دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 2
نویسندگان: Keith Moon. Chris Barker
سری:
ISBN (شابک) : 148426701X, 9781484267011
ناشر: Packt Publishing
سال نشر: 2021
تعداد صفحات: 488
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 21 مگابایت
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Swift 5.3 Cookbook: Improve productivity by applying proven recipes to develop code using the latest version of Swift به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب Swift 5.3 Cookbook: با استفاده از دستور العمل های اثبات شده برای توسعه کد با استفاده از آخرین نسخه Swift ، بهره وری را افزایش دهید نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
دستورالعملهای غنی از کد را کشف کنید، ایدهآل برای توسعهدهندگانی که جدیداً به سویفت کار میکنند و کسانی که به دنبال کشف جدیدترین ویژگیهای Swift 5.3 هستند
Swift یک زبان برنامه نویسی هیجان انگیز، چند پلتفرمی و همه منظوره است و این کتاب به شما کمک می کند. شما ویژگیهای آخرین نسخه آن، Swift 5.3 را بررسی میکنید.
کتاب با مقدمهای بر بلوکهای ساختمانی اصلی Swift 5.3، نحو آن و عملکردهای ساختارهای Swift آغاز میشود. سپس خواهید فهمید که چگونه Swift Playgrounds یک پلتفرم ایده آل برای نوشتن، اجرا و اشکال زدایی کد Swift شما ارائه می دهد. با پیشروی در فصلها، این کتاب به شما نشان میدهد که چگونه متغیرها را در چند تا یا مجموعه دستهبندی کنید، دادههای خود را با یک آرایه مرتب کنید، جفتهای کلید-مقدار را با فرهنگهای لغت ذخیره کنید و از مشاهدهگرهای ویژگی استفاده کنید. همچنین با ساختارهای تصمیم گیری و کنترل در سوئیفت آشنا می شوید، ویژگی های پیشرفته ای مانند ژنریک ها و اپراتورها را بررسی می کنید و عملکردهای خارج از کتابخانه استاندارد را بررسی می کنید. هنگامی که نحوه ساخت برنامه های iOS با استفاده از UIKit را یاد گرفتید، نحوه استفاده از Swift برای برنامه نویسی سمت سرور، اجرای Swift در لینوکس و بررسی Vapor را خواهید یافت. در نهایت، برخی از جدیدترین ویژگیهای Swift 5.3 را با استفاده از SwiftUI و Combine برای ساخت برنامههای تطبیقی و واکنشپذیر کشف خواهید کرد.
در پایان کتاب، راهحلهای مستقیمی را کشف خواهید کرد که به شما کمک میکند. هنگام توسعه کد با استفاده از Swift 5.3 سازنده می شوید.
اگر میخواهید با Swift 5.3 شروع کنید یا میخواهید با ویژگیهای متنوعی که ارائه میدهد، همراه با نکات و ترفندهایی برای کدنویسی کارآمد آشنا شوید. و برنامه های کاربردی بسازید، پس این کتاب برای شماست. دانش اولیه مفاهیم برنامه نویسی عمومی به درک مفاهیم کلیدی کمک می کند.
Discover code-rich recipes ideal for developers new to Swift and those looking to explore the latest features of Swift 5.3
Swift is an exciting, multi-platform, general-purpose programming language, and this book will help you explore the features of its latest version, Swift 5.3.
The book begins with an introduction to the basic building blocks of Swift 5.3, its syntax, and the functionalities of Swift constructs. You’ll then discover how Swift Playgrounds provide an ideal platform to write, execute, and debug your Swift code. As you advance through the chapters, the book will show you how to bundle variables into tuples or sets, order your data with an array, store key-value pairs with dictionaries, and use property observers. You’ll also learn about the decision-making and control structures in Swift, examine advanced features such as generics and operators, and explore functionalities outside of the standard library. Once you’ve learned how to build iOS applications using UIKit, you'll find out how to use Swift for server-side programming, run Swift on Linux, and investigate Vapor. Finally, you'll discover some of the newest features of Swift 5.3, using SwiftUI and Combine to build adaptive and reactive applications.
By the end of the book, you'll have discovered direct solutions that will help you become productive while developing code using Swift 5.3.
If you are looking to get started with Swift 5.3 or want to learn about the diverse features it offers, along with tips and tricks to efficiently code and build applications, then this book is for you. Basic knowledge of general programming concepts will assist with understanding key concepts.
Table of Contents About the Authors About the Technical Reviewer Acknowledgments Foreword Part I: Overview Chapter 1: Introduction Chapter 2: What Is Zero Trust? History and Evolution Forrester’s Zero Trust eXtended (ZTX) Model Gartner’s Approach to Zero Trust Our Perspective on Zero Trust Core Principles Expanded Principles A Working Definition Zero Trust Platform Requirements Summary Chapter 3: Zero Trust Architectures A Representative Enterprise Architecture Identity and Access Management Network Infrastructure (Firewalls, DNS, Load Balancers) Jump Boxes Privileged Access Management Network Access Control Intrusion Detection/Intrusion Prevention Virtual Private Network Next-Generation Firewalls Security Information and Event Management Web Server and Web Application Firewall Infrastructure as a Service Software as a Service and Cloud Access Security Brokers A Zero Trust Architecture The NIST Zero Trust Model A Conceptual Zero Trust Architecture Policy Components Types of Policy Enforcement Points What Is a Policy Enforcement Point? Zero Trust Deployment Models Resource-Based Deployment Model Enclave-Based Deployment Model Cloud-Routed Deployment Model Microsegmentation Deployment Model Summary Chapter 4: Zero Trust in Practice Google’s BeyondCorp PagerDuty’s Zero Trust Network The Software-Defined Perimeter and Zero Trust Mutual TLS Communications Single-Packet Authorization SDP Case Study Zero Trust and Your Enterprise Summary Part II: Zero Trust and Enterprise Architecture Components Chapter 5: Identity and Access Management IAM in Review Identity Stores (Directories) Databases LDAP Identity-as-a-Service Identity Lifecycle Lifecycle Management Identity Governance Access Management Authentication LDAP RADIUS SAML OAuth2 OpenID Connect (OIDC) Certificate-Based Authentication FIDO2 Mobile and Biometrics Authorization Zero Trust and IAM Authentication, Authorization, and Zero Trust Integration Enhancing Legacy System Authentication Zero Trust as Catalyst for Improving IAM Summary Chapter 6: Network Infrastructure Network Firewalls The Domain Name System Public DNS Servers Private DNS Servers Monitoring DNS for Security Wide Area Networks Load Balancers, Application Delivery Controllers, and API Gateways Web Application Firewalls Summary Chapter 7: Network Access Control Introduction to Network Access Control Zero Trust and Network Access Control Unmanaged Guest Network Access Managed Guest Network Access Managed vs. Unmanaged Guest Networks: A Debate Employee BYOD Device Posture Checks Device Discovery and Access Controls Summary Chapter 8: Intrusion Detection and Prevention Systems Types of IDPS Host-Based Systems Network-Based Systems Network Traffic Analysis and Encryption Zero Trust and IDPS Summary Chapter 9: Virtual Private Networks Enterprise VPNs and Security Zero Trust and VPNs Summary Chapter 10: Next-Generation Firewalls History and Evolution Zero Trust and NGFWs Network Traffic Encryption: Implications Network Architectures Summary Chapter 11: Security Operations Security Information and Event Management Security Orchestration, Automation, and Response Zero Trust in the Security Operations Center Enriched Log Data Orchestration and Automation (Triggers and Events) Authentication Trigger Resource Access Trigger Periodic (Session Expiration) Trigger External Trigger Zero Trust Querying for Additional Context (Authentication Trigger) SIEM/SOAR Invoking Zero Trust System (External Trigger) Indirect Integration (External Trigger) Summary Chapter 12: Privileged Access Management Password Vaulting Secrets Management Privileged Session Management Zero Trust and PAM Summary Chapter 13: Data Protection Data Types and Data Classification Data Lifecycle Data Creation Data Usage Data Destruction Data Security Zero Trust and Data Summary Chapter 14: Infrastructure and Platform as a Service Definitions Zero Trust and Cloud Services Service Meshes Summary Chapter 15: Software as a Service SaaS and Cloud Security Native SaaS Controls Secure Web Gateways Cloud Access Security Brokers Zero Trust and SaaS Zero Trust and Edge Services Summary Chapter 16: IoT Devices and “Things” IoT Device Networking and Security Challenges Zero Trust and IoT Devices Summary Part III: Putting It All Together Chapter 17: A Zero Trust Policy Model Policy Components Subject Criteria Action Target Access to Host 10.6.1.34 Access to Host appserver1.internal.example.com Access to Hosts on the Subnet 10.5.1.0/24 Access to Systems Tagged as “department=Marketing” Access to Systems Tagged as “stage=test” Condition Time of Day Is Between 08:00 and 18:00 User Has Performed a Valid MFA or Step-Up Authentication Within the Last 90 Minutes Device Posture Meets Requirements: Anti-malware Service Is Running Device Posture Meets Requirements: Endpoint Security Scan Completed Fewer Than 48 Hours Ago A Service Desk Ticket Is in an Open State for This Resource Both the Subject and the Target Must Be Servers Tagged as Being in a “Production” State Subject Criteria vs. Conditions Example Policies Policies, Applied Attributes Policy Scenarios Target-Initiated Access Microsegmentation Policy Evaluation and Enforcement Flows Authentication Trigger Access Trigger Session Expiration Trigger External Trigger Summary Chapter 18: Zero Trust Scenarios VPN Replacement/VPN Alternative Considerations Resources Users and User Experience Identity Providers Networking Recommendations Third-Party Access Considerations Architecture Users and User Experience Recommendations Cloud Migration Migration Categories Forklift Migration Refactor the Application Rewrite the Application Adopt SaaS Considerations Architecture Forklift Refactor the Application Rewrite the Application Adopt SaaS Users and User Experience Recommendations Service-to-Service Access Considerations Recommendations DevOps DevOps Phases Plan and Code Build and Test Release and Deploy Operate and Monitor Considerations Recommendations Mergers and Acquisitions Considerations Recommendations Divestiture Full Zero Trust Network/Network Transformation Considerations Recommendations Summary Chapter 19: Making Zero Trust Successful Zero Trust: A Strategic Approach (Top-Down) Governance Board Architecture Review Board Change Management Board Value Drivers Security Audit and Compliance Agility/New Business Initiatives Customer/Partner Integrations Technology Modernization Zero Trust: A Tactical Approach (Bottom-Up) Sample Zero Trust Deployments Scenario 1: A Tactical Zero Trust Project Define Problem Research Zero Trust Solutions Review Approach and Proposed Architecture POC Two Candidate Zero Trust Platforms Present POC Results Production Pilot Validate Pilot Results and Value Full Production Rollout Scenario 2: A Strategic Zero Trust Initiative Common Roadblocks Identity Management Immaturity Political Resistance Regulatory or Compliance Constraints Discovery and Visibility of Resources Analysis Paralysis Summary Chapter 20: Conclusion Chapter 21: Afterword Plan, Plan, Then Plan Some More Zero Trust Is (Unfortunately) Political Dream Big, Start Small Show Me the Money Digital Transformation Is Your Friend Appendix A: Further Reading: An Annotated List Industry Standards and Specifications Books Research Documents and Publications Index