Exploring CQRS and Event Sourcing


Dominic Betts - 2012
    It presents a learning journey, not definitive guidance. It describes the experiences of a development team with no prior CQRS proficiency in building, deploying (to Windows Azure), and maintaining a sample real-world, complex, enterprise system to showcase various CQRS and ES concepts, challenges, and techniques.The development team did not work in isolation; we actively sought input from industry experts and from a wide group of advisors to ensure that the guidance is both detailed and practical.The CQRS pattern and event sourcing are not mere simplistic solutions to the problems associated with large-scale, distributed systems. By providing you with both a working application and written guidance, we expect you’ll be well prepared to embark on your own CQRS journey.

Fiber-Optic Communication Systems, Solutions Manual


Govind P. Agrawal - 1998
    In the last five years alone, the bit rate of commercial point-to-point links has grown from 2.5 Gb/s to 40 Gb/s-and that figure is expected to more than double over the next two years! Such astonishing progress can be both inspiring and frustrating for professionals who need to stay abreast of important new developments in the field. Now Fiber-Optic Communication Systems, Second Edition makes that job a little easier. Based on its author's exhaustive review of the past five years of published research in the field, this Second Edition, like its popular predecessor, provides an in-depth look at the state of the art in fiber-optic communication systems. While engineering aspects are discussed, the emphasis is on a physical understanding of this complex technology, from its basic concepts to the latest innovations. Thoroughly updated and expanded, Fiber-Optic Communication Systems, Second Edition: * Includes 30% more information, including four new chapters focusing on the latest lightwave systems R&D * Covers fundamental aspects of lightwave systems as well as a wide range of practical applications * Functions as both a graduate-level text and a professional reference * Features extensive references and chapter-end problem sets.

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker


Kevin D. Mitnick - 2011
    While other nerds were fumbling with password possibilities, this adept break-artist was penetrating the digital secrets of Sun Microsystems, Digital Equipment Corporation, Nokia, Motorola, Pacific Bell, and other mammoth enterprises. His Ghost in the Wires memoir paints an action portrait of a plucky loner motivated by a passion for trickery, not material game. (P.S. Mitnick's capers have already been the subject of two books and a movie. This first-person account is the most comprehensive to date.)

Introduction to Disciplined Agile Delivery: A Small Agile Team’s Journey from Scrum to Continuous Delivery


Mark Lines - 2015
    It describes the Disciplined Agile Delivery (DAD) process decision framework and then works through a case study describing a typical agile team’s experiences adopting a disciplined agile approach. The book describes how the team develops the first release of a mission-critical application while working in a legacy enterprise environment. It describes their experiences from beginning-to-end, starting with their initial team initiation efforts through construction and finally to deploying the solution into production. It also describes how the team stays together for future releases, overviewing their process improvement efforts from their Scrum-based beginnings through to a lean continuous delivery approach that fits in with their organization’s evolving DevOps strategy. The DAD framework is a hybrid of existing methods such as Scrum, Kanban, Agile Modeling, SAFe, Extreme Programming, Agile Data, Unified Process and many others. DAD provides the flexibility to use various approaches and plugs the gaps not addressed by mainstream agile methods. In a nutshell, DAD is “pragmatic agile.” DAD describes proven strategies to adapt and scale your agile initiatives to suit the unique realities of your enterprise without having to figure it all out by yourself. Here’s an overview of what each chapter covers: * Chapter 1: Introduction. This chapter provides a quick overview of the book and a brief history of Disciplined Agile. * Chapter 2: Reality over Rhetoric. This chapter explores several common myths about DAD and more importantly disproves them. * Chapter 3: Disciplined Agile Delivery in a Nutshell. This chapter provides a brief yet comprehensive overview of the DAD framework. * Chapter 4: Introduction to the Case Study. This chapter introduces us to the team, describes the market opportunity that they hope to address, and describes the environment in which they’re working. * Chapter 5: Inception. The team’s initiation effort includes initial requirements modeling and planning with their stakeholders in a streamlined manner, initial architecture modeling, setting up their physical work environment, setting up the start of their tooling infrastructure, initial risk identification, and finally securing stakeholder support and funding for the rest of the first release. * Chapters 6 through 10: Construction. These chapters each describe a single Construction iteration, sharing the team’s experiences during each of those two-week timeboxes. * Chapter 11: Transition. The two-week transition phase focuses on final testing and fixing, training the support/help-desk staff, finishing a few short end-user “how to” videos, and deploying the solution into production. * Chapter 12: Future Releases. This chapter overviews the team’s improvement efforts over the next few releases, describing how they evolve from the agile Scrum-based lifecycle to a leaner approach and eventually to continuous delivery. * Chapter 13: Closing Thoughts. This chapter overviews the disciplined agile resources that are available to you. * Appendix: The Disciplined Agile IT Department. This short appendix overviews our ongoing work on the Disciplined Agile framework to address the full scope of an IT department. At 102 pages, you should find this book to be a quick, informative read.

Training Guide: Programming in HTML5 with JavaScript and CSS3


Glenn Johnson - 2013
    Build hands-on expertise through a series of lessons, exercises, and suggested practices—and help maximize your performance on the job.Provides in-depth, hands-on training you take at your own pace Focuses on job-role-specific expertise for using HTML5, JavaScript, and CSS3 to begin building modern web and Windows 8 apps Features pragmatic lessons, exercises, and practices Creates a foundation of skills which, along with on-the-job experience, can be measured by Microsoft Certification exams such as 70-480 Coverage includes: creating HTML5 documents; implementing styles with CSS3; JavaScript in depth; using Microsoft developer tools; AJAX; multimedia support; drawing with Canvas and SVG; drag and drop functionality; location-aware apps; web storage; offline apps; writing your first simple Windows 8 apps; and other key topics

Everyday Rails Testing with RSpec


Aaron Sumner
    A practical approach to test-driven development for Ruby on Rails using RSpec and related tools.

The Irishman: Frank Sheeran’s True Crime Story


Daniel Brand - 2018
    The world knew him as a union official, a long-time member of the Teamsters Union; he was a member of Jimmy Hoffa’s inner circle at the top of the national union. He had run-ins with the law in this position. He was charged with the murder of a rebel union member in a riot that occurred outside the Teamster’s Local Philadelphia Union Hall, but the charges were later dropped. He went to prison in the 80s after being caught on a wire instructing once of his crew to break someone’s legs and was named in Rudy Giuliani’s Mafia Commission Trial as an unindicted co-conspirator and one of only two non-Italian members of the Mafia Commission. As an old man suffering from cancer that would soon kill him, Frank Sheeran shared his story with his attorney. He told him of the things that were already known, but he shared much, much more. This book explores Frank Sheeran’s confessions as a lifelong criminal with ties to some of the biggest crimes of the 20th century. Inside this book, you will find: A detailed account of Frank Sheeran’s time in the army during the second world war, where he was in combat for an astounding four hundred and eleven days, with a focus on the war crimes he has admitted to; A look into Sheeran’s post-war slides into a life of crime, finding himself working for the Mafia before he even knew what the Mafia was; Information on his time as a hitman for the Mafia and how that led him to work for Jimmy Hoffa as muscle and hitman for the powerful Teamster Boss; Frank Sheeran’s accounts of his connections to the Bay of Pigs Invasion and the Assassination of JFK; and His confession to the murders of Crazy Joe Gallo and of his friend, Jimmy Hoffa.

David Baldacci: Series Reading Order


My Reading Checklist - 2015
    THIS IS A COMPREHENSIVE LIST OF ALL BOOKS IN ALL SERIES PUBLISHED BY DAVID BALDACCI. THIS CHECKLIST IS FREE ON YOUR KINDLE UNLIMITED SUBSCRIPTION. USING THIS CHECKLIST IS AS EASY AS 1-2-3: 1. HIGHLIGHT THE BOOKS YOU HAVE READ • Tap on the name of the book • Press highlight in the popup that appears • This is a great way to keep track of the books you have read, and find the books you still have to read 2. USE KINDLE UNLIMITED FOR LIFETIME FREE UPDATES • Kindle Unlimited lets you keep 10 books at a time on your device • Download this checklist only when you need it • Highlight the books you have read, and return the checklist back into the Cloud • Retrieve this checklist from the Cloud next time you need it again 3. ACTIVATE AUTO UPDATES • Turn on auto updates from your device to be notified when this checklist is updated • When Amazon pushes an update through, you’ll have the opportunity to download the latest version ALWAYS KEEP UP-TO-DATE WITH THE LATEST RELEASES FROM YOUR FAVORITE AUTHORS. THIS CHECKLIST WILL BE UPDATED PROMPTLY WHEN DAVID BALDACCI RELEASES A NEW BOOK. IT’S THAT SIMPLE. THIS CHECKLIST COVERS THE FOLLOWING SERIES BY DAVID BALDACCI: • AMOS DECKER SERIES • KING & MAXWELL SERIES • CAMEL CLUB SERIES • WILL ROBBIE SERIES • JOHN PULLER SERIES • THE FINISHER SERIES • SHAW SERIES • THE 39 CLUES: CAHILLS VS. VESPERS SERIES • FREDDIE & THE FRENCH FRIES SERIES • DAVID BALDACCI’S ANTHOLOGIES • DAVID BALDACCI’S SHORT STORIES • DAVID BALDACCI’S STAND-ALONE NOVELS CAN YOU GET THIS INFORMATION FOR FREE? SURE, THIS INFORMATION IS OUT THERE FOR FREE, BUT YOU WILL HAVE TO GO THROUGH THE HASSLE OF SEARCHING WEBSITES AND COLLATING ALL THE VARIOUS BOOKS AND SERIES NAMES, CREATING A WORD/PDF DOCUMENT, DOWNLOADING THE CALIBRE SOFTWARE, FORMATTING AND CONVERTING YOUR DOCUMENT TO .MOBI, AND THEN SIDE-LOADING YOUR KINDLE. SAVE ALL THAT HASSLE BY GETTING THIS LIST — THE MOST TIME AND COST EFFECTIVE WAY TO BE KEPT INFORMED OF THE LATEST RELEASES FROM DAVID BALDACCI. ARE YOU WORRIED ABOUT COPYRIGHT? DON’T BE. THIS CHECKLIST IS COMPLIANT WITH CIRCULAR 34 FROM THE U.S. COPYRIGHT OFFICE. APART FROM NAMES, TITLES, AND SHORT PHRASES AND EXPRESSIONS, NO COPYRIGHTED MATERIAL IS REPRODUCED.

Whispering Pines Mysteries Box Set: Books 4-6


Shawn McGuire - 2019
     Hidden Secrets: A Whispering Pines Mystery, Book Four Aside from a minor glitch or two, everything has gone to plan with the grand opening of Pine Time Bed-and-Breakfast. Then one of Jayne’s guests turns up dead on the side of the road. Now, with some of the locals pointing out that the rash of murders plaguing the village started when Jayne arrived, Jayne has to clear her own name while tracking down the real killer. Rival Secrets: A Whispering Pines Mystery, Book Five As the weather turns crisp, Jayne and the other villagers prepare for the last big tourist draw of the season: the autumn equinox festival and its ever-popular cooking competition. Events turn from friendly to fatal, however, when one of the contestants is found dead in the woods. As all eyes turn to one of the villagers as the killer, Jayne digs deep to clear the name of one of their own. Veiled Secrets: A Whispering Pines Mystery, Book Six The village is calm and quiet for the Samhain feast, until a boy goes missing during trick-or-treating. The parents say he does this sometimes, but with a storm bearing down on the village, Jayne isn’t content to dismiss this as a case of a curious kid off exploring the woods. What readers are saying: “I've read them all and just want to go back.” “I wish Whispering Pines was a real place” “If you enjoy honest, rather raw characters seeking direction, and the consequences of past mistakes, you'll enjoy this series as much as I have.” “My mind is still in Whispering Pines. I can clearly see the thatched roof houses, their wood and stucco exteriors. It reminds me of Shakespeare's house in London." “I really enjoy how the characters continue to evolve in this series and the new eccentrics fit right in!” “I totally fell in love with both the village and the story.” “I would gladly plan my next trip to Whispering Pines.” The Whispering Pines Mystery Series Family Secrets: A Whispering Pines Mystery Kept Secrets: A Whispering Pines Mystery, Book Two Original Secrets: A Whispering Pines Mystery, Book Three Hidden Secrets: A Whispering Pines Mystery, Book Four Rival Secrets: A Whispering Pines Mystery, Book Five Veiled Secrets: A Whispering Pines Mystery, Book Six Silent Secrets: A Whispering Pines Mystery, Book Seven Merciful Secrets: A Whispering Pines Mystery, Book Eight

Domain-Driven Design in PHP


Carlos Buenosvinos
    Explore applying the Hexagonal Architecture within your application, whether within an open source framework or your own bespoke system. Finally, look into integrating Bounded Contexts, using REST and Messaging approaches.

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground


Kevin Poulsen - 2011
    Max 'Vision' Butler was a white-hat hacker and a celebrity throughout the programming world, even serving as a consultant to the FBI. But there was another side to Max. As the black-hat 'Iceman', he'd seen the fraudsters around him squabble, their ranks riddled with infiltrators, their methods inefficient, and in their dysfunction was the ultimate challenge: he would stage a coup and steal their ill-gotten gains from right under their noses.Through the story of Max Butler's remarkable rise, KINGPIN lays bare the workings of a silent crime wave affecting millions worldwide. It exposes vast online-fraud supermarkets stocked with credit card numbers, counterfeit cheques, hacked bank accounts and fake passports. Thanks to Kevin Poulsen's remarkable access to both cops and criminals, we step inside the quiet,desperate battle that law enforcement fights against these scammers. And learn that the boy next door may not be all he seems.

ToGAF 9 Foundation Study Guide: Preparation for the TOGAF 9 Part 1 Examination


Rachel Harrison - 2009
    It gives an overview of every learning objective for the TOGAF 9 Foundation Syllabus and in-depth coverage on preparing and taking the TOGAF 9 Part 1 Examination. It is specifically designed to help individuals prepare for certification.This Study Guide is excellent material for:a) Individuals who require a basic understanding of TOGAF 9b) Professionals who are working in roles associated with an architecture project such as those responsible for planning, execution, development, delivery, and operationc) Architects who are looking for a first introduction to TOGAF 9d) Architects who want to achieve Level 2 certification in a stepwise manner and have not previously qualified as TOGAF 8 CertifiedA prior knowledge of enterprise architecture is advantageous but not required. While reading this Study Guide, the reader should also refer to the TOGAF Version 9.1 documentation available online at www.opengroup.org and also available as hard copy from www.vanharen.net and online booksellers

Just for You


Rahul Saini - 2014
    His publishing deals, his relationships, even his job - nothing seems to be working out. To make matters worse, Karan is still trying his best to ruin him as a writer. But when Nisha leaves him, it's the ultimate blow. To win her back Rohit must prove he loves her enough to do things that matter to her: like helping Tara find a publisher. As Rohit takes control of his life, he begins to find things slowly changing for the better for him too. But will Nisha be happy with that? Will she come back to him? Just for You is an adorable, bittersweet story about love and its responsibilities.The central character – Rohit, an author, rebels against his inner self and struggles to settle with his unbalanced life while Karun, another (very) young author leaves no stone unturned to ruin his reputation as a writer because of his revelry and jealousy towards him. Rohit suffers the ultimate blow when is his girlfriend, Nisha leaves him. In order to gather the ripped shreds of his life, Rohit tries to win Nisha back by doing the things that would matter to her the most, in turn bringing his life back on track (or not)! Meanwhile, Karun keeps trying his best to ruin his career anyway!

Windows Presentation Foundation Unleashed


Adam Nathan - 2006
    Windows Presentation Foundation (WPF) is a key component of the .NET Framework 3.0, giving you the power to create richer and more compelling applications than you dreamed possible. Whether you want to develop traditional user interfaces or integrate 3D graphics, audio/video, animation, dynamic skinning, rich document support, speech recognition, or more, WPF enables you to do so in a seamless, resolution-independent manner. Windows Presentation Foundation Unleashed is the authoritative book that covers it all, in a practical and approachable fashion, authored by .NET guru and Microsoft developer Adam Nathan. - Covers everything you need to know about Extensible Application Markup Language (XAML) - Examines the WPF feature areas in incredible depth: controls, layout, resources, data binding, styling, graphics, animation, and more - Features a chapter on 3D graphics by Daniel Lehenbauer, lead developer responsible for WPF 3D - Delves into non-mainstream topics: speech, audio/video, documents, bitmap effects, and more - Shows how to create popular UI elements, such as features introduced in the 2007 Microsoft Office System: Galleries, ScreenTips, custom control layouts, and more - Demonstrates how to create sophisticated UI mechanisms, such as Visual Studio-like collapsible/dockable panes - Explains how to develop and deploy all types of applications, including navigation-based applications, applications hosted in a Web browser, and applications with great-looking non-rectangular windows - Explains how to create first-class custom controls for WPF - Demonstrates how to create hybrid WPF software that leverages Windows Forms, ActiveX, or other non-WPF technologies - Explains how to exploit new Windows Vista features in WPF applications

Linux Server Hacks: 100 Industrial-Strength Tips and Tools


Rob Flickenger - 2003
    Setting up and maintaining a Linux server requires understanding not only the hardware, but the ins and outs of the Linux operating system along with its supporting cast of utilities as well as layers of applications software. There's basic documentation online but there's a lot beyond the basics you have to know, and this only comes from people with hands-on, real-world experience. This kind of "know how" is what we sought to capture in Linux Server Hacks.Linux Server Hacks is a collection of 100 industrial-strength hacks, providing tips and tools that solve practical problems for Linux system administrators. Every hack can be read in just a few minutes but will save hours of searching for the right answer. Some of the hacks are subtle, many of them are non-obvious, and all of them demonstrate the power and flexibility of a Linux system. You'll find hacks devoted to tuning the Linux kernel to make your system run more efficiently, as well as using CVS or RCS to track the revision to system files. You'll learn alternative ways to do backups, how to use system monitoring tools to track system performance and a variety of secure networking solutions. Linux Server Hacks also helps you manage large-scale Web installations running Apache, MySQL, and other open source tools that are typically part of a Linux system.O'Reilly's new Hacks Series proudly reclaims the term "hacking" for the good guys. Hackers use their ingenuity to solve interesting problems. Rob Flickenger is an experienced system administrator, having managed the systems for O'Reilly Network for several years. (He's also into community wireless networking and he's written a book on that subject for O'Reilly.) Rob has also collected the best ideas and tools from a number of other highly skilled contributors.Written for users who already understand the basics, Linux Server Hacks is built upon the expertise of people who really know what they're doing.