Author: Regi Siriwardena
Publisher:
ISBN:
Category : Communism
Languages : en
Pages : 882
Book Description
Selected articles and essays by Regi Siriwardena, Sri Lankan author and critic on literature, motion picture, theatre, politics, and society; includes book reviews, film reviews, and some of his creative writings; most of the essays published earlier in Sri Lankan newspapers and magazines.
Selected Writings of Regi Siriwardena: Literature and the arts
Author: Regi Siriwardena
Publisher:
ISBN:
Category : Communism
Languages : en
Pages : 882
Book Description
Selected articles and essays by Regi Siriwardena, Sri Lankan author and critic on literature, motion picture, theatre, politics, and society; includes book reviews, film reviews, and some of his creative writings; most of the essays published earlier in Sri Lankan newspapers and magazines.
Publisher:
ISBN:
Category : Communism
Languages : en
Pages : 882
Book Description
Selected articles and essays by Regi Siriwardena, Sri Lankan author and critic on literature, motion picture, theatre, politics, and society; includes book reviews, film reviews, and some of his creative writings; most of the essays published earlier in Sri Lankan newspapers and magazines.
The Hindu Index
Author:
Publisher:
ISBN:
Category : Hindi newspapers
Languages : en
Pages : 1074
Book Description
Publisher:
ISBN:
Category : Hindi newspapers
Languages : en
Pages : 1074
Book Description
Poetry and Islands
Author: Rajeev S. Patke
Publisher: Rowman & Littlefield
ISBN: 1783484128
Category : Social Science
Languages : en
Pages : 197
Book Description
In all cultures and times, the poetic imagination has fed on the natural attributes of islands. An island is either a destination, or a home, or a place of exile and imprisonment, or simply a place to sojourn. It is an ideal vehicle for journeys treated as allegories, or for acts of finding that turn into acts of losing, or the reverse transformation. An island is not a continent; yet it can be an archipelago. An island is both a place in itself and a pretext for imaginings that need a local habitation and a name. It can give relief, and pleasure; or it can frustrate, isolate, and negate. Above all, it both invites and resists - or contains or constrains - the imagination. Poetry and Islands explores how islands become repositories of human longings and desires, a locus for some of our deepest fears and fantasies. It balances historical and geographical reference with a selective approach to poems and poets in English, and in translations into English. The study of particular poems in which islands figure in exemplary ways is balanced by a more detailed discussion of the poets who have played a major role in shaping human responses to islands on a global scale.
Publisher: Rowman & Littlefield
ISBN: 1783484128
Category : Social Science
Languages : en
Pages : 197
Book Description
In all cultures and times, the poetic imagination has fed on the natural attributes of islands. An island is either a destination, or a home, or a place of exile and imprisonment, or simply a place to sojourn. It is an ideal vehicle for journeys treated as allegories, or for acts of finding that turn into acts of losing, or the reverse transformation. An island is not a continent; yet it can be an archipelago. An island is both a place in itself and a pretext for imaginings that need a local habitation and a name. It can give relief, and pleasure; or it can frustrate, isolate, and negate. Above all, it both invites and resists - or contains or constrains - the imagination. Poetry and Islands explores how islands become repositories of human longings and desires, a locus for some of our deepest fears and fantasies. It balances historical and geographical reference with a selective approach to poems and poets in English, and in translations into English. The study of particular poems in which islands figure in exemplary ways is balanced by a more detailed discussion of the poets who have played a major role in shaping human responses to islands on a global scale.
Utopia and the Village in South Asian Literatures
Author: A. Mohan
Publisher: Springer
ISBN: 1137031891
Category : Literary Criticism
Languages : en
Pages : 242
Book Description
Shifting the postcolonial focus away from the city and towards the village, this book examines the rural as a trope in twentieth-century South Asian literatures to propose a new literary history based on notions of utopia, dystopia, and heterotopia and how these ideas have circulated in the literary and the cultural imaginaries of the subcontinent.
Publisher: Springer
ISBN: 1137031891
Category : Literary Criticism
Languages : en
Pages : 242
Book Description
Shifting the postcolonial focus away from the city and towards the village, this book examines the rural as a trope in twentieth-century South Asian literatures to propose a new literary history based on notions of utopia, dystopia, and heterotopia and how these ideas have circulated in the literary and the cultural imaginaries of the subcontinent.
Encyclopedia of Sri Lanka
Author: Charles A. Gunawardena
Publisher: Sterling Publishers Pvt. Ltd
ISBN: 9781932705485
Category : History
Languages : en
Pages : 432
Book Description
Over 1,100 alphabetically arranged entries examine the history, geography, people, government, economy, art, and religions of Sri Lanka.
Publisher: Sterling Publishers Pvt. Ltd
ISBN: 9781932705485
Category : History
Languages : en
Pages : 432
Book Description
Over 1,100 alphabetically arranged entries examine the history, geography, people, government, economy, art, and religions of Sri Lanka.
Gnuplot in Action
Author: Philipp K. Janert
Publisher: Simon and Schuster
ISBN: 1638352771
Category : Computers
Languages : en
Pages : 779
Book Description
Summary Gnuplot in Action, Second Edition is a major revision of this popular and authoritative guide for developers, engineers, and scientists who want to learn and use gnuplot effectively. Fully updated for gnuplot version 5, the book includes four pages of color illustrations and four bonus appendixes available in the eBook. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the Technology Gnuplot is an open-source graphics program that helps you analyze, interpret, and present numerical data. Available for Unix, Mac, and Windows, it is well-maintained, mature, and totally free. About the Book Gnuplot in Action, Second Edition is a major revision of this authoritative guide for developers, engineers, and scientists. The book starts with a tutorial introduction, followed by a systematic overview of gnuplot's core features and full coverage of gnuplot's advanced capabilities. Experienced readers will appreciate the discussion of gnuplot 5's features, including new plot types, improved text and color handling, and support for interactive, web-based display formats. The book concludes with chapters on graphical effects and general techniques for understanding data with graphs. It includes four pages of color illustrations. 3D graphics, false-color plots, heatmaps, and multivariate visualizations are covered in chapter-length appendixes available in the eBook. What's Inside Creating different types of graphs in detail Animations, scripting, batch operations Extensive discussion of terminals Updated to cover gnuplot version 5 About the Reader No prior experience with gnuplot is required. This book concentrates on practical applications of gnuplot relevant to users of all levels. About the Author Philipp K. Janert, PhD, is a programmer and scientist. He is the author of several books on data analysis and applied math and has been a gnuplot power user and developer for over 20 years. Table of Contents PART 1 GETTING STARTED Prelude: understanding data with gnuplot Tutorial: essential gnuplot The heart of the matter: the plot command PART 2 CREATING GRAPHS Managing data sets and files Practical matters: strings, loops, and history A catalog of styles Decorations: labels, arrows, and explanations All about axes PART 3 MASTERING TECHNICALITIES Color, style, and appearance Terminals and output formats Automation, scripting, and animation Beyond the defaults: workflow and styles PART 4 UNDERSTANDING DATA Basic techniques of graphical analysis Topics in graphical analysis Coda: understanding data with graphs
Publisher: Simon and Schuster
ISBN: 1638352771
Category : Computers
Languages : en
Pages : 779
Book Description
Summary Gnuplot in Action, Second Edition is a major revision of this popular and authoritative guide for developers, engineers, and scientists who want to learn and use gnuplot effectively. Fully updated for gnuplot version 5, the book includes four pages of color illustrations and four bonus appendixes available in the eBook. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the Technology Gnuplot is an open-source graphics program that helps you analyze, interpret, and present numerical data. Available for Unix, Mac, and Windows, it is well-maintained, mature, and totally free. About the Book Gnuplot in Action, Second Edition is a major revision of this authoritative guide for developers, engineers, and scientists. The book starts with a tutorial introduction, followed by a systematic overview of gnuplot's core features and full coverage of gnuplot's advanced capabilities. Experienced readers will appreciate the discussion of gnuplot 5's features, including new plot types, improved text and color handling, and support for interactive, web-based display formats. The book concludes with chapters on graphical effects and general techniques for understanding data with graphs. It includes four pages of color illustrations. 3D graphics, false-color plots, heatmaps, and multivariate visualizations are covered in chapter-length appendixes available in the eBook. What's Inside Creating different types of graphs in detail Animations, scripting, batch operations Extensive discussion of terminals Updated to cover gnuplot version 5 About the Reader No prior experience with gnuplot is required. This book concentrates on practical applications of gnuplot relevant to users of all levels. About the Author Philipp K. Janert, PhD, is a programmer and scientist. He is the author of several books on data analysis and applied math and has been a gnuplot power user and developer for over 20 years. Table of Contents PART 1 GETTING STARTED Prelude: understanding data with gnuplot Tutorial: essential gnuplot The heart of the matter: the plot command PART 2 CREATING GRAPHS Managing data sets and files Practical matters: strings, loops, and history A catalog of styles Decorations: labels, arrows, and explanations All about axes PART 3 MASTERING TECHNICALITIES Color, style, and appearance Terminals and output formats Automation, scripting, and animation Beyond the defaults: workflow and styles PART 4 UNDERSTANDING DATA Basic techniques of graphical analysis Topics in graphical analysis Coda: understanding data with graphs
Microservices Security in Action
Author: Wajjakkara Kankanamge Anthony Nuwan Dias
Publisher: Simon and Schuster
ISBN: 1638350116
Category : Computers
Languages : en
Pages : 614
Book Description
”A complete guide to the challenges and solutions in securing microservices architectures.” —Massimo Siani, FinDynamic Key Features Secure microservices infrastructure and code Monitoring, access control, and microservice-to-microservice communications Deploy securely using Kubernetes, Docker, and the Istio service mesh. Hands-on examples and exercises using Java and Spring Boot Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. Microservices Security in Action teaches you how to address microservices-specific security challenges throughout the system. This practical guide includes plentiful hands-on exercises using industry-leading open-source tools and examples using Java and Spring Boot. About The Book Design and implement security into your microservices from the start. Microservices Security in Action teaches you to assess and address security challenges at every level of a Microservices application, from APIs to infrastructure. You’ll find effective solutions to common security problems, including throttling and monitoring, access control at the API gateway, and microservice-to-microservice communication. Detailed Java code samples, exercises, and real-world business use cases ensure you can put what you’ve learned into action immediately. What You Will Learn Microservice security concepts Edge services with an API gateway Deployments with Docker, Kubernetes, and Istio Security testing at the code level Communications with HTTP, gRPC, and Kafka This Book Is Written For For experienced microservices developers with intermediate Java skills. About The Author Prabath Siriwardena is the vice president of security architecture at WSO2. Nuwan Dias is the director of API architecture at WSO2. They have designed secure systems for many Fortune 500 companies. Table of Contents PART 1 OVERVIEW 1 Microservices security landscape 2 First steps in securing microservices PART 2 EDGE SECURITY 3 Securing north/south traffic with an API gateway 4 Accessing a secured microservice via a single-page application 5 Engaging throttling, monitoring, and access control PART 3 SERVICE-TO-SERVICE COMMUNICATIONS 6 Securing east/west traffic with certificates 7 Securing east/west traffic with JWT 8 Securing east/west traffic over gRPC 9 Securing reactive microservices PART 4 SECURE DEPLOYMENT 10 Conquering container security with Docker 11 Securing microservices on Kubernetes 12 Securing microservices with Istio service mesh PART 5 SECURE DEVELOPMENT 13 Secure coding practices and automation
Publisher: Simon and Schuster
ISBN: 1638350116
Category : Computers
Languages : en
Pages : 614
Book Description
”A complete guide to the challenges and solutions in securing microservices architectures.” —Massimo Siani, FinDynamic Key Features Secure microservices infrastructure and code Monitoring, access control, and microservice-to-microservice communications Deploy securely using Kubernetes, Docker, and the Istio service mesh. Hands-on examples and exercises using Java and Spring Boot Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. Microservices Security in Action teaches you how to address microservices-specific security challenges throughout the system. This practical guide includes plentiful hands-on exercises using industry-leading open-source tools and examples using Java and Spring Boot. About The Book Design and implement security into your microservices from the start. Microservices Security in Action teaches you to assess and address security challenges at every level of a Microservices application, from APIs to infrastructure. You’ll find effective solutions to common security problems, including throttling and monitoring, access control at the API gateway, and microservice-to-microservice communication. Detailed Java code samples, exercises, and real-world business use cases ensure you can put what you’ve learned into action immediately. What You Will Learn Microservice security concepts Edge services with an API gateway Deployments with Docker, Kubernetes, and Istio Security testing at the code level Communications with HTTP, gRPC, and Kafka This Book Is Written For For experienced microservices developers with intermediate Java skills. About The Author Prabath Siriwardena is the vice president of security architecture at WSO2. Nuwan Dias is the director of API architecture at WSO2. They have designed secure systems for many Fortune 500 companies. Table of Contents PART 1 OVERVIEW 1 Microservices security landscape 2 First steps in securing microservices PART 2 EDGE SECURITY 3 Securing north/south traffic with an API gateway 4 Accessing a secured microservice via a single-page application 5 Engaging throttling, monitoring, and access control PART 3 SERVICE-TO-SERVICE COMMUNICATIONS 6 Securing east/west traffic with certificates 7 Securing east/west traffic with JWT 8 Securing east/west traffic over gRPC 9 Securing reactive microservices PART 4 SECURE DEPLOYMENT 10 Conquering container security with Docker 11 Securing microservices on Kubernetes 12 Securing microservices with Istio service mesh PART 5 SECURE DEVELOPMENT 13 Secure coding practices and automation
South Asian Writers in English
Author: Fakrul Alam
Publisher: Dictionary of Literary Biograp
ISBN:
Category : Biography & Autobiography
Languages : en
Pages : 536
Book Description
Essays on South Asian writers in English from all parts of the subcontinent who share a common fascination with the English language. South Asian writing in English is thriving and worth reading and studying, either as a whole or separately as Indian, Pakistani, Sri Lankan or Bangladeshi literature. Discusses the fate of the English language after the British left South Asia and the exile's return to a country that has changed and the search for roots.
Publisher: Dictionary of Literary Biograp
ISBN:
Category : Biography & Autobiography
Languages : en
Pages : 536
Book Description
Essays on South Asian writers in English from all parts of the subcontinent who share a common fascination with the English language. South Asian writing in English is thriving and worth reading and studying, either as a whole or separately as Indian, Pakistani, Sri Lankan or Bangladeshi literature. Discusses the fate of the English language after the British left South Asia and the exile's return to a country that has changed and the search for roots.
Spring Security in Action
Author: Laurentiu Spilca
Publisher: Manning
ISBN: 1617297739
Category : Computers
Languages : en
Pages : 558
Book Description
Spring Security in Action shows you how to prevent cross-site scripting and request forgery attacks before they do damage. You’ll start with the basics, simulating password upgrades and adding multiple types of authorization. As your skills grow, you'll adapt Spring Security to new architectures and create advanced OAuth2 configurations. By the time you're done, you'll have a customized Spring Security configuration that protects against threats both common and extraordinary. Summary While creating secure applications is critically important, it can also be tedious and time-consuming to stitch together the required collection of tools. For Java developers, the powerful Spring Security framework makes it easy for you to bake security into your software from the very beginning. Filled with code samples and practical examples, Spring Security in Action teaches you how to secure your apps from the most common threats, ranging from injection attacks to lackluster monitoring. In it, you'll learn how to manage system users, configure secure endpoints, and use OAuth2 and OpenID Connect for authentication and authorization. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology Security is non-negotiable. You rely on Spring applications to transmit data, verify credentials, and prevent attacks. Adopting "secure by design" principles will protect your network from data theft and unauthorized intrusions. About the book Spring Security in Action shows you how to prevent cross-site scripting and request forgery attacks before they do damage. You’ll start with the basics, simulating password upgrades and adding multiple types of authorization. As your skills grow, you'll adapt Spring Security to new architectures and create advanced OAuth2 configurations. By the time you're done, you'll have a customized Spring Security configuration that protects against threats both common and extraordinary. What's inside Encoding passwords and authenticating users Securing endpoints Automating security testing Setting up a standalone authorization server About the reader For experienced Java and Spring developers. About the author Laurentiu Spilca is a dedicated development lead and trainer at Endava, with over ten years of Java experience. Table of Contents PART 1 - FIRST STEPS 1 Security Today 2 Hello Spring Security PART 2 - IMPLEMENTATION 3 Managing users 4 Dealing with passwords 5 Implementing authentication 6 Hands-on: A small secured web application 7 Configuring authorization: Restricting access 8 Configuring authorization: Applying restrictions 9 Implementing filters 10 Applying CSRF protection and CORS 11 Hands-on: A separation of responsibilities 12 How does OAuth 2 work? 13 OAuth 2: Implementing the authorization server 14 OAuth 2: Implementing the resource server 15 OAuth 2: Using JWT and cryptographic signatures 16 Global method security: Pre- and postauthorizations 17 Global method security: Pre- and postfiltering 18 Hands-on: An OAuth 2 application 19 Spring Security for reactive apps 20 Spring Security testing
Publisher: Manning
ISBN: 1617297739
Category : Computers
Languages : en
Pages : 558
Book Description
Spring Security in Action shows you how to prevent cross-site scripting and request forgery attacks before they do damage. You’ll start with the basics, simulating password upgrades and adding multiple types of authorization. As your skills grow, you'll adapt Spring Security to new architectures and create advanced OAuth2 configurations. By the time you're done, you'll have a customized Spring Security configuration that protects against threats both common and extraordinary. Summary While creating secure applications is critically important, it can also be tedious and time-consuming to stitch together the required collection of tools. For Java developers, the powerful Spring Security framework makes it easy for you to bake security into your software from the very beginning. Filled with code samples and practical examples, Spring Security in Action teaches you how to secure your apps from the most common threats, ranging from injection attacks to lackluster monitoring. In it, you'll learn how to manage system users, configure secure endpoints, and use OAuth2 and OpenID Connect for authentication and authorization. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology Security is non-negotiable. You rely on Spring applications to transmit data, verify credentials, and prevent attacks. Adopting "secure by design" principles will protect your network from data theft and unauthorized intrusions. About the book Spring Security in Action shows you how to prevent cross-site scripting and request forgery attacks before they do damage. You’ll start with the basics, simulating password upgrades and adding multiple types of authorization. As your skills grow, you'll adapt Spring Security to new architectures and create advanced OAuth2 configurations. By the time you're done, you'll have a customized Spring Security configuration that protects against threats both common and extraordinary. What's inside Encoding passwords and authenticating users Securing endpoints Automating security testing Setting up a standalone authorization server About the reader For experienced Java and Spring developers. About the author Laurentiu Spilca is a dedicated development lead and trainer at Endava, with over ten years of Java experience. Table of Contents PART 1 - FIRST STEPS 1 Security Today 2 Hello Spring Security PART 2 - IMPLEMENTATION 3 Managing users 4 Dealing with passwords 5 Implementing authentication 6 Hands-on: A small secured web application 7 Configuring authorization: Restricting access 8 Configuring authorization: Applying restrictions 9 Implementing filters 10 Applying CSRF protection and CORS 11 Hands-on: A separation of responsibilities 12 How does OAuth 2 work? 13 OAuth 2: Implementing the authorization server 14 OAuth 2: Implementing the resource server 15 OAuth 2: Using JWT and cryptographic signatures 16 Global method security: Pre- and postauthorizations 17 Global method security: Pre- and postfiltering 18 Hands-on: An OAuth 2 application 19 Spring Security for reactive apps 20 Spring Security testing
API Security in Action
Author: Neil Madden
Publisher: Manning
ISBN: 1617296023
Category : Computers
Languages : en
Pages : 574
Book Description
API Security in Action teaches you how to create secure APIs for any situation. By following this hands-on guide you’ll build a social network API while mastering techniques for flexible multi-user security, cloud key management, and lightweight cryptography. Summary A web API is an efficient way to communicate with an application or service. However, this convenience opens your systems to new security risks. API Security in Action gives you the skills to build strong, safe APIs you can confidently expose to the world. Inside, you’ll learn to construct secure and scalable REST APIs, deliver machine-to-machine interaction in a microservices architecture, and provide protection in resource-constrained IoT (Internet of Things) environments. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology APIs control data sharing in every service, server, data store, and web client. Modern data-centric designs—including microservices and cloud-native applications—demand a comprehensive, multi-layered approach to security for both private and public-facing APIs. About the book API Security in Action teaches you how to create secure APIs for any situation. By following this hands-on guide you’ll build a social network API while mastering techniques for flexible multi-user security, cloud key management, and lightweight cryptography. When you’re done, you’ll be able to create APIs that stand up to complex threat models and hostile environments. What's inside Authentication Authorization Audit logging Rate limiting Encryption About the reader For developers with experience building RESTful APIs. Examples are in Java. About the author Neil Madden has in-depth knowledge of applied cryptography, application security, and current API security technologies. He holds a Ph.D. in Computer Science. Table of Contents PART 1 - FOUNDATIONS 1 What is API security? 2 Secure API development 3 Securing the Natter API PART 2 - TOKEN-BASED AUTHENTICATION 4 Session cookie authentication 5 Modern token-based authentication 6 Self-contained tokens and JWTs PART 3 - AUTHORIZATION 7 OAuth2 and OpenID Connect 8 Identity-based access control 9 Capability-based security and macaroons PART 4 - MICROSERVICE APIs IN KUBERNETES 10 Microservice APIs in Kubernetes 11 Securing service-to-service APIs PART 5 - APIs FOR THE INTERNET OF THINGS 12 Securing IoT communications 13 Securing IoT APIs
Publisher: Manning
ISBN: 1617296023
Category : Computers
Languages : en
Pages : 574
Book Description
API Security in Action teaches you how to create secure APIs for any situation. By following this hands-on guide you’ll build a social network API while mastering techniques for flexible multi-user security, cloud key management, and lightweight cryptography. Summary A web API is an efficient way to communicate with an application or service. However, this convenience opens your systems to new security risks. API Security in Action gives you the skills to build strong, safe APIs you can confidently expose to the world. Inside, you’ll learn to construct secure and scalable REST APIs, deliver machine-to-machine interaction in a microservices architecture, and provide protection in resource-constrained IoT (Internet of Things) environments. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology APIs control data sharing in every service, server, data store, and web client. Modern data-centric designs—including microservices and cloud-native applications—demand a comprehensive, multi-layered approach to security for both private and public-facing APIs. About the book API Security in Action teaches you how to create secure APIs for any situation. By following this hands-on guide you’ll build a social network API while mastering techniques for flexible multi-user security, cloud key management, and lightweight cryptography. When you’re done, you’ll be able to create APIs that stand up to complex threat models and hostile environments. What's inside Authentication Authorization Audit logging Rate limiting Encryption About the reader For developers with experience building RESTful APIs. Examples are in Java. About the author Neil Madden has in-depth knowledge of applied cryptography, application security, and current API security technologies. He holds a Ph.D. in Computer Science. Table of Contents PART 1 - FOUNDATIONS 1 What is API security? 2 Secure API development 3 Securing the Natter API PART 2 - TOKEN-BASED AUTHENTICATION 4 Session cookie authentication 5 Modern token-based authentication 6 Self-contained tokens and JWTs PART 3 - AUTHORIZATION 7 OAuth2 and OpenID Connect 8 Identity-based access control 9 Capability-based security and macaroons PART 4 - MICROSERVICE APIs IN KUBERNETES 10 Microservice APIs in Kubernetes 11 Securing service-to-service APIs PART 5 - APIs FOR THE INTERNET OF THINGS 12 Securing IoT communications 13 Securing IoT APIs