

Unravel the mysteries of blockchains
Blockchain technologies are disrupting some of the world's biggest industries. Blockchain For Dummies provides a fast way to catch up with the essentials of this quickly evolving tech. Written by an author involved in founding and analyzing blockchain solutions, this book serves to help those who need to understand what a blockchain can do (and can't do).
This revised edition walks you through how a blockchainsecurely records data across independent networks. It offers a tour of some of the world's best-known blockchains, including those that power Bitcoin and other cryptocurrencies. It also provides a glance at how blockchain solutions are affecting the worlds of finance, supply chain management, insurance, and governments.
- Get a clear picture of what a blockchain can do
- Learn how blockchains rule cryptocurrency and smart contracts
- Discover current blockchains and how each of them work
- Test blockchain apps
Blockchain has become the critical buzzword in the world of financial technology and transaction security -- and now you can make sense of it with the help of this essential guide.
Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used.
While developing a better understanding of each language, the book presents real-world scenarios and tool development that can be incorporated into a tester's toolkit. This completely updated edition focuses on an expanded discussion on the use of Powershell, and includes practical updates to all tools and coverage.

Get ready to make SQL easy
Updated for the latest version of SQL, the new edition of this perennial bestseller shows programmers and web developers how to use SQL to build relational databases and get valuable information from them. Covering everything you need to know to make working with SQL easier than ever, topics include how to use SQL to structure a DBMS and implement a database design; secure a database; and retrieve information from a database; and much more.
SQL is the international standard database language used to create, access, manipulate, maintain, and store information in relational database management systems (DBMS) such as Access, Oracle, SQL Server, and MySQL. SQL adds powerful data manipulation and retrieval capabilities to conventional languages--and this book shows you how to harness the core element of relational databases with ease.
- Server platform that gives you choices of development languages, data types, on-premises or cloud, and operating systems
- Find great examples on the use of temporal data
- Jump right in--without previous knowledge of database programming or SQL
As database-driven websites continue to grow in popularity--and complexity--SQL For Dummies is the easy-to-understand, go-to resource you need to use it seamlessly.

Master Oracle CRM On Demand
Foster long-term customer relationships and accelerate productivity using the proven strategies and best practices in this Oracle Press guide. Oracle CRM On Demand Deployment Guide shows how to set up, customize, and manage a dynamic software-as-a-service solution across your enterprise. Develop implementation plans, maximize user adoption, build applets and portals, integrate Web 2.0 features, and use analytics dashboards. The latest design, tuning, and data security techniques are also covered in this practical resource.
- Establish business objectives, project requirements, and key success metrics
- Staff an implementation team and develop effective rollout plans
- Configure, deploy, and administer Oracle CRM On Demand
- Manage users and restrict access using roles and privileges
- Customize sales, marketing, and service processes with the object model
- Embed external content and URLs using the web services API
- Distribute real-time BI using dashboards and advanced reporting tools
- Incorporate web tabs, mashups, Google services, and RSS feeds
- Use workflow to automate business process management

Network security is not simply about building impenetrable walls--determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.
In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks--no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools. You'll learn how to:-Determine where to deploy NSM platforms, and size them for the monitored networks
-Deploy stand-alone or distributed NSM installations
-Use command line and graphical packet analysis tools, and NSM consoles
-Interpret network evidence from server-side and client-side intrusions
-Integrate threat intelligence into NSM software to identify sophisticated adversaries There's no foolproof way to keep attackers out of your network. But when they get in, you'll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.

Introduction to Data Mining presents fundamental concepts and algorithms for those learning data mining for the first time. Each major topic is organized into two chapters, beginning with basic concepts that provide necessary background for understanding each data mining technique, followed by more advanced concepts and algorithms.