Book picks similar to
AWS Penetration Testing: Implement various security strategies on AWS using tools such as Kali Linux, Metasploit, and Nmap by Jonathan Helmus
cyber-security
professional-reading
security
virtual-shelf
Advanced Computer Architecture: Parallelism, Scalability, Programmability
Kai Hwang - 1992
It deals with advanced computer architecture and parallel processing systems and techniques, providing an integrated study of computer hardware and software systems, and the material is suitable for use on courses found in computer science, computer engineering, or electrical engineering departments.
MongoDB Applied Design Patterns
Rick Copeland - 2013
You’ll learn how to apply MongoDB design patterns to several challenging domains, such as ecommerce, content management, and online gaming. Using Python and JavaScript code examples, you’ll discover how MongoDB lets you scale your data model while simplifying the development process.Many businesses launch NoSQL databases without understanding the techniques for using their features most effectively. This book demonstrates the benefits of document embedding, polymorphic schemas, and other MongoDB patterns for tackling specific big data use cases, including:Operational intelligence: Perform real-time analytics of business dataEcommerce: Use MongoDB as a product catalog master or inventory management systemContent management: Learn methods for storing content nodes, binary assets, and discussionsOnline advertising networks: Apply techniques for frequency capping ad impressions, and keyword targeting and biddingSocial networking: Learn how to store a complex social graph, modeled after Google+Online gaming: Provide concurrent access to character and world data for a multiplayer role-playing game
The Problem with Software: Why Smart Engineers Write Bad Code
Adam Barr - 2018
As the size and complexity of commercial software have grown, the gap between academic computer science and industry has widened. It's an open secret that there is little engineering in software engineering, which continues to rely not on codified scientific knowledge but on intuition and experience.Barr, who worked as a programmer for more than twenty years, describes how the industry has evolved, from the era of mainframes and Fortran to today's embrace of the cloud. He explains bugs and why software has so many of them, and why today's interconnected computers offer fertile ground for viruses and worms. The difference between good and bad software can be a single line of code, and Barr includes code to illustrate the consequences of seemingly inconsequential choices by programmers. Looking to the future, Barr writes that the best prospect for improving software engineering is the move to the cloud. When software is a service and not a product, companies will have more incentive to make it good rather than "good enough to ship."
The Fifth Western Novel MEGAPACK ®: 4 Novels of the Old West
Walter A. Tompkins - 2015
Tompkins ... Fleeing a posse, Cleve Logan boards a riverboat loaded with outlaws. Hands are dealt in a desperate game -- and Death will take the last trick!THE RENEGADE HILLS, by Allan K. Echols ... Saddle up -- and ride hell-bent-for-leather down the trail to a hidden valley -- but keep your guns loose in your holsters, 'cause you're riding to an outlaw showdown in the Renegade Hills!LAST-CHANCE RANGE, by Dean Owen ... Byrd Elkhart called the Territory his private range. He strung his barbed wire across forty miles of it, and the other ranchers just stood by with their tails between their legs. But then a different breed of man showed up in the person of Clay Janner, of Texas -- and he was going to drive his scrawny herd over the range even if he had to turn the whole Territory into a six-gun shambles!POWDER SMOKE, by Jackson Gregory ... "Double pay," Bart Warbuck told his gunmen, "and give hundred more to the one who gets Jeff Cody!" -- It was as simple as that if you were Warbuck, had 30 killers on your payroll, and made the law whatever you wanted it to be. But it was hard to take if you were young Cody, and if the only gun you could rely on was the one in your belt. And if you alone could stop Bart Warbuck!If you enjoy this volume of classic Westerns, don't forget to search your favorite ebook store for "Wildside Press Megapack" to see the 220+ other entries in this series, including not just historical fiction, but mysteries, adventure, science fiction, fantasy, horror -- and much, much more!
Only the Innocent / The Back Road / Sleep Tight
Rachel Abbott - 2017
The killer is a woman. But what secrets lie beneath the surface, so dark that a man has to die? Tom Douglas has a terrible dilemma to face - whether to punish the guilty, or protect the innocent. The Back Road – A girl lies close to death in a dark, deserted lane. A driver drags her body to the side of the road. A shadowy figure hides in the trees, watching and waiting. Only one person knows the whole story. And that person will protect the truth no matter what the cost. Sleep Tight – When Olivia Brookes calls the police to report that her husband and children are missing, she believes she will never see them again. Now, two years later, it’s Olivia who has disappeared… How far would you go to hold on to the people you love? Tom Douglas is the man tasked with finding the truth. But nothing is ever as it appears… With over 5000 Five Star reviews across the three titles, this boxed set of thrillers will keep you reading long into the night. Praise for Rachel Abbott’s books ‘I am in awe of Rachel Abbott’s plotting!’ Elizabeth Haynes – author of Into the Darkest Corner ‘Abbott continues to be an outstanding force in the world of thriller writing.’ LJ Ross – author of Holy Island ‘A properly addictive, leave-the-light-on thriller.’ Red Magazine
Steve and the Swamp Witch of Endor: The Ultimate Minecraft Comic Book Volume 2 (An Unofficial Minecraft Comic Book)
Herobrine Comics - 2015
Jump into this epic adventure against zombies, skeletons, creepers, and a surprise enemy at the end. Will Steve and Piggy have the courage to defeat the Swamp Witch of Endor? Buy your copy today and find out! Buy your copy now!
Pragmatic Version Control Using Git
Travis Swicegood - 2008
High-profile projects such as the Linux Kernel, Mozilla, Gnome, and Ruby on Rails are now using Distributed Version Control Systems (DVCS) instead of the old stand-bys of CVS or Subversion.Git is a modern, fast, DVCS. But understanding how it fits into your development can be a daunting task without an introduction to the new concepts. Whether you're just starting out as a professional programmer or are an old hand, this book will get you started using Git in this new distributed world. Whether you're making the switch from a traditional centralized version control system or are a new programmer just getting started, this book prepares you to start using Git in your everyday programming.Pragmatic Version Control Using Git starts with an overview of version control systems, and shows how being distributed enables you to work more efficiently in our increasingly mobile society. It then progresses through the basics necessary to get started using Git.You'll get a thorough overview of how to take advantage of Git. By the time you finish this book you'll have a firm grounding in how to use Git, both by yourself and as part of a team.Learn how to use how to use Git to protect all the pieces of your project Work collaboratively in a distributed environment Learn how to use Git's cheap branches to streamline your development Install and administer a Git server to share your repository
Agile Data Warehouse Design: Collaborative Dimensional Modeling, from Whiteboard to Star Schema
Lawrence Corr - 2011
This book describes BEAM✲, an agile approach to dimensional modeling, for improving communication between data warehouse designers, BI stakeholders and the whole DW/BI development team. BEAM✲ provides tools and techniques that will encourage DW/BI designers and developers to move away from their keyboards and entity relationship based tools and model interactively with their colleagues. The result is everyone thinks dimensionally from the outset! Developers understand how to efficiently implement dimensional modeling solutions. Business stakeholders feel ownership of the data warehouse they have created, and can already imagine how they will use it to answer their business questions. Within this book, you will learn: ✲ Agile dimensional modeling using Business Event Analysis & Modeling (BEAM✲) ✲ Modelstorming: data modeling that is quicker, more inclusive, more productive, and frankly more fun! ✲ Telling dimensional data stories using the 7Ws (who, what, when, where, how many, why and how) ✲ Modeling by example not abstraction; using data story themes, not crow's feet, to describe detail ✲ Storyboarding the data warehouse to discover conformed dimensions and plan iterative development ✲ Visual modeling: sketching timelines, charts and grids to model complex process measurement - simply ✲ Agile design documentation: enhancing star schemas with BEAM✲ dimensional shorthand notation ✲ Solving difficult DW/BI performance and usability problems with proven dimensional design patterns Lawrence Corr is a data warehouse designer and educator. As Principal of DecisionOne Consulting, he helps clients to review and simplify their data warehouse designs, and advises vendors on visual data modeling techniques. He regularly teaches agile dimensional modeling courses worldwide and has taught dimensional DW/BI skills to thousands of students. Jim Stagnitto is a data warehouse and master data management architect specializing in the healthcare, financial services, and information service industries. He is the founder of the data warehousing and data mining consulting firm Llumino.
Murach's HTML5 and CSS3: Training and Reference
Zak Ruvalcaba - 2011
This title also teaches you how to use the HTML5 and CSS3 features alongside the earlier standards.
HBase: The Definitive Guide
Lars George - 2011
As the open source implementation of Google's BigTable architecture, HBase scales to billions of rows and millions of columns, while ensuring that write and read performance remain constant. Many IT executives are asking pointed questions about HBase. This book provides meaningful answers, whether you’re evaluating this non-relational database or planning to put it into practice right away.
Discover how tight integration with Hadoop makes scalability with HBase easier
Distribute large datasets across an inexpensive cluster of commodity servers
Access HBase with native Java clients, or with gateway servers providing REST, Avro, or Thrift APIs
Get details on HBase’s architecture, including the storage format, write-ahead log, background processes, and more
Integrate HBase with Hadoop's MapReduce framework for massively parallelized data processing jobs
Learn how to tune clusters, design schemas, copy tables, import bulk data, decommission nodes, and many other tasks
Hacking Linux Exposed: Linux Security Secrets & Solutions
Brian Hatch - 2001
Hacking Exposed Linux provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks.Secure Linux by using attacks and countermeasures from the latest OSSTMM researchFollow attack techniques of PSTN, ISDN, and PSDN over LinuxHarden VoIP, Bluetooth, RF, RFID, and IR devices on LinuxBlock Linux signal jamming, cloning, and eavesdropping attacksApply Trusted Computing and cryptography tools for your best defenseFix vulnerabilities in DNS, SMTP, and Web 2.0 servicesPrevent SPAM, Trojan, phishing, DoS, and DDoS exploitsFind and repair errors in C code with static analysis and Hoare Logic
SuperVision and Instructional Leadership: A Developmental Approach
Carl D. Glickman - 1995
The text's emphasis on school culture, teachers as adult learners, developmental leadership, democratic education, and collegial supervision have helped to redefine the meaning of supervision and instructional leadership for both scholars and practitioners.
The Essential Guide to Telecommunications
Annabel Z. Dodd - 1998
It aims to give readers a fundamental overview of the technologies that make up the telecommunications infrastructure.
Systems Programming (McGraw-Hill computer science series)
John J. Donovan - 1972