Book picks similar to
Normalized Systems. Recreating Information Technology Based on Laws for Software Evolvability. by Mannaert Herwig
in-queue-for-reading
information-technology
it
research
Final Exams: True Crime Cases from Cyril Wecht
Cyril H. Wecht - 2013
Wecht, M.D., J.D., one of America’s most respected forensic pathologists. Coauthored by crime writer Dawna Kaufmann, Final Exams explores both the technical and the human side of murder. From the heartbreaking case of abducted child, Jessica Lunsford, held captive within shouting distance of her loved ones, to the peculiar story of a murder for hire with a most unlikely victim, Final Exams takes the reader behind the scenes. Secrets about the private lives of both predators and victims are revealed as the authors detail the events that turned rage to tragedy. Fans of CSI will appreciate how Wecht and Kaufmann share the real life process of solving crimes with clues left with the victim.
Architecting the Cloud: Design Decisions for Cloud Computing Service Models (Saas, Paas, and Iaas)
Michael J. Kavis - 2013
However, before you can decide on a cloud model, you need to determine what the ideal cloud service model is for your business. Helping you cut through all the haze, Architecting the Cloud is vendor neutral and guides you in making one of the most critical technology decisions that you will face: selecting the right cloud service model(s) based on a combination of both business and technology requirements.Guides corporations through key cloud design considerations Discusses the pros and cons of each cloud service model Highlights major design considerations in areas such as security, data privacy, logging, data storage, SLA monitoring, and more Clearly defines the services cloud providers offer for each service model and the cloud services IT must provide Arming you with the information you need to choose the right cloud service provider, Architecting the Cloud is a comprehensive guide covering everything you need to be aware of in selecting the right cloud service model for you.
The Digital Economy: Promise and Peril in the Age of Networked Intelligence
Don Tapscott - 1995
This work reveals how the new technology and business strategies have transformed not only business processes, but also the way products and services are created and marketed, the structure and goals of the enterprise, the dynamics of competition, and all the rules for business success.
Squaddie: A Soldier's Story
Steven McLaughlin - 2006
It exposes the grim reality of everyday soldiering for the 'grunts on the ground'.
After the tragic death of his brother, and in the dark days following 9/11, McLaughlin felt compelled to fulfil his lifelong ambition to serve in the army. He followed his late brother into the elite Royal Green Jackets and passed the arduous Combat Infantryman's Course at the age of 31. Thereafter, McLaughlin found himself submerged in a world of casual violence.
Squaddie is a snapshot of infantry soldiering in the twenty-first century. It takes us into the heart of an ancient institution that is struggling to retain its tough traditions in a rapidly changing world. All of the fears and anxieties that the modern soldier carries as his burden are laid bare, as well as the occasional joys and triumphs that can make him feel like he is doing the best job in the world.
This is an account of army life by someone who has been there and done it.
From Gutenberg to Zuckerberg: What You Really Need to Know About the Internet
John Naughton - 2011
In the process we've been remarkably incurious about its meaning, significance or cultural implications. Most people have no idea how the network works, nor any conception of its architecture; and few can explain why it has been - and continues to be - so uniquely disruptive in social, economic and cultural contexts. In other words, our society has become dependent on a utility that it doesn't really understand. John Naughton has distilled the noisy chatter surrounding the internet's relentless evolution into nine clear-sighted and accessible areas of understanding. In doing so he affords everyone the requisite knowledge to make better use of the technologies and networks around us, and see lucidly into their future implications. Along the way FROM GUTENBERG TO ZUCKERBERG covers areas as diverse as the science of complexity, the economics of abundance, the appeal of disruption and the problematic nature of intellectual property. FROM GUTENBERG TO ZUCKERBERG gives you all the basic, conceptual equipment you need to understand the Internet phenomenon.
Cloud Architecture Patterns: Using Microsoft Azure
Bill Wilder - 2012
You’ll learn how each of these platform-agnostic patterns work, when they might be useful in the cloud, and what impact they’ll have on your application architecture. You’ll also see an example of each pattern applied to an application built with Windows Azure.The patterns are organized into four major topics, such as scalability and handling failure, and primer chapters provide background on each topic. With the information in this book, you’ll be able to make informed decisions for designing effective cloud-native applications that maximize the value of cloud services, while also paying attention to user experience and operational efficiency.Learn about architectural patterns for:Scalability. Discover the advantages of horizontal scaling. Patterns covered include Horizontally Scaling Compute, Queue-Centric Workflow, and Auto-Scaling.Big data. Learn how to handle large amounts of data across a distributed system. Eventual consistency is explained, along with the MapReduce and Database Sharding patterns.Handling failure. Understand how multitenant cloud services and commodity hardware influence your applications. Patterns covered include Busy Signal and Node Failure.Distributed users. Learn how to overcome delays due to network latency when building applications for a geographically distributed user base. Patterns covered include Colocation, Valet Key, CDN, and Multi-Site Deployment.
Exploring CQRS and Event Sourcing
Dominic Betts - 2012
It presents a learning journey, not definitive guidance. It describes the experiences of a development team with no prior CQRS proficiency in building, deploying (to Windows Azure), and maintaining a sample real-world, complex, enterprise system to showcase various CQRS and ES concepts, challenges, and techniques.The development team did not work in isolation; we actively sought input from industry experts and from a wide group of advisors to ensure that the guidance is both detailed and practical.The CQRS pattern and event sourcing are not mere simplistic solutions to the problems associated with large-scale, distributed systems. By providing you with both a working application and written guidance, we expect you’ll be well prepared to embark on your own CQRS journey.
iWoz: Computer Geek to Cult Icon: How I Invented the Personal Computer, Co-Founded Apple, and Had Fun Doing It
Steve Wozniak - 2006
individual whose contributions to the scientific, business and cultural realms are extensive."—BookpageBefore slim laptops that fit into briefcases, computers looked like strange, alien vending machines. But in "the most staggering burst of technical invention by a single person in high-tech history" (BusinessWeek) Steve Wozniak invented the first true personal computer. Wozniak teamed up with Steve Jobs, and Apple Computer was born, igniting the computer revolution and transforming the world. Here, thirty years later, the mischievous genius with the low profile treats readers to a rollicking, no-holds-barred account of his life—for once, in the voice of the wizard himself.
The Delicate Art of Bureaucracy: Digital Transformation with the Monkey, the Razor, and the Sumo Wrestler
Mark Schwartz - 2020
Through humor, a healthy dose of history and philosophy, and real-life examples from his days as a government bureaucrat, Schwartz shows IT leaders (and the whole of business) how to master the arts of the Monkey, the Razor, and the Sumo Wrestler to create a lean, learning, and enabling bureaucracy. For anyone frustrated by roadblocks, irritated you can't move fast enough, suffering under the weight of crushing procedures, this book is for you. No matter your role, you need a playbook for bureaucracy. This is it. With this playbook, you can wield bureaucracy as a superpower and bust through it at the same time.
Introduction to Disciplined Agile Delivery: A Small Agile Team’s Journey from Scrum to Continuous Delivery
Mark Lines - 2015
It describes the Disciplined Agile Delivery (DAD) process decision framework and then works through a case study describing a typical agile team’s experiences adopting a disciplined agile approach. The book describes how the team develops the first release of a mission-critical application while working in a legacy enterprise environment. It describes their experiences from beginning-to-end, starting with their initial team initiation efforts through construction and finally to deploying the solution into production. It also describes how the team stays together for future releases, overviewing their process improvement efforts from their Scrum-based beginnings through to a lean continuous delivery approach that fits in with their organization’s evolving DevOps strategy. The DAD framework is a hybrid of existing methods such as Scrum, Kanban, Agile Modeling, SAFe, Extreme Programming, Agile Data, Unified Process and many others. DAD provides the flexibility to use various approaches and plugs the gaps not addressed by mainstream agile methods. In a nutshell, DAD is “pragmatic agile.” DAD describes proven strategies to adapt and scale your agile initiatives to suit the unique realities of your enterprise without having to figure it all out by yourself. Here’s an overview of what each chapter covers: * Chapter 1: Introduction. This chapter provides a quick overview of the book and a brief history of Disciplined Agile. * Chapter 2: Reality over Rhetoric. This chapter explores several common myths about DAD and more importantly disproves them. * Chapter 3: Disciplined Agile Delivery in a Nutshell. This chapter provides a brief yet comprehensive overview of the DAD framework. * Chapter 4: Introduction to the Case Study. This chapter introduces us to the team, describes the market opportunity that they hope to address, and describes the environment in which they’re working. * Chapter 5: Inception. The team’s initiation effort includes initial requirements modeling and planning with their stakeholders in a streamlined manner, initial architecture modeling, setting up their physical work environment, setting up the start of their tooling infrastructure, initial risk identification, and finally securing stakeholder support and funding for the rest of the first release. * Chapters 6 through 10: Construction. These chapters each describe a single Construction iteration, sharing the team’s experiences during each of those two-week timeboxes. * Chapter 11: Transition. The two-week transition phase focuses on final testing and fixing, training the support/help-desk staff, finishing a few short end-user “how to” videos, and deploying the solution into production. * Chapter 12: Future Releases. This chapter overviews the team’s improvement efforts over the next few releases, describing how they evolve from the agile Scrum-based lifecycle to a leaner approach and eventually to continuous delivery. * Chapter 13: Closing Thoughts. This chapter overviews the disciplined agile resources that are available to you. * Appendix: The Disciplined Agile IT Department. This short appendix overviews our ongoing work on the Disciplined Agile framework to address the full scope of an IT department. At 102 pages, you should find this book to be a quick, informative read.
Breaking and Entering: The Extraordinary Story of a Hacker Called "Alien"
Jeremy N. Smith - 2019
When she arrived at MIT in the 1990s, Alien was quickly drawn to the school’s tradition of high‑risk physical trespassing: the original “hacking.” Within a year, one of her hallmates was dead and two others were arraigned. Alien’s adventures were only just beginning. After a stint at the storied, secretive Los Alamos National Laboratory, Alien was recruited by a top cybersecurity firm where she deployed her cache of virtual weapons—and the trespassing and social engineering talents she had developed while “hacking” at MIT. The company tested its clients’ security by every means possible—not just coding, but donning disguises and sneaking past guards and secretaries into the C‑suite. Alien now runs a boutique hacking outfit that caters to some of the world’s biggest and most vulnerable institutions—banks, retailers, government agencies. Her work combines devilish charm, old‑school deception, and next generation spycraft. In Breaking and Entering, cybersecurity finally gets the rich, character‑driven, fast-paced treatment it deserves.
The Complete Book of the SR-71 Blackbird
Richard Graham - 2015
The Lockheed SR-71 Blackbird spy plane flew more than three-and-a-half times the speed of sound--so fast that no other aircraft could catch it. Above 80,000 feet, its pilots had to wear full-pressure flight suits similar to what was used aboard the space shuttle.Developed by the renowned Lockheed Skunk Works, the SR-71 was an awesome aircraft in every respect. It was withdrawn from use in 1998, when it was superseded by satellite technology. Twelve of the thirty-two aircraft were destroyed in accidents, but none were ever lost to enemy action.Throughout its thirty-four-year career, the SR-71 was the world's fastest and highest-flying operational manned aircraft. It set world records for altitude and speed: an absolute altitude record of 85,069 feet and an absolute speed record of 2,193.2 miles per hour.The Complete Book of the SR-71 Blackbird covers every aspect of the SR-71's development, manufacture, modification, and active service from the insider's perspective of one of its pilots and is lavishly illustrated with more than 400 photos. Former pilot and author Richard Graham also examines each of the fifty planes that came out the SR-71 program (fifteen A-12s; three YF-12s; and thirty-two SR-71s) and tells each plane's history, its unique specifications, and where each currently resides.
CEH Certified Ethical Hacker Study Guide
Kimberly Graves - 2010
That's the philosophy behind ethical hacking, and it's a growing field. Prepare for certification in this important area with this advanced study guide that covers all exam objectives for the challenging CEH Certified Ethical Hackers exam. The book provides full coverage of exam topics, real-world examples, and a CD with additional materials for extra review and practice. Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, Web application vulnerabilities, and more Walks you through exam topics and includes plenty of real-world scenarios to help reinforce concepts Includes a CD with review questions, bonus exams, and more study tools This is the ideal guide to prepare you for the new CEH certification exam. Reviews
The Rails 4 Way
Obie Fernandez - 2013
It has conquered developer mindshare at startups and enterprises alike with its focus of simplicity, convention and clean, maintainable code. The latest version, Rails 4, continues the tradition of enhanced performance, security and developer productivity, with improvements that enable professional developers to focus on what matters most: delivering business value quickly and consistently.The Rails™ 4 Way is the only comprehensive, authoritative guide to delivering production-quality code with Rails 4. Pioneering Rails expert Obie Fernandez and his team of leading Rails experts illuminate the entire set of Rails APIs, along with the idioms, design approaches, and libraries that make developing applications with Rails so powerful. Drawing on their unsurpassed experience and track record, they address the real challenges development teams face, showing how to use Rails to maximize your productivity.Using numerous detailed code examples, the author systematically cover Rails key capabilities and subsystems, making this book a reference that you depend on everyday. He presents advanced Rails programming techniques that have been proven effective in day-to-day usage on dozens of production Rails systems and offers important insights into behavior-driven development and production considerations such as scalability. Dive deep into the subtleties of the asset pipeline and other advanced Rails topics such as security and scalability. The Rails 4 Way is your best guide for making Rails do exactly what you want it to do.
The Big Switch: Rewiring the World, from Edison to Google
Nicholas Carr - 2008
In a new chapter for this edition that brings the story up-to-date, Nicholas Carr revisits the dramatic new world being conjured from the circuits of the "World Wide Computer."