iOS 6 Recipes: A Problem-Solution Approach

  • ISBN-13: 9781430245995
  • Publisher: Apress
  • Publication date: 11/30/2012
  • Edition description: New
  • Edition number: 1
  • Pages: 696
  • Sales rank: 592,631
  • Product dimensions: 7.60 (w) x 9.20 (h) x 1.50 (d)

iOS6 Recipes: A Problem-Solution Approach is your code reference and guide to developing solutions on iPad, iPhone, and other iOS6 SDKdevices and platforms. This book provides in-depth code samples and discussions for scenarios that developers face every day. You’ll find numerous examples of real-world cases that will enable you to build fully functional applications quickly and efficiently.

The recipes included in this book are wide in scope, and have been geared toward the professional developer. You’ll find clear and concise code samples accompanying each recipe, and will be presented with cutting-edge solutions that bring forth the best that the iOS6 SDK has to offer. The recipes include:

  • Working with Autolayout to build flexible user interfaces that adapts to different screen sizes
  • Building applications that incorporate multimedia
  • Building location-aware apps
  • Understanding best practices for application design and development

You’ll find iOS6 Recipes: A Problem-Solution Approach to be an indispensable reference for all of your iOS development.

What you’ll learn

  • How to make your apps truly stand out with multimedia
  • How to integrate social network services like Twitter and Facebook into you apps
  • How to enhance your game apps with GameCenter
  • How to develop powerful apps with the latest Xcode
  • How to use Table Views and Collection Views in combination with Core Data to build powerful data-driven apps
  • How to build beautiful location-based apps with the new map engine

Who this book is for

This book is intended for developers familiar with the Objective-C programming language and with an interest in developing apps for the iPhone and iPad. While a basic knowledge of Objective-C is expected, developers at all levels of app development will benefit from this book.

Table of Contents

1. Application Recipes
2. Layout Recipes
3. Table and Collection View Recipes
4. Location Recipes
5. Motion Recipes
6. Map Recipes
7. Social Network Recipes
8. Camera Recipes
9. Multimedia Recipes
10. Image Recipes
11. User Data Recipes
12. Data Storage Recipes
13. Data Transmission Recipes
14. Game Kit Recipes

Colin Francis is an iOS developer from Gaithersburg, Maryland. After studying C++ and Java, he trained himself in iOS development and worked with Shawn Grimes of Shawnsbits, LLC in Baltimore. Now he lives in Miami, developing iOS apps independently with a focus on utilities and audio-focused software applications. He also works as an audio designer and sound technician, with experience on productions in both Miami and Washington, D.C.

Hans-Eric Grönlund is an active iOS and other app/applicationssoftware developer who took his first coding steps on his Sord M5 home computerback in 1985, playing with Basic and Assembler, and of course the fantastic game Guttang Gottong. He received his first programming job 1990 and have stayed in the business ever since, as a developer and a manager of software projects. Creating software and writing about it is both work and hobby for him. For more about him, visit http://www.hans-eric.com/.

Buy the Print, eBook, or Bundle today

CISA Review Manual 2012

  • Publisher: Isaca (December 1, 2011)
  • Language: English
  • ISBN-10: 1604202009
  • ISBN-13: 978-1604202007
  • Product Dimensions: 11 x 8.4 x 1.1 inches

The CISA Review Manual 2012 is a comprehensive reference guide designed to help individuals prepare for the CISA exam and understand the roles and responsibilities of an information systems (IS) auditor. The manual has been enhanced over the past editions and represents the most current, comprehensive, peer-reviewed IS audit, assurance, security and control resource available worldwide.

The 2012 manual is organized to assist candidates in understanding essential concepts and studying the following updated job practice areas:

  • The Process of Auditing Information Systems
  • Governance and Management of IT
  • Information Systems Acquisition, Development and Implementation
  • Information Systems Operations, Maintenance and Support
  • Protection of Information Assets

The CISA Review Manual 2012 also features an easy-to-use format. Each of the five chapters has been divided into two sections for focused study. Section one of each chapter contains the definitions and objectives for the five areas, as well as the corresponding tasks performed by IS auditors and knowledge statements (required to plan, manage and perform IS audits) that are tested on the exam. It also includes:

  • A map of the relationship of each task to the knowledge statements</il>
  • A reference guide for the knowledge statements, including the relevant concepts and explanations
  • References to specific content in Section Two for each knowledge statement
  • Sample practice questions and explanations of the answers
  • Suggested resources for further study

Section two of each chapter consists of reference material and content that supports the knowledge statements. The material enhances CISA candidates’ knowledge and/or understanding when preparing for the CISA certification exam. In addition, the CISA Review Manual 2012 includes brief chapter summaries focused on the main topics and case studies to assist candidates in understanding current practices. Also included are definitions of terms most commonly found on the exam.

This manual is excellent as a stand-alone document for individual study and as a guide or reference for study groups and chapters conducting local review courses. It also serves as an effective desk reference for IS auditors.

Buy the Print, eBook, or Bundle today

BackTrack 5 Cookbook


Language : English
Paperback : 296 pages [ 235mm x 191mm ]
Release Date : December 2012
ISBN : 184951738X
ISBN 13 : 9781849517386
Author(s) : Willie PritchettDavid De Smet

  • Learn to perform penetration tests with BackTrack 5
  • Nearly 100 recipes designed to teach penetration testing principles and build knowledge of BackTrack 5 Tools
  • Provides detailed step-by-step instructions on the usage of many of BackTrack’s popular and not-so- popular tools

What you will learn from this book

  • Install and set up BackTrack 5 on multiple platforms
  • Customize BackTrack to fit your individual needs
  • Exploit vulnerabilities found with Metasploit
  • Locate vulnerabilities Nessus and OpenVAS
  • Provide several solutions to escalate privileges on a compromised machine
  • Learn how to use BackTrack in all phases of a penetration test
  • Crack WEP/WPA/WPA2 Encryption
  • Learn how to monitor and eavesdrop on VOIP networks

Willie Pritchett

Willie Pritchett, MBA, is a seasoned developer and security enthusiast who has over 20 years of experience in the IT field. He is currently the Chief Executive at Mega Input Data Services, Inc., a full service database management firm specializing in secure and data-driven application development and also in staffing services. He has worked with state and local government agencies, as well as helped many small businesses reach their goals through technology. Willie has several industry certifications and currently trains students on various topics, including ethical hacking and penetration testing.

David De Smet

David De Smet has worked in the software industry since 2007 and is the founder and CEO of iSoftDev Co., where he is responsible for many varying tasks, including but not limited to consultant, customer requirements specification analysis, software design, software implementation, software testing, software maintenance, database development, and web design. He is so passionate about what he does that he spends inordinate amounts of time in the software development area. He also has a keen interest in the hacking and network security field and provides network security assessments to several companies.

Buy the Print, eBook, or Bundle today

Oracle Primavera Contract Management, Business Intelligence Publisher Edition v14


Language : English
Paperback : 208 pages [ 235mm x 191mm ]
Release Date : December 2012
ISBN : 1849686904
ISBN 13 : 9781849686907
Author(s) : Stephen D. Kelly

  • Contract Management concepts
  • Understand PCM from thirty-thousand feet to the ground
  • What you learn can be used when working with previous versions
  • Section on the new Primavera Unifier

What you will learn from this book

  • The concepts of Contract Management differs with each organization, learn how PCM is designed to work your way
  • Learn how to manage the over-abundance of data in a project and find what you are looking for quickly
  • There is too much information to keep in your head; use PCM for easy storage and retrieval.
  • The Cost Worksheet is your friend, learn how to use it to your benefit.
  • The Change Process can be daunting, learn the various methods to manage this potentially complex procedure.
  • Learn to set up the Change Process to match your business; don’t be forced into a box.
  • Payments are key to a successful business, learn how to manage them quickly and easily
  • Improperly managed submittals are the second highest reason for losing money on a project; learn that your project does not need to be part of this statistic.
  • Learn how to use the drawings module to know who has what and when.
  • Learn how PCM can help out in the field

Stephen D. Kelly

Stephen D. Kelly graduated from Oregon State University in 1982 with a degree in Construction Engineering Management. He got his start with a mid-sized general contractor who was willing to take a chance with this college graduate and they both saw the benefits of a computer system in the contracting world. Even though the personal computer had not yet come to the scene, Steve was very interested in how computers could help the construction industry to manage time, cost and improve efficiencies. Steve used his knowledge gained at the University and a lot of “on-the-job training” along with his love for computers to advance in the construction industry. He then moved to computerized estimating and building estimating databases to allow estimators to become more efficient and more accurate. The problem was that the more accurate the estimator became, the more projects he would lose as he was more accurate and not bound to miss anything. After working for many years in the construction industry in various positions and organizations, Steve decided he wanted to work for many companies at once and help them computerize their business in the construction industry. At this time, Primavera had already placed itself in the forefront of the computerized scheduling market with its DOS product, Primavera Project Planner (P3). Primavera then bought Expedition and started to market this as a project communication and cost controls tool to accompany their flagship product. The rest (as they say) is history. Steve has been implementing and training with the Primavera suite since 1985. He has worked around the world in many large organizations to help them understand project controls and how to properly implement and use a tool such as Oracle Primavera Contract Management. His company, Pro Management Systems, Inc. has built many third-party applications to enhance the abilities of PCM. Steve has a passion, and is known for his desire to understand a business before even talking about the various tools available. Like he says, “I want to learn how you do business and then figure out how to possibly improve those processes and wrap the tools around them.” He relates project management to the fireman profession. He has given speeches on this comparison saying, “Even if a fire is put out quickly, there is always residual damage to deal with.” In other words, it is better to keep the fires from starting at all. He likens that concept to project management and uses the Primavera tools to allow his clients to be proactive rather than reactive. He says, “Why not let the computer tell me what information needs my attention, it is much smarter and faster than I ever dreamed.” Steve has a wonderful, supportive wife of 30 years, five children, and two grandchildren. He lives on a small farm in Oregon where he enjoys time in the out of doors.

Buy the Print, eBook, or Bundle today

VMware vSphere Design


Title: VMware vSphere Design
By: Forbes Guthrie, Scott Lowe, Maish Saidel-Keesing
Publisher: Wiley / Sybex
Formats: Ebook
Ebook: February 2011
Pages: 456
Ebook ISBN:978-1-4571-2021-3| ISBN 10:1-4571-2021-6

What You Need to Make the Right Design Decisions

To design a VMware vSphere implementation for the performance, scalability, and ROI that your business needs, you must understand all the factors that influence the outcome. Written for engineers and architects who plan, deploy, maintain, and optimize vSphere solutions, this unique book helps you make the right design decisions.

Should you use ESX or ESXi? Build your vCenter as a virtual machine? Design your storage for capacity or for performance? Filled with real-world examples, clear explanations of tools and concepts, and coverage of such topics as network topology, security domains, storage infrastructure, and more, this is the perfect guide for deploying a new design or transforming an existing one. Inside, you’ll explore:

  • Fundamentals of designing VMware environments around your business goals
  • Details of the overall design process, vSphere hypervisor choice, server hardware selection and scaling, and your virtual machine blueprint
  • How networking and storage landscapes impact vSphere design
  • Different vCenter datacenter and cluster possibilities—tailoring availability and load-balancing options
  • How to create compelling vSphere architecture with security in mind
  • Basics of monitoring and capacity planning and the common tools available
  • Design decisions that a typical company encounters, questioning the choices made

Scott Lowe

Scott Lowe has been in the Information Technology field for 10 years, and has installed dozens of networks in environments ranging from homes with a few users, to small offices with a few dozen users, to sixty-building networks with a few thousand users. In addition to his position as the IT Director for the National Association of Attorneys General, he writes technical articles for CNet’s Techrepublic unit. He’s written more than 200 articles on a wide range of topics, from wireless security to installing web servers on Linux to discussions of tools for managing NetWare servers. The walls of his home are currently in the process of being patched up from his latest home networking venture.

View Scott Lowe’s full profile page.

Buy the Print, eBook, or Bundle today

English
Exit mobile version