Book picks similar to
Design Patterns for Cloud Native Applications: Patterns in Practice Using Apis, Data, Events, and Streams by Kasun Indrasiri
software-design-architecture
_p
webdev
systems-design
Software Project Survival Guide
Steve McConnell - 1997
It's for everyone with a stake in the outcome of a development project--and especially for those without formal software project management training. That includes top managers, executives, clients, investors, end-user representatives, project managers, and technical leads. Here you'll find guidance from the acclaimed author of the classics CODE COMPLETE and RAPID DEVELOPMENT. Steve McConnell draws on solid research and a career's worth of hard-won experience to map the surest path to your goal--what he calls "one specific approach to software development that works pretty well most of the time for most projects." Nineteen chapters in four sections cover the concepts and strategies you need for mastering the development process, including planning, design, management, quality assurance, testing, and archiving. For newcomers and seasoned project managers alike, SOFTWARE PROJECT SURVIVAL GUIDE draws on a vast store of techniques to create an elegantly simplified and reliable framework for project management success. So don't worry about wandering among complex sets of project management techniques that require years to sort out and master. SOFTWARE PROJECT SURVIVAL GUIDE goes straight to the heart of the matter to help your projects succeed. And that makes it a required addition to every professional's bookshelf.
14 Habits of Highly Productive Developers
Zeno Rocha - 2020
This book is a result of a quest. A quest to uncover what habits can be cultivated to become a better software engineer.
Overland
Ewen Levick - 2019
From vast deserts to an Indonesian fishing boat, a slow train through Burma to an armed confrontation in Laos, lullabies from middle-aged Chinese businessmen to a cold night on the Great Wall, wolves and reindeer herders, thieves and nomads: this is a vivid illustration of Asia and the people who live there, and of one ancient, stubborn motorcycle travelling through the world's wild places.
System Design Interview – An Insider's Guide
Alex Xu - 2020
This book provides a step-by-step framework on how to tackle a system design question. It includes many real-world examples to illustrate the systematic approach with detailed steps that you can follow.What’s inside?- An insider’s take on what interviewers really look for and why.- A 4-step framework for solving any system design interview question.- 15 real system design interview questions with detailed solutions.- 188 diagrams to visually explain how different systems work.Table Of ContentsChapter 1: Scale From Zero To Millions Of UsersChapter 2: Back-of-the-envelope EstimationChapter 3: A Framework For System Design InterviewsChapter 4: Design A Rate LimiterChapter 5: Design Consistent HashingChapter 6: Design A Key-value StoreChapter 7: Design A Unique Id Generator In Distributed SystemsChapter 8: Design A Url ShortenerChapter 9: Design A Web CrawlerChapter 10: Design A Notification SystemChapter 11: Design A News Feed SystemChapter 12: Design A Chat SystemChapter 13: Design A Search Autocomplete SystemChapter 14: Design YoutubeChapter 15: Design Google DriveChapter 16: The Learning Continues
Algorithms
Sanjoy Dasgupta - 2006
Emphasis is placed on understanding the crisp mathematical idea behind each algorithm, in a manner that is intuitive and rigorous without being unduly formal. Features include: The use of boxes to strengthen the narrative: pieces that provide historical context, descriptions of how the algorithms are used in practice, and excursions for the mathematically sophisticated.Carefully chosen advanced topics that can be skipped in a standard one-semester course, but can be covered in an advanced algorithms course or in a more leisurely two-semester sequence.An accessible treatment of linear programming introduces students to one of the greatest achievements in algorithms. An optional chapter on the quantum algorithm for factoring provides a unique peephole into this exciting topic. In addition to the text, DasGupta also offers a Solutions Manual, which is available on the Online Learning Center.Algorithms is an outstanding undergraduate text, equally informed by the historical roots and contemporary applications of its subject. Like a captivating novel, it is a joy to read. Tim Roughgarden Stanford University
Becoming a Technical Leader: An Organic Problem-Solving Approach
Gerald M. Weinberg - 1986
The book emphasizes that we all contain the ingredients for leadership, though some elements are better developed than others. "Anyone can improve as a leader simply by building the strength of our weakest elements, " author Gerald M. Weinberg writes. "Mr. Universe doesn't have more muscles than I do, just better developed ones."On one level, the book is an extremely down-to-earth, how-to guide. On a second, it is a set of parables, full of analogies that stick in the mind -- the art of management taught through stories about pinball, tinkertoys, and electric blankets. On yet another level, this is a book about the philosophy and psychology of managing technical projects. On every level, the author brings these entertaining and enlightening elements together to teach you the essentials of leadership.You'll learn how to-- master your fear of becoming a leader-- be creative in solving problems-- motivate people while maintaining quality-- gain organizational power-- plan personal change.-- Whether you manage people, are managed by people, or just want to change the way you interact with others, this book is about success. How to plan it, how to make it happen -- Becoming a Technical Leader shows you how to do it!
Learning UML 2.0: A Pragmatic Introduction to UML
Russ Miles - 2006
Every integrated software development environment in the world--open-source, standards-based, and proprietary--now supports UML and, more importantly, the model-driven approach to software development. This makes learning the newest UML standard, UML 2.0, critical for all software developers--and there isn't a better choice than this clear, step-by-step guide to learning the language."--Richard Mark Soley, Chairman and CEO, OMGIf you're like most software developers, you're building systems that are increasingly complex. Whether you're creating a desktop application or an enterprise system, complexity is the big hairy monster you must manage.The Unified Modeling Language (UML) helps you manage this complexity. Whether you're looking to use UML as a blueprint language, a sketch tool, or as a programming language, this book will give you the need-to-know information on how to apply UML to your project. While there are plenty of books available that describe UML, Learning UML 2.0 will show you how to use it. Topics covered include:Capturing your system's requirements in your model to help you ensure that your designs meet your users' needsModeling the parts of your system and their relationshipsModeling how the parts of your system work together to meet your system's requirementsModeling how your system moves into the real world, capturing how your system will be deployedEngaging and accessible, this book shows you how to use UML to craft and communicate your project's design. Russ Miles and Kim Hamilton have written a pragmatic introduction to UML based on hard-earned practice, not theory. Regardless of the software process or methodology you use, this book is the one source you need to get up and running with UML 2.0.Russ Miles is a software engineer for General Dynamics UK, where he works with Java and Distributed Systems, although his passion at the moment is Aspect Orientation and, in particular, AspectJ. Kim Hamilton is a senior software engineer at Northrop Grumman, where she's designed and implemented a variety of systems including web applications and distributed systems, with frequent detours into algorithms development.
Driven: The Never-Give-Up Roadmap to Massive Success
Manny Khoshbin - 2018
LinkedIn Riches: How to Leverage the World's Largest Professional Network to Enhance Your Brand, Generate Leads and Increase Revenue!
John Nemo - 2014
I did it all by myself, and I did it all inside a tiny niche. This isn't some get-rich-quick scheme or "push a button and make money" type approach. Rather, it's about understanding how to enhance your personal brand, how to leverage LinkedIn's built-in advantages and how to apply the specific type of selling psychology that generates nonstop leads and customers when done correctly. The simple formula I’ll teach you works in any niche, takes just a few minutes a day to apply and drives targeted, ready-to-buy prospects to your virtual front door. It doesn’t matter what your experience level is when it comes to LinkedIn – literally anyone can do this! Find out RIGHT NOW just how easy it is! Inside This Book You’ll Discover: - How to ensure your LinkedIn profile ranks #1 in your niche or industry - How to instantly locate your ideal prospects on LinkedIn no matter what industry you’re in - How to engage your ideal prospects on LinkedIn by creating instant likability and trust - How to create content on LinkedIn that establishes your credibility and attracts your ideal prospects - How to turn LinkedIn Groups into your own personal ATM Machine - How to move new LinkedIn connections from prospects to paying customers as quickly as possible ABOUT THE AUTHOR JOHN NEMO is a former Associated Press Reporter, Award-Winning PR Director and Social Media Consultant who generated more than $135,000 in revenue for his business in just 90 days using LinkedIn. He is the creator of www.LinkedInRiches.com, an online training course that helps brands, businesses and individuals leverage LinkedIn to generate more sales leads, add new clients and increase revenue. In addition to public speaking, live trainings and presentations, Nemo also offers 1-on-1 coaching and consulting services to clients worldwide in a variety of business development, marketing and lead generation areas. The author of five previous books, John Nemo has written for nearly 150 different national and regional publications over the past 20 years, including Sports Illustrated online, The Philadelphia Inquirer, The Chicago Sun-Times and The Arizona Republic. He lives near St. Paul, Minnesota with his wife, Sara, their three sons and Rosie the dog.
The Years That Matter Most: How College Makes or Breaks Us
Paul Tough - 2019
Drawing on new research, the book reveals how the landscape of higher education has shifted in recent decades and exposes the hidden truths of how the system works and whom it works for. And it introduces us to the people who really make higher education go: admissions directors trying to balance the class and balance the budget, College Board officials scrambling to defend the SAT in the face of mounting evidence that it favors the wealthy, researchers working to unlock the mysteries of the college-student brain, and educators trying to transform potential dropouts into successful graduates. With insight, humor, and passion, Paul Tough takes readers on a journey from Ivy League seminar rooms to community college welding shops, from giant public flagship universities to tiny experimental storefront colleges. Whether you are facing your own decision about college or simply care about the American promise of social mobility, The Years That Matter Most will change the way you think—not just about higher education, but about the nation itself.
Practical Monitoring
Mike Julian - 2017
"Monitoring Monitoring" explains what makes your monitoring less than stellar, and provides a practical approach to designing and implementing a monitoring strategy, from the application down to the hardware in the datacenter and everything in between.In the world of technical operations, monitoring is core to everything you do. In today s changing landscape of microservices, cloud infrastructure, and more, monitoring is experiencing a new surge of growth, bringing along new methodologies, new ways of thinking, and new tools.Complete with a primer on statistics and a monitoring vocabulary, this book helps you identify the main areas you need to monitor and shows you how to approach them. It s ideal for operations engineers, system administrators, system and software engineers, site reliability engineers, network engineers, and other operations professionals."
From Paycheck to Purpose: The Clear Path to Doing Work You Love
Ken Coleman - 2021
In his latest book, he draws on what he learned from his own ten-year journey as well as from coaching thousands of others to walk you through the seven stages to discovering and doing meaningful work. Relevant to any job or industry, you’ll learn step-by-step how to:1. Get Clear on the work you were uniquely made to do and why.2. Get Qualified to do the work you were created for.3. Get Connected with the right people who can open the doors to your dream.4. Get Started by overcoming the emotions and mistakes that often hold people back.5. Get Promoted by developing winning habits and traits.6. Get Your Dream Job by doing work you love and accomplishing results that matter to you.7. Give Yourself Away by expanding the dream to leave a legacy.This is your moment. You are needed, and you were made to contribute. It’s time to exit the daily grind and use your talents to start living your dream once and for all.
The One-Page Project Manager: Communicate and Manage Any Project with a Single Sheet of Paper
Clark A. Campbell - 2006
This practical guide will save time and effort, helping you identify the vital parts of a project and communicate those parts and duties to other team members.
sed & awk
Dale Dougherty - 1990
The most common operation done with sed is substitution, replacing one block of text with another.
awk is a complete programming language. Unlike many conventional languages, awk is "data driven" -- you specify what kind of data you are interested in and the operations to be performed when that data is found. awk does many things for you, including automatically opening and closing data files, reading records, breaking the records up into fields, and counting the records. While awk provides the features of most conventional programming languages, it also includes some unconventional features, such as extended regular expression matching and associative arrays. sed & awk describes both programs in detail and includes a chapter of example sed and awk scripts.
This edition covers features of sed and awk that are mandated by the POSIX standard. This most notably affects awk, where POSIX standardized a new variable, CONVFMT, and new functions, toupper() and tolower(). The CONVFMT variable specifies the conversion format to use when converting numbers to strings (awk used to use OFMT for this purpose). The toupper() and tolower() functions each take a (presumably mixed case) string argument and return a new version of the string with all letters translated to the corresponding case.
In addition, this edition covers GNU sed, newly available since the first edition. It also updates the first edition coverage of Bell Labs nawk and GNU awk (gawk), covers mawk, an additional freely available implementation of awk, and briefly discusses three commercial versions of awk, MKS awk, Thompson Automation awk (tawk), and Videosoft (VSAwk).
Defensive Security Handbook: Best Practices for Securing Infrastructure
Lee Brotherston - 2017
For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks.Learn fundamentals of starting or redesigning an InfoSec programCreate a base set of policies, standards, and proceduresPlan and design incident response, disaster recovery, compliance, and physical securityBolster Microsoft and Unix systems, network infrastructure, and password managementUse segmentation practices and designs to compartmentalize your networkExplore automated process and tools for vulnerability managementSecurely develop code to reduce exploitable errorsUnderstand basic penetration testing concepts through purple teamingDelve into IDS, IPS, SOC, logging, and monitoring