Book picks similar to
VMware vSphere 5.1 Clustering Deepdive by Duncan Epping


computers
information-technology
non-fiction
virtualization

Wireshark 101: Essential Skills for Network Analysis


Laura A. Chappell - 2013
    This book provides an ideal starting point whether you are interested in analyzing traffic to learn how an application works, you need to troubleshoot slow network performance, or determine whether a machine is infected with malware. Learning to capture and analyze communications with Wireshark will help you really understand how TCP/IP networks function. As the most popular network analyzer tool in the world, the time you spend honing your skills with Wireshark will pay off when you read technical specs, marketing materials, security briefings, and more. This book can also be used by current analysts who need to practice the skills contained in this book. In essence, this book is for anyone who really wants to know what's happening on their network.

Programming Groovy


Venkat Subramaniam - 2008
    But recently, the industry has turned to dynamic languages for increased productivity and speed to market.Groovy is one of a new breed of dynamic languages that run on the Java platform. You can use these new languages on the JVM and intermix them with your existing Java code. You can leverage your Java investments while benefiting from advanced features including true Closures, Meta Programming, the ability to create internal DSLs, and a higher level of abstraction.If you're an experienced Java developer, Programming Groovy will help you learn the necessary fundamentals of programming in Groovy. You'll see how to use Groovy to do advanced programming including using Meta Programming, Builders, Unit Testing with Mock objects, processing XML, working with Databases and creating your own Domain-Specific Languages (DSLs).

Mac OS X: Tiger Edition


David Pogue - 2001
    The new Mac OS X 10.4, better known as Tiger, is faster than its predecessors, but nothing's too fast for Pogue and Mac OS X: The Missing Manual. There are many reasons why this is the most popular computer book of all time.With its hallmark objectivity, the Tiger Edition thoroughly explores the latest features to grace the Mac OS. Which ones work well and which do not? What should you look for? This book tackles Spotlight, an enhanced search feature that helps you find anything on your computer; iChat AV for videoconferencing; Automator for automating repetitive, manual or batch tasks; and the hundreds of smaller tweaks and changes, good and bad, that Apple's marketing never bothers to mention.Mac OS X: The Missing Manual, Tiger Edition is the authoritative book that's ideal for every user, including people coming to the Mac for the first time. Our guide offers an ideal introduction that demystifies the Dock, the unfamiliar Mac OS X folder structure, and the entirely new Mail application. There are also mini-manuals on iLife applications such as iMovie, iDVD, and iPhoto, those much-heralded digital media programs, and a tutorial for Safari, Mac's own web browser.And plenty more: learn to configure Mac OS X using the System Preferences application, keep your Mac secure with FileVault, and learn about Tiger's enhanced Firewall capabilities. If you're so inclined, this Missing Manual also offers an easy introduction to the Terminal application for issuing basic Unix commands.There's something new on practically every page, and David Pogue brings his celebrated wit and expertise to every one of them. Mac's brought a new cat to town and we have a great new way to tame it.

The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics


John Sammons - 2011
    This book teaches you how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud, and Internet are discussed. Readers will also learn how to collect evidence, document the scene, and recover deleted data. This is the only resource your students need to get a jump-start into digital forensics investigations.This book is organized into 11 chapters. After an introduction to the basics of digital forensics, the book proceeds with a discussion of key technical concepts. Succeeding chapters cover labs and tools; collecting evidence; Windows system artifacts; anti-forensics; Internet and email; network forensics; and mobile device forensics. The book concludes by outlining challenges and concerns associated with digital forensics. PowerPoint lecture slides are also available.This book will be a valuable resource for entry-level digital forensics professionals as well as those in complimentary fields including law enforcement, legal, and general information security.

Hadoop Explained


Aravind Shenoy - 2014
    Hadoop allowed small and medium sized companies to store huge amounts of data on cheap commodity servers in racks. The introduction of Big Data has allowed businesses to make decisions based on quantifiable analysis. Hadoop is now implemented in major organizations such as Amazon, IBM, Cloudera, and Dell to name a few. This book introduces you to Hadoop and to concepts such as ‘MapReduce’, ‘Rack Awareness’, ‘Yarn’ and ‘HDFS Federation’, which will help you get acquainted with the technology.

Understanding Air France 447


Bill Palmer - 2013
    Written by A330 Captain, Bill Palmer, this book opens to understanding the actions of the crew, how they failed to understand and control the problem, and how the airplane works and the part it played. All in easy to understand terms.Addressed are the many contributing aspects of weather, human factors, and airplane system operation and design that the crew could not recover from. How each contributed is covered in detail along with what has been done, and needs to be done in the future to prevent this from happening again.Also see the book's companion website: UnderstandingAF447.com for supplemental materials referred to in the book or to contact the author.

Inside Apple


Adam Lashinsky - 2011
    Based on numerous interviews, this book reveals exclusive new information about how Apple innovates, deals with its suppliers, and is handling the transition into the post Jobs era.

iPod & iTunes For Dummies


Tony Bove - 2003
    You'll learn about everything from buying music and videos, importing music, and burning CDs to setting up play lists, transferring and viewing photos, adding podcasts, maintaining battery life, and synchronizing information. Order your copy today!

Excel 2013 Bible


John Walkenbach - 2013
    Known as Mr. Spreadsheet, Walkenbach shows you how to maximize the power of Excel 2013 while bringing you up to speed on the latest features. This perennial bestseller is fully updated to cover all the new features of Excel 2013, including how to navigate the user interface, take advantage of various file formats, master formulas, analyze data with PivotTables, and more.Whether you're an Excel beginner who is looking to get more savvy or an advanced user looking to become a power user, this latest edition provides you with comprehensive coverage as well as helpful tips, tricks, and techniques that you won't find anywhere else.Shares the invaluable insight of Excel guru and bestselling author Mr. Spreadsheet John Walkenbach as he guides you through every aspect of Excel 2013 Provides essential coverage of all the newest features of Excel 2013 Presents material in a clear, concise, logical format that is ideal for all levels of Excel experience Features a website that includes downloadable templates and worksheets from the book Chart your path to fantastic formulas and stellar spreadsheets with Excel 2013 Bible!

Fruit Of A Poisoned Tree: A True Story Of Murder And The Miscarriage Of Justice


Antony Altbeker - 2011
    The trial itself was sensational enough to attract the attention of the world’s largest association of professional forensic investigators. At the start, everyone expected a ‘guilty’ verdict. His fingerprints were at the scene, the murder weapon was in his car and a blood stain in the bathroom was matched to one of his shoes. And yet, he was acquitted and is now suing the Minister of Police, saying that the evidence was fabricated. Altbeker witnessed the trial, and looks closely at how the justice system failed both van der Vyver and Lotz.

8 Things We Hate About IT: How to Move Beyond the Frustrations to Form a New Partnership with IT


Susan Cramm - 2010
    Instead, you get endless rules and regulations, not to mention processes, projects, and technologies that deliver too little, too late, for too much. It's frustrating!How to build a relationship that puts you firmly in control and produces the business results you need? In The 8 Things We Hate About IT, Susan Cramm provides the answers.Start by understanding differences between operational and IT managers - in backgrounds, personality, pressures, and incentives. Cramm explains how differences prevent operational managers and IT from communicating what, why, and how they do what they do.Citing case studies and stories, the author then presents practical strategies for overcoming the difficulty. These include seeing things from your IT partners' perspective, developing a single version of 'truth,' and assuming accountability for IT just as you've done for management of your firm's financial and human resources.Brutally honest, provocative, and filled with sound advice, this book reveals that the key to solving the IT problem is decidedly un-IT: it's a deeper understanding of human behavior, including how to apply your leadership skills to the world of IT.

Non-Invasive Data Governance: The Path of Least Resistance and Greatest Success


Robert Seiner - 2014
    Data Governance should not be about command-and-control, yet at times could become invasive or threatening to the work, people and culture of an organization. Non-Invasive Data Governance™ focuses on formalizing existing accountability for the management of data and improving formal communications, protection, and quality efforts through effective stewarding of data resources. Non-Invasive Data Governance will provide you with a complete set of tools to help you deliver a successful data governance program. Learn how: Steward responsibilities can be identified and recognized, formalized, and engaged according to their existing responsibility rather than being assigned or handed to people as more work. Governance of information can be applied to existing policies, standard operating procedures, practices, and methodologies, rather than being introduced or emphasized as new processes or methods. Governance of information can support all data integration, risk management, business intelligence and master data management activities rather than imposing inconsistent rigor to these initiatives. A practical and non-threatening approach can be applied to governing information and promoting stewardship of data as a cross-organization asset. Best practices and key concepts of this non-threatening approach can be communicated effectively to leverage strengths and address opportunities to improve.

Access 2007: The Missing Manual


Matthew MacDonald - 2006
    It runs on PCs rather than servers and is ideal for small- to mid-sized businesses and households. But Access is still intimidating to learn. It doesn't help that each new version crammed in yet another set of features; so many, in fact, that even the pros don't know where to find them all. Access 2007 breaks this pattern with some of the most dramatic changes users have seen since Office 95. Most obvious is the thoroughly redesigned user interface, with its tabbed toolbar (or "Ribbon") that makes features easy to locate and use. The features list also includes several long-awaited changes. One thing that hasn't improved is Microsoft's documentation. To learn the ins and outs of all the features in Access 2007, Microsoft merely offers online help.Access 2007: The Missing Manual was written from the ground up for this redesigned application. You will learn how to design complete databases, maintain them, search for valuable nuggets of information, and build attractive forms for quick-and-easy data entry. You'll even delve into the black art of Access programming (including macros and Visual Basic), and pick up valuable tricks and techniques to automate common tasks -- even if you've never touched a line of code before. You will also learn all about the new prebuilt databases you can customize to fit your needs, and how the new complex data feature will simplify your life. With plenty of downloadable examples, this objective and witty book will turn an Access neophyte into a true master.

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground


Kevin Poulsen - 2011
    Max 'Vision' Butler was a white-hat hacker and a celebrity throughout the programming world, even serving as a consultant to the FBI. But there was another side to Max. As the black-hat 'Iceman', he'd seen the fraudsters around him squabble, their ranks riddled with infiltrators, their methods inefficient, and in their dysfunction was the ultimate challenge: he would stage a coup and steal their ill-gotten gains from right under their noses.Through the story of Max Butler's remarkable rise, KINGPIN lays bare the workings of a silent crime wave affecting millions worldwide. It exposes vast online-fraud supermarkets stocked with credit card numbers, counterfeit cheques, hacked bank accounts and fake passports. Thanks to Kevin Poulsen's remarkable access to both cops and criminals, we step inside the quiet,desperate battle that law enforcement fights against these scammers. And learn that the boy next door may not be all he seems.

The Google Story: Inside the Hottest Business, Media and Technology Success of Our Time


David A. Vise - 2005
    The Google Story takes you deep inside the company's wild ride from an idea that struggled for funding in 1998 to a firm that rakes in billions in profits, making Brin and Page the wealthiest young men in America. Based on scrupulous research and extraordinary access to Google, this fast-moving narrative reveals how an unorthodox management style and culture of innovation enabled a search engine to shake up Madison Avenue and Wall Street, scoop up YouTube, and battle Microsoft at every turn. Not afraid of controversy, Google is expanding in Communist China and quietly working on a searchable genetic database, initiatives that test the founders' guiding mantra: DON'T BE EVIL.