Book picks similar to
Batteries in a Portable World: A Handbook on Rechargeable Batteries for Non-Engineers, Fourth Edition by Isidor Buchmann
data-science-robotic
electronics
engineering
mining
Security Metrics: Replacing Fear, Uncertainty, and Doubt
Andrew Jaquith - 2007
Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index
Extreme Programming Pocket Guide
chromatic - 2003
Although many developers feel that XP is rooted in commonsense, its vastly different approach can bring challenges, frustrations, and constant demands on your patience.Unless you've got unlimited time (and who does these days?), you can't always stop to thumb through hundreds of pages to find the piece of information you need. The Extreme Programming Pocket Guide is the answer. Concise and easy to use, this handy pocket guide to XP is a must-have quick reference for anyone implementing a test-driven development environment.The Extreme Programming Pocket Guide covers XP assumptions, principles, events, artifacts, roles, and resources, and more. It concisely explains the relationships between the XP practices. If you want to adopt XP in stages, the Extreme Programming Pocket Guide will help you choose what to apply and when. You'll be surprised at how much practical information is crammed into this slim volume.O'Reilly's Pocket Guides have become a favorite among developers everywhere. By providing a wealth of important details in a concise, well-organized format, these handy books deliver just what you need to complete the task at hand. When you've reached a sticking point in your work and need to get to a solution quickly, the new Extreme Programming Pocket Guide is the book you'll want to have beside your keyboard.
ZooKeeper: Distributed process coordination
Flavio Junqueira - 2013
This practical guide shows how Apache ZooKeeper helps you manage distributed systems, so you can focus mainly on application logic. Even with ZooKeeper, implementing coordination tasks is not trivial, but this book provides good practices to give you a head start, and points out caveats that developers and administrators alike need to watch for along the way.In three separate sections, ZooKeeper contributors Flavio Junqueira and Benjamin Reed introduce the principles of distributed systems, provide ZooKeeper programming techniques, and include the information you need to administer this service.Learn how ZooKeeper solves common coordination tasksExplore the ZooKeeper API’s Java and C implementations and how they differUse methods to track and react to ZooKeeper state changesHandle failures of the network, application processes, and ZooKeeper itselfLearn about ZooKeeper’s trickier aspects dealing with concurrency, ordering, and configurationUse the Curator high-level interface for connection managementBecome familiar with ZooKeeper internals and administration tools
Digital Design
M. Morris Mano - 1984
The book teaches the basic tools for the design of digital circuits in a clear, easily accessible manner. New to This Edition: *Nine sections on Verilog Hardware Description Language (HDL) inserted in discrete sections, allowing the material to be covered or skipped as desired. The Verilog HDL presentation is at a suitable level for beginning students who are learning digital circuits for the first time. *Reorganized material on combinational circuits is now covered in a single chapter. *The emphasis in the sequential circuits chapters is now on design with D flip-flops instead of JK and SR flip-flops. *The material on memory and programmable logic is now consolidated in one chapter. *Chapter 8 consists mostly of new material and now covers digital design in the Register Transfer Level (P) FL), preparing the reader for more advanced design projects and further Verilog HDL studies. *A new section in Chapter 11 supplements the laboratory experiments with HDL experiments. These unable the reader to check the circuits designed in the laboratory by means of hardware components and/or by HDL simulation.* Text accompanied by Verilog simulator software-SynaptiCAD's VeriLogger Pro evaluation version, a Verilog simulation environment that combines all of the features of a traditional Verilog simulator with a powerful graphical test vector generator. Fast model testing in VeriLogger Pro allows the reader to perform bottom-up testing of every model in a design. All of the HDL examples in the book can be found on the CD-ROM. *A Companion Website includes resources for instructors and students such as transparency masters of all figures in the book, all HDL code examples from the book, a Verilog tutorial, tutorials on using the VeriLogger Pro software, and more. It can be found at http://www.prenhall.com/mano
Streaming Systems
Tyler Akidau - 2018
As more and more businesses seek to tame the massive unbounded data sets that pervade our world, streaming systems have finally reached a level of maturity sufficient for mainstream adoption. With this practical guide, data engineers, data scientists, and developers will learn how to work with streaming data in a conceptual and platform-agnostic way.Expanded from Tyler Akidau's popular blog posts Streaming 101 and Streaming 102, this book takes you from an introductory level to a nuanced understanding of the what, where, when, and how of processing real-time data streams. You'll also dive deep into watermarks and exactly-once processing with co-authors Slava Chernyak and Reuven Lax.You'll explore:How streaming and batch data processing patterns compareThe core principles and concepts behind robust out-of-order data processingHow watermarks track progress and completeness in infinite datasetsHow exactly-once data processing techniques ensure correctnessHow the concepts of streams and tables form the foundations of both batch and streaming data processingThe practical motivations behind a powerful persistent state mechanism, driven by a real-world exampleHow time-varying relations provide a link between stream processing and the world of SQL and relational algebra
WIRED: Steve Jobs, Revolutionary
Steven Levy - 2011
In the wake of his death WIRED presents Steve Jobs: Revolutionary, an eBook featuring our best stories about him. The anthology begins with a remembrance by Wired senior writer Steven Levy, who interviewed Jobs many times over the last two decades. We continue with six other stories that track Jobs on his uncanny rise, his dramatic fall, and his spectacular, unlikely return to Apple.
Essential Speed Reading Techniques: How to Become a Better, Faster Reader
Katya Seberson - 2019
Learn the most effective speed reading techniques for your personal strengths and challenges, and make visible progress through a series of engaging exercises.Choose from a variety of strategies and practices proven to advance speed and improve reading comprehension. The integrated exercises help develop your skills, allowing you to read quickly—and still enjoy every word. Whether you’re reading an entertaining novel or a challenging textbook, this speed reading guide will help you sail right through.In Essential Speed Reading Techniques, you’ll find:
Achievable goals—Improve your speed by setting realistic goals based on your own individual baseline.
Track your improvement—Assess your progress with self-tests for knowledge retention, smooth eye movement, and more.
Tips and tricks—Discover speed reading strategies to minimize rereading, focus your attention, and reduce eyestrain from screens.
With the personalized strategies in Essential Speed Reading Techniques, boosting your speed and reading comprehension will be a breeze.
The Twelve-Factor App
Adam Wiggins - 2012
The twelve-factor app is a methodology for building software-as-a-service apps that: - Use declarative formats for setup automation, to minimize time and cost for new developers joining the project; - Have a clean contract with the underlying operating system, offering maximum portability between execution environments; - Are suitable for deployment on modern cloud platforms, obviating the need for servers and systems administration; - Minimize divergence between development and production, enabling continuous deployment for maximum agility; - And can scale up without significant changes to tooling, architecture, or development practices.The twelve-factor methodology can be applied to apps written in any programming language, and which use any combination of backing services (database, queue, memory cache, etc).
Internal Combustion Engine Fundamentals.
John B. Heywood - 1988
An illustration program supports the concepts and theories discussed.
TCP/IP Protocol Suite
Behrouz A. Forouzan - 1999
TCP/IP Protocol Suite teaches students and professionals, with no prior knowledge of TCP/IP, everything they need to know about the subject. This comprehensive book uses hundreds of figures to make technical concepts easy to grasp, as well as many examples, which help tie the material to the real-world. The second edition of TCP/IP Protocol Suite has been fully updated to include all of the recent technology changes in the field. Many new chapters have been added such as one on Mobile IP, Multimedia and Internet, Network Security, and IP over ATM. Additionally, out-of-date material has been overhauled to reflect recent changes in technology.
Software Design X-Rays: Fix Technical Debt with Behavioral Code Analysis
Adam Tornhill - 2018
And that’s just for starters. Because good code involves social design, as well as technical design, you can find surprising dependencies between people and code to resolve coordination bottlenecks among teams. Best of all, the techniques build on behavioral data that you already have: your version-control system. Join the fight for better code!
Programming Entity Framework
Julia Lerman - 2009
"Programming Entity Framework, 1st Edition" offers experienced developers a thorough introduction to Microsoft's core framework for modeling and interacting with data in .NET applications. This hands-on tour provides a deep understanding of Entity Framework's architecture and APIs, and explains how to use the framework in a variety of applications built with Visual Studio 2008 and .NET 3.5.From the Entity Data Model (EDM) and Object Services to EntityClient and the Metadata Workspace, this highly acclaimed first edition covers it all.Understand the core concepts you need to make the best use of the Entity Framework (EF) in your applicationsLearn to query your data, using either LINQ to Entities or Entity SQLCreate Windows Forms, WPF, and ASP.NET applicationsBuild ASMX web services and WCF servicesUse Object Services to work directly with your entity objectsDelve into model customization, relationship management, change tracking, data concurrency, and moreOne important note: while many of the lessons from this book will continue to be valuable as you move to .NET 4, the thoroughly revised second edition of "Programming Entity Framework" (August 2010) specifically targets Visual Studio 2010 and .NET 4 -- where there have been many advancements and additions to the framework.
Emergency! Crisis on the Flight Deck
Stanley Stewart - 1989
This book offers a unique insight into how crews responded to crisis and what really happened.
Bottled Lightning: Superbatteries, Electric Cars, and the New Lithium Economy
Seth Fletcher - 2011
Chances are you've got some lithium on your person right now. But aside from powering a mobile twenty first-century lifestyle, the third element on the periodic table may also hold the key to an environmentally sustainable, oil-independent future. From electric cars to a "smart" power grid that can actually store electricity, letting us harness the powers of the sun and the wind and use them when we need them, lithium—a metal half as dense as water, created in the first minutes after the Big Bang and found primarily in some of the most uninhabitable places on earth—is the key to setting us on a path toward a low-carbon energy future. It's also shifting the geopolitical chessboard in profound ways.In Bottled Lightning, the science reporter Seth Fletcher takes us on a fascinating journey, from the salt flats of Bolivia to the labs of MIT and Stanford, from the turmoil at GM to cutting-edge lithium-ion battery start-ups, introducing us to the key players and ideas in an industry with the power to reshape the world. Lithium is the thread that ties together many key stories of our time: the environmental movement; the American auto industry, staking its revival on the electrification of cars and trucks; the struggle between first-world countries in need of natural resources and the impoverished countries where those resources are found; and the overwhelming popularity of the portable, Internet-connected gadgets that are changing the way we communicate. With nearly limitless possibilities, the promise of lithium offers new hope to a foundering American economy desperately searching for a green-tech boom to revive it.