and dark patterns How design can inadvertently cause emotional pain Designs that exclude people through lack of accessibility, diversity, and justice How to advocate for ethical design when it isn't easy to do so Tools and techniques that can help you avoid harmful design decisions Inspiring professionals who use design to improve our world
Getting Started With Varnish Cache
How long does it take for your website to load? Web performance is just as critical for small and medium-sized websites as it is for massive websites that receive tons of hits. Before you pour money and time into rewriting your code or replacing your infrastructure, first consider a reverse-caching proxy server like Varnish. With this practical book, you'll learn how Varnish can give your website or API an immediate performance boost. Varnish mimicks the behavior of your webserver, caches its output in memory, and serves the result directly to clients without having to access your webserver. If you're a web developer familiar with HTTP, this book helps you master Varnish basics, so you can get up and running in no time. You'll learn how to use the Varnish Configuration Language and HTTP best practices to achieve faster performance and a higher hit rate. Understand how Varnish helps you gain optimum web performance Use HTTP to improve the cache-ability of your websites, web applications, and APIs Properly invalidate your cache when the origin data changes Optimize access to your backend servers Avoid common mistakes when using Varnish in the wild Use logging and debugging tools to examine the behavior of Varnish
Advanced Penetration Testing
Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and compromising high security environments. From discovering and creating attack vectors, and moving unseen through a target enterprise, to establishing command and exfiltrating data--even from organizations without a direct Internet connection--this guide contains the crucial techniques that provide a more accurate picture of your system's defense. Custom coding examples use VBA, Windows Scripting Host, C, Java, JavaScript, Flash, and more, with coverage of standard library applications and the use of scanning tools to bypass common defensive measures. Typical penetration testing consists of low-level hackers attacking a system with a list of known vulnerabilities, and defenders preventing those hacks using an equally well-known list of defensive scans. The professional hackers and nation states on the forefront of today's threats operate at a much more complex level--and this book shows you how to defend your high security network. Use targeted social engineering pretexts to create the initial compromise Leave a command and control structure in place for long-term access Escalate privilege and breach networks, operating systems, and trust structures Infiltrate further using harvested credentials while expanding control Today's threats are organized, professionally-run, and very much for-profit. Financial institutions, health care organizations, law enforcement, government agencies, and other high-value targets need to harden their IT infrastructure and human capital against targeted advanced attacks from motivated professionals. Advanced Penetration Testing goes beyond Kali linux and Metasploit and to provide you advanced pen testing for high security networks.
Managing Cybersecurity Risk
'Managing Cybersecurity Risk is a comprehensive and engrossing guide for organizations of any size' --Infosecurity Magazine Everything you need to know to protect from and react to a cyber attack Cybersecurity risk is an increasingly key topic to all those engaged in business and commerce. Widely reported and increasing incidents of cyber invasion have contributed to the growing realisation that this is an area all businesses should understand, be prepared for and know how to react when attacks occur. While larger corporates now pay close attention to defending themselves against cybersecurity infringement, small to medium businesses remain largely unaware of the scale and range of threats to their organisations. The aim of Managing Cybersecurity Risk is to provide a better understanding of the extent and scale of the potential damage that breaches of cybersecurity could cause their businesses and to guide senior management in the selection of the appropriate IT strategies, tools, training and staffing necessary for prevention, protection and response. Foreword by Baroness Pauline Neville-Jones, Chair of the Advisory Panel on Cyber Security and contributors include Don Randall, former Head of Security and CISO, the Bank of England, Ray Romero, Senior Assistant Director, Division of Information Technology at the Federal Reserve Board and Chris Gibson, Director of CERT-UK.
Prototyping for Designers
Prototyping and user testing is the best way to create successful products, but many designers skip this important step and use gut instinct instead. By explaining the goals and methodologies behind prototyping--and demonstrating how to prototype for both physical and digital products--this practical guide helps beginning and intermediate designers become more comfortable with creating and testing prototypes early and often in the process. Author Kathryn McElroy explains various prototyping methods, from fast and dirty to high fidelity and refined, and reveals ways to test your prototypes with users. You'll gain valuable insights for improving your product, whether it's a smartphone app or a new electronic gadget. Learn similarities and differences between prototyping for physical and digital products Know what fidelity level is needed for different prototypes Get best practices for prototyping in a variety of mediums, and choose which prototyping software or components to use Learn electronics prototyping basics and resources for getting started Write basic pseudocode and translate it into usable code for Arduino Conduct user tests to gain insights from prototypes
Designing for Wearables
Now may be the perfect time to enter the wearables industry. With the range of products that have appeared in recent years, you can determine which ideas resonate with users and which don't before leaping into the market. In this practical guide, author Scott Sullivan examines the current wearables ecosystem and then demonstrates the impact that service design in particular will have on these types of devices going forward. You'll learn about the history and influence of activity trackers, smartwatches, wearable cameras, the controversial Google Glass experiment, and other devices that have come out of the recent Wild West period. This book also dives into many other aspects of wearables design, including tools for creating new products and methodologies for measuring their usefulness. You'll explore: Emerging types of wearable technologies How to design services around wearable devices Key concepts that govern service design Prototyping processes and tools such as Arduino and Processing The importance of storytelling for introducing new wearables How wearables will change our relationship with computers
It Disaster Response
Learn how to develop solutions to handle disasters both large and small. Real-world scenarios illustrate the importance of disaster response (DR) planning.IT Disaster Response takes a different approach to IT disaster response plans. Rather than focusing on details such as what hardware you should buy or what software you need to have in place, the book focuses on the management of a disaster and various management and communication tools you can use before and during a disaster.This book examines disasters in general--a compilation of lessons the author learned over the course of years working in IT, reviewing plane crashes, and his experiences as a cave rescuer and cave rescue instructor. Although at first it may seem that none of these are really related, the truth is they all have elements in common. In each case, the unexpected has happened. Just as not all plane crashes are deadly, not all IT mishaps have terrible consequences. With the proper training and approach, many problems can either be avoided in the first place or better handled if they do arise.The book contains practical guidance on: How to think about a disaster both before it happens and while it's happeningHow to apply management skills used in other fields during disastersHow to get everyone on board when it comes to planning for and handling disastersHow to better deal with smaller, more manageable--and more frequently occurring--disastersWhat you'll learn Discover the difference between a DR solution and a DR planDefine a disaster -- it's not always of the scale of a fire burning down the building.See when to actually implement your DR plan Who This Book Is ForIT professionals in charge of developing their company's disaster recovery plan who also need to raise issues to the required C-level peopleto make sure they have a viable plan.
From Hacking to Report Writing
Learn everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing by breaking down each step of the process so that finding vulnerabilities and misconfigurations becomes easy. The book explains how to methodically locate, exploit, and professionally report security weaknesses using techniques such as SQL-injection, denial-of-service attacks, and password hacking. Although From Hacking to Report Writing will give you the technical know-how needed to carry out advanced security tests, it also offers insight into crafting professional looking reports describing your work and how your customers can benefit from it. The book will give you the tools you need to clearly communicate the benefits of high-quality security and penetration testing to IT-management, executives and other stakeholders. Embedded in the book are a number of on-the-job stories that will give you a good understandingof how you can apply what you have learned to real-world situations. We live in a time where computer security is more important than ever. Staying one step ahead of hackers has never been a bigger challenge. From Hacking to Report Writing clarifies how you can sleep better at night knowing that your network has been thoroughly tested. What you'll learn Clearly understand why security and penetration testing is importantFind vulnerabilities in any system using the same techniques as hackers doWrite professional looking reportsKnow which security and penetration testing method to apply for any given situationSuccessfully hold together a security and penetration test project Who This Book Is For Aspiring security and penetration testers, security consultants, security and penetration testers, IT managers, andsecurity researchers.
Ransomware
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you'll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network. Security experts Allan Liska and Timothy Gallo explain how the success of these attacks has spawned not only several variants of ransomware, but also a litany of ever-changing ways they're delivered to targets. You'll learn pragmatic methods for responding quickly to a ransomware attack, as well as how to protect yourself from becoming infected in the first place. Learn how ransomware enters your system and encrypts your files Understand why ransomware use has grown, especially in recent years Examine the organizations behind ransomware and the victims they target Learn how wannabe hackers use Ransomware as a Service (RaaS) to launch campaigns Understand how ransom is paid--and the pros and cons of paying Use methods to protect your organization's workstations and servers
Ux Research
One key responsibility of product designers and UX practitioners is to conduct formal and informal research to clarify design decisions and business needs. But there's often mystery around product research, with the feeling that you need to be a research Zen master to gather anything useful. Fact is, anyone can conduct product research. With this quick reference guide, you'll learn a common language and set of tools to help you carry out research in an informed and productive manner. This book contains four sections, including a brief introduction to UX research, planning and preparation, facilitating research, and analysis and reporting. Each chapter includes a short exercise so you can quickly apply what you've learned. Learn what it takes to ask good research questions Know when to use quantitative and qualitative research methods Explore the logistics and details of coordinating a research session Use softer skills to make research seem natural to participants Learn tools and approaches to uncover meaning in your raw data Communicate your findings with a framework and structure
Hacking Exposed Industrial Control Systems
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Secure your ICS and SCADA systems the battle-tested Hacking Exposed(TM) wayThis hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused risk mitigation framework that is targeted, efficient, and cost-effective. The book arms you with the skills necessary to defend against attacks that are debilitating―and potentially deadly. See how to assess risk, perform ICS-specific threat modeling, carry out penetration tests using "ICS safe" methods, and block malware. Throughout, the authors use case studies of notorious attacks to illustrate vulnerabilities alongside actionable, ready-to-deploy countermeasures.Learn how to: - Assess your exposure and develop an effective risk management plan- Adopt the latest ICS-focused threat intelligence techniques- Use threat modeling to create realistic risk scenarios- Implement a customized, low-impact ICS penetration-testing strategy- See how attackers exploit industrial protocols- Analyze and fortify ICS and SCADA devices and applications- Discover and eliminate undisclosed "zero-day" vulnerabilities- Detect, block, and analyze malware of all varieties
Org Design for Design Orgs
Design has become the key link between users and today's complex and rapidly evolving digital experiences, and designers are starting to be included in strategic conversations about the products and services that enterprises ultimately deliver. This has led to companies building in-house digital/experience design teams at unprecedented rates, but many of them don't understand how to get the most out of their investment. This practical guide provides guidelines for creating and leading design teams within your organization, and explores ways to use design as part of broader strategic planning. You'll discover: Why design's role has evolved in the digital age How to infuse design into every product and service experience The 12 qualities of effective design organizations How to structure your design team through a Centralized Partnership Design team roles and evolution The process of recruiting and hiring designers How to manage your design team and promote professional growth
Designing for Sustainability
Pixels use electricity, and a lot of it. If the Internet were a country, it would be the sixth largest in terms of electricity use. That's because today's average web page has surpassed two megabytes in size, leading to slow load times, frustrated users, and a lot of wasted energy. With this practical guide, your web design team will learn how to apply sustainability principles for creating speedy, user-friendly, and energy-efficient digital products and services. Author Tim Frick introduces a web design framework that focuses on four key areas where these principles can make a difference: content strategy, performance optimization, design and user experience, and green hosting. You'll discover how to provide users with a streamlined experience, while reducing the environmental impact of your products and services. Learn why 90% of the data that ever existed was created in the last year Use sustainability principles to innovate, reduce waste, and function more efficiently Explore green hosting, sustainable business practices, and lean/agile workflows Put the right things in front of users at precisely the moment they need them--and nothing more Increase site search engine visibility, streamline user experience, and make streaming video more efficient Use Action Items to explore concepts outlined in each chapter
Css3 Mastery
Fully updated to the latest CSS modules, make the journey to CSS mastery as simple and painless as possible. This book dives into advanced aspects of CSS-based design, such as responsive design, modular CSS, and CSS typography. Through a series of easy-to-follow tutorials, you will learn practical CSS techniques you can immediately start using in your daily work. CSS Mastery: Advanced Web Standards Solutions is your indispensable guide to cutting-edge CSS development--this book demystifies the secrets of CSS. While CSS is a relatively simple technology to learn, it is a difficult one to master. When you first start developing sites using CSS, you will come across all kinds of infuriating browser bugs and inconsistencies. It sometimes feels like there are a million and one different techniques to master, spread across a bewildering array of websites. The range of possibilities seems endless and makes for a steep and daunting learning curve. While most books concentrate on basic skills, this one is different, assuming that you already know the basics and why you should be using CSS in your work, and concentrating mainly on advanced techniques. This new edition covers all of the CSS fundamentals such as the importance of meaningful markup, how to structure and maintain your code, and how the CSS layout model really works. This new edition contains: New examples and updated browser support information Full coverage of modular CSS and responsive design Essential information on CSS typography and layout control What You'll LearnDiscover the best practice concepts in CSS design Master the most important (and tricky) parts of CSS Identify and fix the most common CSS problems Deal with the most common bugs See the latest information on CSS features and support Who This Book Is ForIntermediate and advanced web designers and developers. It offers a quick recap of the main points of CSS, while dispelling some common myths, but then moves forward to delve into the higher-level aspects of CSS. It contains fully up-to-date information throughout, and acts as a one-stop-shop for current CSS best practices.
Time Is Money
If you want to convince your organization to conduct a web performance upgrade, this concise book will strengthen your case. Drawing upon her many years of web performance research, author Tammy Everts uses cases studies and other data to explain how web page speed and availability affect a host of business metrics. You'll also learn how our human neurological need for quick, uncomplicated processes drives these metrics. Ideal for managers, this book's case studies demonstrate how Walmart, Staples.com, Mozilla, and other organizations significantly improved conversion rates through simple upgrades. Find out why happy customers return, while frustrated users can send your metrics--and your domain--into a tailspin. You'll explore: What happens neurologically when people encounter slow or interrupted processes How page speed affects metrics in retail and other industries, from media sites to SaaS providers Why internal applications are often slower than consumer apps, and how this hurts employee morale and productivity Common performance problems and the various technologies created to fight them How to pioneer new metrics, and create an organizational culture of performance
Data Management Essentials Using SAS and Jmp
SAS programming is a creative and iterative process designed to empower you to make the most of your organization's data. This friendly guide provides you with a repertoire of essential SAS tools for data management, whether you are a new or an infrequent user. Most useful to students and programmers with little or no SAS experience, it takes a no-frills, hands-on tutorial approach to getting started with the software. You will find immediate guidance in navigating, exploring, visualizing, cleaning, formatting, and reporting on data using SAS and JMP. Step-by-step demonstrations, screenshots, handy tips, and practical exercises with solutions equip you to explore, interpret, process and summarize data independently, efficiently and effectively.
Protecting Yourself Online
Like any new frontier, cyberspace offers both exhilarating possibilities and unforeseen hazards. As personal information about us travels the globe on high-speed networks, often with neither our knowledge nor our consent, a solid understanding of privacy and security issues is vital to the preservation of our rights and civil liberties. In reaping the benefits of the information age while safeguarding ourselves from its perils, the choices we make and the precedents we establish today will be central in defining the future of the electronic frontier.Since 1991, the non-profit Electronic Frontier Foundation (EFF) has worked to protect freedoms and advocate responsibility in new media and the online world. In "Protecting Yourself Online", Robert Gelman has drawn on the collective insight and experience of EFF to present a comprehensive guide to self-protection in the electronic frontier. In accessible, clear-headed language, "Protecting Yourself Online" addresses such issues as: avoiding spam [junk mail]spotting online scams and hoaxesprotecting yourself from identity theft and fraudguarding your email privacy [and knowing when you can't]assessing the danger of viruseskeeping the net free of censorship and safe for your childrenprotecting your intellectual propertyProduced by the leading civil libertarians of the digital age, and including a foreword by one of the most respected leaders in global business and the cyberworld, Esther Dyson, "Protecting Yourself Online" is an essential resource for new media newcomers and old Internet hands alike.
Information Architecture for the World Wide Web
Information architecture (IA) is far more challenging--and necessary--than ever. With the glut of information available today, anything your organization wants to share should be easy to find, navigate, and understand. But the experience you provide has to be familiar and coherent across multiple interaction channels, from the Web to smartphones, smartwatches, and beyond. To guide you through this broad ecosystem, this popular guide--now in its fourth edition--provides essential concepts, methods, and techniques for digital design that have withstood the test of time. UX designers, product managers, developers, and anyone involved in digital design will learn how to create semantic structures that will help people engage with your message. This book includes: An overview of IA and the problems it solves for creating effective digital products and services A deep dive into IA components, including organization, labeling, navigation, search, and metadata Processes and methods that take you from research to strategy, design, and IA implementation
Handling Bad
You wake up and find out that you're being targeted for blackmail by a "one night stand" you met online, that your child has been abducted by your ex-wife, or that your accountant has been embezzling from you. You don't know how to solve such problems-or even where to begin. You might even be too embarrassed to seek help. These are the calls Private Investigator Daniel Weiss receives. Handling bad takes skill- skill that combines the classic methods of private investigation with modern, cutting-edge developments in digital forensics. In HANDLING BAD, Weiss delves into the flourishing digital realm of cyber based criminal activity in order to provide examples of threats that may lurk closer to home than you think.
People-centric Security
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.A Complete People-Centric Information Security Culture Toolkit Minimize risk, protect corporate assets, and avoid catastrophic cybersecurity incidents by adopting a program philosophy that stresses the human element of security. People-Centric Security: Transforming Your Enterprise Security Culture shows, step-by-step, how to analyze and articulate your organization's cultural security posture and migrate to a reliable, people-focused data protection model. Discover how to develop a structured implementation strategy, build behavioral models, identify problems, and transform security effectiveness. This practical guide includes downloadable templates, surveys, and metrics. Explore the people, processes, and technologies behind successful information security cultureAnalyze your security cultures and subcultures and identify conflicts and risksLaunch a security culture diagnostic project and interpret the resultsImplement the Competing Security Cultures Framework Gather data and create maps using Security Culture Diagnostic SurveysBuild Security FORCE Behavioral Models and use FORCE diagnostic toolsAssess security through the five FORCE values: failure, operations, resilience, complexity, and expertiseFacilitate people-centric security at the leadership level of your enterprise
Css
CSS lets you create professional-looking websites, but learning its finer points can be tricky--even for seasoned web developers. This fully updated edition provides the most modern and effective tips, tricks, and tutorial-based instruction on CSS available today. Learn how to use new tools such as Flexbox and Sass to build web pages that look great and run fast on any desktop or mobile device. Ideal for casual and experienced designers alike. The important stuff you need to know: Start with the basics. Write CSS-friendly HTML, including the HTML5 tags recognized by today's browsers. Design for mobile devices. Create web pages that look great when visitors use them on the go. Make your pages work for you. Add animations that capture the imagination, and forms that get the job done. Take control of page layouts. Use professional design techniques such as floats and positioning. Make your layouts more flexible. Design websites with Flexbox that adjust to different devices and screen sizes. Work more efficiently. Write less CSS code and work with smaller files, using Syntactically Awesome Stylesheets (Sass).
Advanced Malware Analysis
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findingsAdvanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal. The proven troubleshooting techniques will give an edge to information security professionals whose job involves detecting, decoding, and reporting on malware. After explaining malware architecture and how it operates, the book describes how to create and configure a state-of-the-art malware research lab and gather samples for analysis. Then, you'll learn how to use dozens of malware analysis tools, organize data, and create metrics-rich reports.A crucial tool for combatting malware--which currently hits each second globallyFilled with undocumented methods for customizing dozens of analysis software tools for very specific usesLeads you through a malware blueprint first, then lab setup, and finally analysis and reporting activitiesEvery tool explained in this book is available in every country around the world
Wordpress for Small Business
Your New Home on the Internet is Waiting Once upon a time, if you owned a local bakery, you didn't need a website. Now every bakery, car wash, dentist's office, and nail salon has a website--and they need one in order to survive. If you already understand your primary business, then your hard work is done. WordPress for Small Business will show you the rest. With step-by-step instructions and full-color screenshots, WordPress for Small Business helps you understand the WordPress options that are best for you, and shows you how to quickly build a dynamic web site that will improve your business. Step-by-step instructions with full-color screenshots Real-life examples of WordPress success stories Quiz to find out what type of WordPress site you need A guide to the principles of modern website architecture Pro tips for SEO, e-commerce, themes, widgets, and plugins WordPress for Small Business gives you everything you need to expand your business online.
Creating a Website
You can easily create a professional-looking website with nothing more than an ordinary computer and some raw ambition. Want to build a blog, sell products, create forums, or promote an event? No problem! This friendly, jargon-free book gives you the techniques, tools, and advice you need to build a site and get it up on the Web. The important stuff you need to know: Master the basics. Learn HTML5, the language of the Web. Design good-looking pages. Use styles to build polished layouts. Get it online. Find a reliable web host and pick a good web address. Use time-saving tools. Learn free tools for creating web pages and tracking your visitors. Attract visitors. Make sure people can find your site through popular search engines like Google. Build a community. Encourage repeat visits with social media. Bring in the cash. Host Google ads, sell Amazon's wares, or push your own products that people can buy via PayPal. Add pizzazz. Include audio, video, interactive menus, and a pinch of JavaScript.
Discussing Design
Real critique has become a lost skill among collaborative teams today. Critique is intended to help teams strengthen their designs, products, and services, rather than be used to assert authority or push agendas under the guise of "feedback." In this practical guide, authors Adam Connor and Aaron Irizarry teach you techniques, tools, and a framework for helping members of your design team give and receive critique. Using firsthand stories and lessons from prominent figures in the design community, this book examines the good, the bad, and the ugly of feedback. You璽 ll come away with tips, actionable insights, activities, and a cheat sheet for practicing critique as a part of your collaborative process. This book covers: Best practices (and anti-patterns) for giving and receiving critique Cultural aspects that influence your ability to critique constructively When, how much, and how often to use critique in the creative process Facilitation techniques for making critiques timely and more effective Strategies for dealing with difficult people and challenging situations
The Content Strategy Toolkit
In this essential guide, Meghan Casey outlines a step-by-step approach for doing content strategy, from planning and creating your content to delivering and managing it. Armed with this book, you can confidently tackle difficult activities like telling your boss or client what's wrong with their content, getting the budget to do content work, and aligning stakeholders on a common vision. Reading The Content Strategy Toolkit is like having your own personal consulting firm on retainer with a complete array of tools and tips for every challenge you'll face. In this practical and relevant guide, you'll learn how to: Identify problems with your content and persuade your bosses it's worth the time and resources to do it right Make sense of your business environment and understand your audience Get stakeholders aligned on business goals and user needs Set your content strategy and decide how to measure success Create, maintain, and govern on-strategy content You'll learn to control your content--and not have it control you.
Web Scalability for Startup Engineers
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Design and build scalable web applications quicklyThis is an invaluable roadmap for meeting the rapid demand to deliver scalable applications in a startup environment. With a focus on core concepts and best practices rather than on individual languages, platforms, or technologies, Web Scalability for Startup Engineers describes how infrastructure and software architecture work together to support a scalable environment. You'll learn, step by step, how scalable systems work and how to solve common challenges. Helpful diagrams are included throughout, and real-world examples illustrate the concepts presented. Even if you have limited time and resources, you can successfully develop and deliver robust, scalable web applications with help from this practical guide. Learn the key principles of good software design required for scalable systemsBuild the front-end layer to sustain the highest levels of concurrency and request ratesDesign and develop web services, including REST-ful APIsEnable a horizontally scalable data layerImplement caching best practicesLeverage asynchronous processing, messaging, and event-driven architectureStructure, index, and store data for optimized search Explore other aspects of scalability, such as automation, project management, and agile teams
Web Design and Marketing Solutions for Business Websites
The first to focus exclusively on corporate/business site design and marketing, this book is for any web designer who wants to find out how to better implement these kinds of sites, offering a better online presence for them, and their clients. The reader is taken through the planning, design, and implementation of corporate/business web sites using a series of concise, practical chapters.
Understanding the Social in Social Media
Learn how to engage your customers and grow your businessBeing successful on social media isn't simply a matter of having a Facebook page and posting to your fans.Social media is two way communication and if you don't know how to be social with your followers, you won't be able to grow your business. Your fans want to know there's a living person answering them, instead of a bot just blasting out advertisement after advertisement.Success on social media involves using social behaviors to create and improve relationships you have with your customers. When you have social relationships with your customers, you have the opportunity to turn them into passionate advocates that will help you grow your business.You will learn the following: How to write invitations that get you in the door with someone, instead of just becoming a number.The importance of developing social media policies.The difference between good and bad social media behaviorWhat being social really means and how it can help your business grow, while also helping you connect to a passionate fan base.Just being on social media isn't enough. Learn how to be successfully social and watch as it changes your social media connections into business connections that grow your business!
Secrets and Lies
This anniversary edition which has stood the test of time as a runaway best-seller provides a practical, straight-forward guide to achieving security throughout computer networks. No theory, no math, no fiction of what should be working but isn't, just the facts. Known as the master of cryptography, Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. A much-touted section: Schneier's tutorial on just what cryptography (a subset of computer security) can and cannot do for them, has received far-reaching praise from both the technical and business community. Praise for Secrets and Lies "This is a business issue, not a technical one, and executives can no longer leave such decisions to techies. That's why Secrets and Lies belongs in every manager's library."-Business Week "Startlingly lively....a jewel box of little surprises you can actually use."-Fortune "Secrets is a comprehensive, well-written work on a topic few business leaders can afford to neglect."-Business 2.0 "Instead of talking algorithms to geeky programmers, [Schneier] offers a primer in practical computer security aimed at those shopping, communicating or doing business online-almost everyone, in other words."-The Economist "Schneier...peppers the book with lively anecdotes and aphorisms, making it unusually accessible."-Los Angeles Times With a new and compelling Introduction by the author, this premium edition will become a keepsake for security enthusiasts of every stripe.
Networking: The Complete Reference
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.The most comprehensive, current guide to networkingBuild and administer high-performance networks of all sizes--from small home systems to enterprise internet works--using the practical information in this detailed resource. Thoroughly revised to cover the latest technologies, Networking: The Complete Reference, Third Edition offers concise explanations, start-to-finish deployment plans, real-world examples, and expert tips. Find out how to select a networking protocol, connect devices, set up wireless LANs and WANs, configure Internet servers, virtualize your network, and migrate to the cloud. Cutting-edge backup, tuning, and security techniques are fully explained. Filled with proven solutions to a wide array of networking issues, this comprehensive guide is ideal for beginners and seasoned IT professionals alike. Design, configure, and administer wireless and wired networksWork with interface cards, hubs, routers, switches, and repeatersUnderstand Ethernet, Token Ring, TCP/IP, and IPX protocolsBuild wireless LANs using WiFi, IEEE 802.11, and Bluetooth technologyDeploy server clusters, multiprocessors, and Fibre Channel connectionsDeliver Web, FTP, e-mail, and Active Directory services Implement a cloud-based network infrastructureSet up, configure, and manage virtual networksHandle troubleshooting and network securityConnect Macintosh and Unix systems to Windows networks
Hacking Exposed Wireless
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Exploit and defend against the latest wireless network attacksLearn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide. Inside, you'll find concise technical overviews, the latest attack methods, and ready-to-deploy countermeasures. Find out how to leverage wireless eavesdropping, break encryption systems, deliver remote exploits, and manipulate 802.11 clients, and learn how attackers impersonate cellular networks. Hacking Exposed Wireless, Third Edition features expert coverage of ever-expanding threats that affect leading-edge technologies, including Bluetooth Low Energy, Software Defined Radio (SDR), ZigBee, and Z-Wave. Assemble a wireless attack toolkit and master the hacker's weaponsEffectively scan and enumerate WiFi networks and client devicesLeverage advanced wireless attack tools, including Wifite, Scapy, Pyrit, Metasploit, KillerBee, and the Aircrack-ng suiteDevelop and launch client-side attacks using Ettercap and the WiFi PineappleHack cellular networks with Airprobe, Kraken, Pytacle, and YateBTSExploit holes in WPA and WPA2 personal and enterprise security schemesLeverage rogue hotspots to deliver remote access software through fraudulent software updatesEavesdrop on Bluetooth Classic and Bluetooth Low Energy trafficCapture and evaluate proprietary wireless technology with Software Defined Radio toolsExplore vulnerabilities in ZigBee and Z-Wave-connected smart homes and officesAttack remote wireless networks using compromised Windows systems and built-in tools
The Internet for Dummies
Get up and running on the Internet--the fast and easy way If you're an Internet newcomer and want to get up to speed without all the intimidating technical jargon, The Internet For Dummies has you covered. With over 5,000,000 copies sold*, The Internet For Dummies is the #1 choice for Internet newcomers. Inside, you'll discover how to make the most of the Internet, get accustomed to popular sites, find the information and items you need fast, and stay away from the bad stuff floating around online. Catches you up on the latest online trends, from social networking sites to blogs and more Includes the latest on Google Chrome, getting good search results, and sharing files Covers choosing and connecting to an Internet provider, establishing an e-mail account, getting on the web, and finding the sites that matter most Now in its 14th edition, The Internet For Dummies covers the latest social networking tools, browser features, connection options, safety features, and so much more. Starting out with the basics, it walks you through getting online, picking an Internet provider, getting to know the different web browsers, dealing with e-mail and connecting with friends, finding the hottest sites to share photos and videos--and everything in between. *Includes all formats and all editions
Php: 20 Lessons to Successful Web Development
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Master PHP in 20 lessons--online video tutorials included!Based on the author's successful online courses, this complete, integrated learning tool provides easy-to-follow lessons that feature clear explanations, sample code and exercises, and video tutorials.Each lesson is designed to take you less than an hour to complete.PHP: 20 Lessons to Successful Web Developmentcovers the basics, including constants, superglobals, operators, and arrays. Next, you'l learn ow to work with multidimensional arrays, write unctions, manipulate objects, build web forms, anage security, use Ajax, and much more. ogether, the book and almost five hours of videotraining make learning PHP easier than ever!Ready-to-use code at www.mhprofessional.com
CSS & Css3: 20 Lessons to Successful Web Development
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Build real-world CSS skills in less than an hour per lesson--online video tutorials included!CSS & CSS3: 20 Lessons to Successful Web Development provides easy-to-follow lessons that use text, sample exercises, and video for the entry-level CSS programmer. Each lesson is designed to take you less than an hour to complete. All the basics of CSS through to more advanced features like adding dynamic effects, animation, transitions, and web fonts are covered. This practical guide also introduces just enough of the additional technologies and techniques--like HTML and JavaScript--needed to complete the lessons.One-hour lessons teach practical techniques that can be applied immediatelyWrap ups contain a summary, tips for further study, and self-test questionsOnline video accompanying each lesson offer valuable, step-by-step instruction
Healthcare Information Security and Privacy
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Operational, tested information security and privacypractices for the healthcare environmentWritten by an expert in the field with multiple industry certifications, this definitive resource fully addresses information security and privacy considerations and their implications within the business of patient care. The book begins with an overview of the organization, financing, and delivery of healthcare and discusses technology, terminology, and data management principles. The topic coverage continues across all aspects of information security and privacy, with a special emphasis on real-life scenarios in clinical practices and business operations in healthcare.Learn best practices for healthcare information security and privacy with detailed coverage of essential topics such as information governance, roles and occupations, risk assessment and management, incident response, patient rights, and cybersecurity. Written for a global audience, this comprehensive guide addresses U.S. laws and regulations as well as those within the European Union, the United Kingdom, and Canada.Healthcare Information Security and Privacy covers: Healthcare organizations and industryRegulatory environmentRisk-based decision makingNotifications of security and privacy eventsPatient rights and healthcare responsibilitiesAnatomy of a cyber attackProtecting digital health informationPrivacy and security impact on healthcare information technologyInformation governanceRisk assessment and management
Oracle Database 12c Security
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Best Practices for Comprehensive Oracle Database SecurityWritten by renowned experts from Oracle's National Security Group, Oracle Database 12c Security provides proven techniques for designing, implementing, and certifying secure Oracle Database systems in amultitenant architecture. The strategies are also applicable to standalone databases. This Oracle Press guide addresses everything from infrastructure to audit lifecycle and describes how to apply security measures in a holistic manner. The latest security features of Oracle Database 12c are explored in detail with practical and easy-to-understand examples.Connect users to databases in a secure mannerManage identity, authentication, and access controlImplement database application securityProvide security policies across enterprise applications using Real Application SecurityControl data access with OracleVirtual Private DatabaseControl sensitive data using data redaction and transparent sensitive data protectionControl data access with Oracle Label SecurityUse Oracle Database Vault and Transparent Data Encryption for compliance, cybersecurity, and insider threatsImplement auditing technologies, including Unified Audit TrailManage security policies and monitor a secure databaseenvironment with Oracle Enterprise Manager Cloud Control
Designing for Performance
As a web designer, you encounter tough choices when it comes to weighing aesthetics and performance. Good content, layout, images, and interactivity are essential for engaging your audience, and each of these elements have an enormous impact on page load time and the end-user experience. In this practical book, Lara Hogan helps you approach projects with page speed in mind, showing you how to test and benchmark which design choices are most critical. To get started, all you need are basic HTML and CSS skills and Photoshop experience. Topics include: The impact of page load time on your site, brand, and users Page speed basics: how browsers retrieve and render content Best practices for optimizing and loading images How to clean up HTML and CSS, and optimize web fonts Mobile-first design with performance goals by breakpoint Using tools to measure performance as your site evolves Methods for shaping an organization's performance culture
Advanced Persistent Threat Hacking
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Master the tactics and tools of the advanced persistent threat hackerIn this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the strategic issues that make all organizations vulnerable and provides noteworthy empirical evidence. You'll learn a proven APT Hacker Methodology for systematically targeting and infiltrating an organization and its IT systems. A unique, five-phased tactical approach to APT hacking is presented with real-world examples and hands-on techniques you can use immediately to execute very effective attacks.Review empirical data from actual attacks conducted byunsophisticated and elite APT hackers alikeLearn the APT Hacker Methodology--a systematic approach designed to ensure success, avoid failures, and minimize the risk of being caughtPerform in-depth reconnaissance to build a comprehensive understanding of the targetObtain non-technical data about the target, including open source, human, financial, and geographical intelligenceUse social engineering to compromise a specific system, application, or workstationIdentify and attack wireless networks and wireless client devicesSpearphish with hardware-based Trojan devicesPhysically infiltrate target facilities to obtain access to assets and compromise digital lily pads
Dreamweaver Cc
Dreamweaver CC is a powerful tool for designing all kinds of websites, from those with simple, static pages to interactive, media-driven sites for desktop, laptop, and mobile devices. But the program still doesn't include a printed guide to its amazing capabilities. That's where this Missing Manual comes in. With hands-on tutorials and coverage of every feature, you'll learn to build, deploy, and manage sites whether you're an experienced designer or just getting started. The important stuff you need to know: Dive into page design. Quickly learn the basics of working with text, images, links, and tables. Edit pages in Live view. Dynamically add elements to live pages and immediately see the results. Design once, and for all. Build fluid-grid sites that adapt themselves to desktop, tablet, and mobile devices. Troubleshoot your HTML. Use the new Element Quick View to reveal the hierarchy of page elements. Style with ease. Tap Dreamweaver's enhanced CSS Designer to copy and paste styles. Enhance Dreamweaver. Get new program features with add-ons that integrate directly with Dreamweaver. Bring your pages to life. Use jQuery UI to add interactive page elements like tabbed content panels. Create universal pages. Avoid browser incompatibility with workarounds.
Ipv6 Address Planning
If you're ready to join the move to IPv6, this comprehensive guide gets you started by showing you how to create an effective IPv6 address plan. In three example-driven sections--preparation, design, and maintenance--you'll learn principles and best practices for designing, deploying, and maintaining an address plan far beyond what's possible with IPv4 networks. During the course of the book, you'll walk through the process of building a sample address plan for a fictional company. Enterprise IT network architects, engineers, and administrators will see firsthand how IPv6 provides opportunities for creating an operationally efficient plan that's scalable, flexible, extensible, manageable, and durable. Explore IPv6 addressing basics, including representation, structure, and types Manage risks and costs by using a three-phase approach for deploying IPv6 Dig into IPv6 subnetting methods and learn how they differ from IPv4 Determine the appropriate size and type of the IPv6 allocation you require Apply current network management tools to IPv6 Use IPv6 renumbering methods that enable greater network scale and easier integration Implement policies and practices to keep IPv6 addresses reachable
Design for Kids
Emotion. Ego. Impatience. Stubbornness. Characteristics like these make creating sites and apps for kids a daunting proposition. However, with a bit of knowledge, you can design experiences that help children think, play, and learn. With Design for Kids, you'll learn how to create digital products for today's connected generation.
10 Don'ts on Your Digital Devices
In nontechnical language and engaging style, 10 Don'ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and phishing attacks and emerging threats that exploit cloud‐based storage and mobile apps.It's a wonderful thing to be able to use any of your cloud-synced assortment of desktop, portable, mobile, and wearable computing devices to work from home, shop at work, pay in a store, do your banking from a coffee shop, submit your tax returns from the airport, or post your selfies from the Oscars. But with this new world of connectivity and convenience comes a host of new perils for the lazy, the greedy, the unwary, and the ignorant. The 10 Don'ts can't do much for the lazy and the greedy, but they can save the unwary and the ignorant a world of trouble.10 Don'ts employs personal anecdotes and major news stories to illustrate what can--and all too often does--happen when users are careless with their devices and data. Each chapter describes a common type of blunder (one of the 10 Don'ts), reveals how it opens a particular port of entry to predatory incursions and privacy invasions, and details all the unpleasant consequences that may come from doing a Don't. The chapter then shows you how to diagnose and fix the resulting problems, how to undo or mitigate their costs, and how to protect against repetitions with specific software defenses and behavioral changes.Through ten vignettes told in accessible language and illustrated with helpful screenshots, 10 Don'ts teaches non-technical readers ten key lessons for protecting your digital security and privacy with the same care you reflexively give to your physical securityand privacy, so that you don't get phished, give up your password, get lost in the cloud, look for a free lunch, do secure things from insecure places, let the snoops in, be careless when going mobile, use dinosaurs, or forget the physical--in short, so that you don't trust anyone over...anything.Non-techie readers are not unsophisticated readers. They spend much of their waking lives on their devices and are bombarded with and alarmed by news stories of unimaginably huge data breaches, unimaginably sophisticated "advanced persistent threat" activities by criminal organizations and hostile nation-states, and unimaginably intrusive clandestine mass electronic surveillance and data mining sweeps by corporations, data brokers, and the various intelligence and law enforcement arms of our own governments. The authors lift the veil on these shadowy realms, show how the little guy is affected, and what individuals can do to shield themselves from big predators and snoops.
Iron-clad Java
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Proven Methods for Building Secure Java-Based Web ApplicationsDevelop, deploy, and maintain secure Java applications using the expert techniques and open source libraries described in this Oracle Press guide. Iron-Clad Java presents the processes required to build robust and secure applications from the start and explains how to eliminate existing security bugs. Best practices for authentication, access control, data protection, attack prevention, error handling, and much more are included. Using the practical advice and real-world examples provided in this authoritative resource, you'll gain valuable secure software engineering skills.Establish secure authentication and session management processesImplement a robust access control design for multi-tenant web applicationsDefend against cross-site scripting, cross-site request forgery, and clickjackingProtect sensitive data while it is stored or in transitPrevent SQL injection and other injection attacksEnsure safe file I/O and uploadUse effective logging, error handling, and intrusion detection methodsFollow a comprehensive secure software development lifecycle"In this book, Jim Manico and August Detlefsen tackle security education from a technical perspective and bring their wealth of industry knowledge and experience to application designers. A significant amount of thought was given to include the most useful and relevant security content for designers to defend their applications. This is not a book about security theories, it's the hard lessons learned from those who have been exploited, turned into actionable items for application designers, and condensed into print." ―From the Foreword by Milton Smith, Oracle Senior Principal Security Product Manager, Java
Information Assurance Handbook: Effective Computer Security and Risk Management Strategies
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Best practices for protecting critical data and systemsInformation Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. This practical resource explains how to integrate information assurance into your enterprise planning in a non-technical manner. It leads you through building an IT strategy and offers anorganizational approach to identifying, implementing, and controlling information assurance initiatives for small businesses and global enterprises alike.Common threats and vulnerabilities are described and applicable controls based on risk profiles are provided. Practical information assurance application examples are presented for select industries, including healthcare, retail, and industrial control systems. Chapter-endingcritical thinking exercises reinforce the material covered. An extensive list of scholarly works and international government standards is also provided in this detailed guide.Comprehensive coverage includes: Basic information assurance principles and conceptsInformation assurance management systemCurrent practices, regulations, and plansImpact of organizational structureAsset managementRisk management and mitigationHuman resource assuranceAdvantages of certification, accreditation, and assuranceInformation assurance in system development and acquisitionPhysical and environmental security controlsInformation assurance awareness, training, and educationAccess controlInformation security monitoring tools and methodsInformation assurance measurements and metricsIncident handling and computer forensicsBusiness continuity managementBackup and restorationCloud computing and outsourcing strategiesInformation assurance big data concerns
Dreamweaver MX: Advanced ASP Web Development
What's It All About? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Who's This Book for? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 What Do I Need to Begin? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 What's Inside? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Support and Feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Web Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Chapter 1: Introducing ASP 5 Go Dynamic with ASP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Familiarize Yourself with ASP Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 0 ASP Delimiters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . ? Response. Write . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 0 The