Book picks similar to
Design Patterns for Cloud Native Applications: Patterns in Practice Using Apis, Data, Events, and Streams by Kasun Indrasiri
software-design-architecture
next
work
minha-biblioteca
Implementing Domain-Driven Design
Vaughn Vernon - 2013
Vaughn Vernon couples guided approaches to implementation with modern architectures, highlighting the importance and value of focusing on the business domain while balancing technical considerations.Building on Eric Evans’ seminal book, Domain-Driven Design, the author presents practical DDD techniques through examples from familiar domains. Each principle is backed up by realistic Java examples–all applicable to C# developers–and all content is tied together by a single case study: the delivery of a large-scale Scrum-based SaaS system for a multitenant environment.The author takes you far beyond “DDD-lite” approaches that embrace DDD solely as a technical toolset, and shows you how to fully leverage DDD’s “strategic design patterns” using Bounded Context, Context Maps, and the Ubiquitous Language. Using these techniques and examples, you can reduce time to market and improve quality, as you build software that is more flexible, more scalable, and more tightly aligned to business goals.
The Waite Group's Turbo C Programming for the PC
Robert Lafore - 1987
Assuming no prior knowledge of C, this introductory-level book demonstrates and explains how to write useful and marketable programs in Turbo C on the IBM PC, XT, AT, and PC/Z computers.
Kubernetes in Action, Second Edition
Marko Luksa
Kubernetes in Action, Second Edition is a fully-updated and comprehensive guide to developing and running applications in a Kubernetes environment.Kubernetes is an essential tool for anyone deploying and managing cloud-native applications. It lays out a complete introduction to container technologies and containerized applications along with practical tips for efficient deployment and operation. This revised edition of the bestselling Kubernetes in Action contains new coverage of the Kubernetes architecture, including the Kubernetes API, and a deep dive into managing a Kubernetes cluster in production. In Kubernetes in Action, Second Edition, you'll start with an overview of how Docker containers work with Kubernetes and move quickly to building your first cluster. You'll gradually expand your initial application, adding features and deepening your knowledge of Kubernetes architecture and operation. As you navigate this comprehensive guide, you'll also appreciate thorough coverage of high-value topics like monitoring, tuning, and scaling. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.
Advanced Penetration Testing: Hacking the World's Most Secure Networks
Wil Allsopp - 2017
Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and compromising high security environments. From discovering and creating attack vectors, and moving unseen through a target enterprise, to establishing command and exfiltrating data--even from organizations without a direct Internet connection--this guide contains the crucial techniques that provide a more accurate picture of your system's defense. Custom coding examples use VBA, Windows Scripting Host, C, Java, JavaScript, Flash, and more, with coverage of standard library applications and the use of scanning tools to bypass common defensive measures.Typical penetration testing consists of low-level hackers attacking a system with a list of known vulnerabilities, and defenders preventing those hacks using an equally well-known list of defensive scans. The professional hackers and nation states on the forefront of today's threats operate at a much more complex level--and this book shows you how to defend your high security network.Use targeted social engineering pretexts to create the initial compromise Leave a command and control structure in place for long-term access Escalate privilege and breach networks, operating systems, and trust structures Infiltrate further using harvested credentials while expanding control Today's threats are organized, professionally-run, and very much for-profit. Financial institutions, health care organizations, law enforcement, government agencies, and other high-value targets need to harden their IT infrastructure and human capital against targeted advanced attacks from motivated professionals. Advanced Penetration Testing goes beyond Kali linux and Metasploit and to provide you advanced pen testing for high security networks.
The Quick Python Book
Naomi R. Ceder - 2000
This updated edition includes all the changes in Python 3, itself a significant shift from earlier versions of Python.The book begins with basic but useful programs that teach the core features of syntax, control flow, and data structures. It then moves to larger applications involving code management, object-oriented programming, web development, and converting code from earlier versions of Python.True to his audience of experienced developers, the author covers common programming language features concisely, while giving more detail to those features unique to Python.Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.
The Best Joke Book (Period): Hundreds of the Funniest, Silliest, Most Ridiculous Jokes Ever
William Donohue - 2014
Inside, you'll find hundreds of jokes that are guaranteed to stir up a room full of smiles, including knock-knocks, witty puns, and one-liners. Complete with hilarious quotes from celebrities like Jon Stewart, Lewis Black, and Jerry Seinfeld, everyone will revel in each gut-busting moment.So whether you're looking to add a few jokes to your repertoire, impress your buds, or improve your banter, this sidesplitting book arms you with the perfect joke for any occasion!
The AWK Programming Language
Alfred V. Aho - 1988
In 1985, a new version of the language was developed, incorporating additional features such as multiple input files, dynamic regular expressions, and user-defined functions. This new version is available for both Unix and MS-DOS. This is the first book on AWK. It begins with a tutorial that shows how easy AWK is to use. The tutorial is followed by a comprehensive manual for the new version of AWK. Subsequent chapters illustrate the language by a range of useful applications, such as: Retrieving, transforming, reducing, and validating data Managing small, personal databases Text processing Little languages Experimenting with algorithms The examples illustrates the books three themes: showing how to use AWK well, demonstrating AWKs versatility, and explaining how common computing operations are done. In addition, the book contains two appendixes: summary of the language, and answers to selected exercises.
Red Team Field Manual
Ben Clark - 2014
The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell. The RTFM will repeatedly save you time looking up the hard to remember Windows nuances such as Windows wmic and dsquery command line tools, key registry values, scheduled tasks syntax, startup locations and Windows scripting. More importantly, it should teach you some new red team techniques.
Learning GraphQL: Declarative Data Fetching for Modern Web Apps
Eve Porcello - 2018
With this practical guide, Alex Banks and Eve Porcello deliver a clear learning path for frontend web developers, backend engineers, and project and product managers looking to get started with GraphQL.You'll explore graph theory, the graph data structure, and GraphQL types before learning hands-on how to build a schema for a photo-sharing application. This book also introduces you to Apollo Client, a popular framework you can use to connect GraphQL to your user interface.Explore graph theory and review popular graph examples in use todayLearn how GraphQL applies database querying methods to the internetCreate a schema for a PhotoShare application that serves as a roadmap and a contract between the frontend and backend teamsUse JavaScript to build a fully functioning GraphQL service and Apollo to implement a clientLearn how to prepare GraphQL APIs and clients for production
Satellite Communications
Timothy Pratt - 1986
Includes chapters on orbital mechanics, spacecraft construction, satellite-path radio wave propagation, modulation techniques, multiple access, and a detailed analysis of the communications link.
Fullstack React: The Complete Guide to ReactJS and Friends
Anthony Accomazzo - 2017
Quickly get to work - or get that job - with the right tools and the best practices.Seriously: Stop wasting your time scouring Google, searching through incorrect, out-of-date, blog posts and get everything you need to be productive in one, well-organized place. The book is complete with both simple and complex examples to get your apps up and running.You'll learn what you need to know to work professionally and build solid, well-tested, optimized apps with ReactJS. This book is your definitive guide or your money back.Buy now at https://www.fullstackreact.com.
PHP and MySQL Web Development (Developer's Library)
Luke Welling - 2003
This book helps you develop websites by integrating and implementing the PHP scripting language and the MySQL database system. It contains real-world examples and working sample projects that give you a foundation to start building your own websites.
Hacking School Libraries: 10 Ways to Incorporate Library Media Centers into Your Learning Community (Hack Learning Series Book 20)
Kristina A. Holzweiss - 2018
They are places for research, refuge, and reflection--where students create, collaborate, communicate, and develop skills in critical thinking and compassion. Learn 10 ways to create the library learning environment that every child deserves. In Hacking School Libraries, 2015 School Librarian of the Year, Kristina A. Holzweiss, and 2017 Sensational Student Voice Award finalist, Stony Evans, bring you 10 practical hacks that will help you create a welcoming and exciting school library program. They show you how to rethink your library to become the hub of the school community, whether you are a veteran librarian or just beginning your career. Hacking School Libraries isn't just for librarians. It's for any educator who wants to learn how to transform your learning space provide hands-on learning opportunities empower your students bring curriculum to life differentiate instruction effectively raise funds advocate for modern school libraries establish global connections celebrate reading What the experts say: "When I learned that Kristina and Stony were writing a book to fit into one of my favorite series, I was so excited and couldn’t think of a better duo to do so! School librarians will find Hacking School Libraries such an amazing read and resource in so many ways. The hacks found in this book are terrific for any grade level and will help guide librarians to make a difference in their library, school, and community!" -Shannon McClintock Miller, Teacher Librarian and Iowa Future Ready Librarian Spokesperson "Authors Kristina Holzweiss and Stony Evans are two of the most respected thought leaders and practitioners in the school library field. Their book, Hacking School Libraries, is an essential resource for any modern-day library media specialist. It is filled with actionable tips and strategies that anyone can easily implement tomorrow." -Laura Fleming, Library Media Specialist, bestselling author of Worlds of Making and The Kickstart Guide to Making Great Makerspaces Grab Hacking School Libraries today, and incorporate library media centers into your learning community tomorrow.
Dependency Injection in .NET
Mark Seemann - 2011
Instead of hard-coding dependencies, such as specifying a database driver, you inject a list of services that a component may need. The services are then connected by a third party. This technique enables you to better manage future changes and other complexity in your software.About this BookDependency Injection in .NET introduces DI and provides a practical guide for applying it in .NET applications. The book presents the core patterns in plain C#, so you'll fully understand how DI works. Then you'll learn to integrate DI with standard Microsoft technologies like ASP.NET MVC, and to use DI frameworks like StructureMap, Castle Windsor, and Unity. By the end of the book, you'll be comfortable applying this powerful technique in your everyday .NET development.This book is written for C# developers. No previous experience with DI or DI frameworks is required. Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book. Winner of 2013 Jolt Awards: The Best Books—one of five notable books every serious programmer should read.What's InsideMany C#-based examplesA catalog of DI patterns and anti-patternsUsing both Microsoft and open source DI frameworksTabel of ContentsPART 1 PUTTING DEPENDENCY INJECTION ON THE MAPA Dependency Injection tasting menuA comprehensive exampleDI ContainersPART 2 DI CATALOGDI patternsDI anti-patternsDI refactoringsPART 3 DIY DIObject CompositionObject LifetimeInterceptionPART 4 DI CONTAINERSCastle WindsorStructureMapSpring.NETAutofacUnityMEF