Book picks similar to
Cloud Computing with Linux by M. Tim Jones
0000000
computer-science
linux
Programming with Java: A Primer
E. Balagurusamy - 2006
The language concepts are aptly explained in simple and easy-to-understand style, supported with examples, illustrations and programming and debugging exercises.
Sams Teach Yourself C++ in 21 Days
Jesse Liberty - 1994
It assumes no prior knowledge of programming and offers both solid instruction and the authors insights into best programming and learning practices. The book also provides a foundation for understanding object-oriented programming.
The Manga Guide to Linear Algebra
Shin Takahashi - 2008
Luckily, Misa's big brother is the captain of the university karate club and is ready to strike a deal: Reiji can join the club if he tutors Misa in linear algebra.Follow along in The Manga Guide to Linear Algebra as Reiji takes Misa from the absolute basics of this tricky subject through mind-bending operations like performing linear transformations, calculating determinants, and finding eigenvectors and eigenvalues. With memorable examples like miniature golf games and karate tournaments, Reiji transforms abstract concepts into something concrete, understandable, and even fun.As you follow Misa through her linear algebra crash course, you'll learn about:Basic vector and matrix operations such as addition, subtraction, and multiplicationLinear dependence, independence, and basesUsing Gaussian elimination to calculate inverse matricesSubspaces, dimension, and linear spanPractical applications of linear algebra in fields like computer graphics, cryptography, and engineeringBut Misa's brother may get more than he bargained for as sparks start to fly between student and tutor. Will Reiji end up with the girl—or just a pummeling from her oversized brother? Real math, real romance, and real action come together like never before in The Manga Guide to Linear Algebra.
Jenkins: The Definitive Guide
John Ferguson Smart - 2011
This complete guide shows you how to automate your build, integration, release, and deployment processes with Jenkins—and demonstrates how CI can save you time, money, and many headaches.
Ideal for developers, software architects, and project managers, Jenkins: The Definitive Guide is both a CI tutorial and a comprehensive Jenkins reference. Through its wealth of best practices and real-world tips, you'll discover how easy it is to set up a CI service with Jenkins.
Learn how to install, configure, and secure your Jenkins server
Organize and monitor general-purpose build jobs
Integrate automated tests to verify builds, and set up code quality reporting
Establish effective team notification strategies and techniques
Configure build pipelines, parameterized jobs, matrix builds, and other advanced jobs
Manage a farm of Jenkins servers to run distributed builds
Implement automated deployment and continuous delivery
Nexus: Small Worlds and the Groundbreaking Theory of Networks
Mark Buchanan - 2002
Federal Reserve Bank sneezes the global economy catches cold, read this book," writes John L. Casti (Santa Fe Institute). This "cogent and engaging" (Nature) work presents the fundamental principles of the emerging field of "small-worlds" theory—the idea that a hidden pattern is the key to how networks interact and exchange information, whether that network is the information highway or the firing of neurons in the brain. Mathematicians, physicists, computer scientists, and social scientists are working to decipher this complex organizational system, for it may yield a blueprint of dynamic interactions within our physical as well as social worlds.Highlighting groundbreaking research behind network theory, "Mark Buchanan's graceful, lucid, nontechnical and entertaining prose" (Mark Granovetter) documents the mounting support among various disciplines for the small-worlds idea and demonstrates its practical applications to diverse problems—from the volatile global economy or the Human Genome Project to the spread of infectious disease or ecological damage. Nexus is an exciting introduction to the hidden geometry that weaves our lives so inextricably together.
It's Our Research
Tomer Sharon - 2012
This book consists of six chapters arranged according to the different stages of research projects. Topics discussed include the different roles of business, engineering, and user-experience stakeholders; identification of research opportunities by developing empathy with stakeholders; and planning UX research with stakeholders. The book also offers ways of teaming up with stakeholders; strategies to improve the communication of research results to stakeholders; and the nine signs that indicate that research is making an impact on stakeholders, teams, and organizations. This book is meant for UX people engaged in usability and UX research. Written from the perspective of an in-house UX researcher, it is also relevant for self-employed practitioners and consultants who work in agencies. It is especially directed at UX teams that face no-time-no-money-for-research situations.
Docker: Up & Running: Shipping Reliable Containers in Production
Karl Matthias - 2015
But understanding how Linux containers fit into your workflow--and getting the integration details right--are not trivial tasks. With this practical guide, you'll learn how to use Docker to package your applications with all of their dependencies, and then test, ship, scale, and support your containers in production.Two Lead Site Reliability Engineers at New Relic share much of what they have learned from using Docker in production since shortly after its initial release. Their goal is to help you reap the benefits of this technology while avoiding the many setbacks they experienced.Learn how Docker simplifies dependency management and deployment workflow for your applicationsStart working with Docker images, containers, and command line toolsUse practical techniques to deploy and test Docker-based Linux containers in productionDebug containers by understanding their composition and internal processesDeploy production containers at scale inside your data center or cloud environmentExplore advanced Docker topics, including deployment tools, networking, orchestration, security, and configuration
Introduction to Modern Cryptography: Principles and Protocols
Jonathan Katz - 2007
Introduction to Modern Cryptography provides a rigorous yet accessible treatment of modern cryptography, with a focus on formal definitions, precise assumptions, and rigorous proofs.The authors introduce the core principles of modern cryptography, including the modern, computational approach to security that overcomes the limitations of perfect secrecy. An extensive treatment of private-key encryption and message authentication follows. The authors also illustrate design principles for block ciphers, such as the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES), and present provably secure constructions of block ciphers from lower-level primitives. The second half of the book focuses on public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, El Gamal, and other cryptosystems. After exploring public-key encryption and digital signatures, the book concludes with a discussion of the random oracle model and its applications.Serving as a textbook, a reference, or for self-study, Introduction to Modern Cryptography presents the necessary tools to fully understand this fascinating subject.
The Hacker Ethic: A Radical Approach to the Philosophy of Business
Pekka Himanen - 2001
Being a hacker has nothing to do with cyberterrorism, and it doesn’t even necessarily relate to the open-source movement. Being a hacker has more to do with your underlying assumptions about stress, time management, work, and play. It’s about harmonizing the rhythms of your creative work with the rhythms of the rest of your life so that they amplify each other. It is a fundamentally new work ethic that is revolutionizing the way business is being done around the world.Without hackers there would be no universal access to e-mail, no Internet, no World Wide Web, but the hacker ethic has spread far beyond the world of computers. It is a mind-set, a philosophy, based on the values of play, passion, sharing, and creativity, that has the potential to enhance every individual’s and company’s productivity and competitiveness. Now there is a greater need than ever for entrepreneurial versatility of the sort that has made hackers the most important innovators of our day. Pekka Himanen shows how we all can make use of this ongoing transformation in the way we approach our working lives.
CISSP All-in-One Exam Guide
Shon Harris - 2001
Revised and updated using feedback from Instructors and students, learn security operations in the areas of telecommunications, cryptography, management practices, and more. Plan for continuity and disaster recovery. Update your knowledge of laws, investigations, and ethics. Plus, run the CD-ROM and practice with more than 500 all new simulated exam questions. Browse the all new electronic book for studying on the go. Let security consultant and author Shon Harris lead you to successful completion of the CISSP.
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
Michael Hale Ligh - 2014
As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics--now the most sought after skill in the digital forensics and incident response fields.Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. Discover memory forensics techniques:How volatile memory analysis improves digital investigations Proper investigative steps for detecting stealth malware and advanced threats How to use free, open source tools for conducting thorough memory forensics Ways to acquire memory from suspect systems in a forensically sound manner The next era of malware and security breaches are more sophisticated and targeted, and the volatile memory of a computer is often overlooked or destroyed as part of the incident response process. The Art of Memory Forensics explains the latest technological innovations in digital forensics to help bridge this gap. It covers the most popular and recently released versions of Windows, Linux, and Mac, including both the 32 and 64-bit editions.
The Design and Implementation of the FreeBSD Operating System
Marshall Kirk McKusick - 2004
While explaining key design decisions, it details the concepts, data structures, and algorithms used in implementing the systems facilities. It is both a practical reference and an in-depth study of a contemporary, portable, open source operating system.
C Programming: A Modern Approach
Kimberly Nelson King - 1996
With adoptions at over 225 colleges, the first edition was one of the leading C textbooks of the last ten years. The second edition maintains all the book's popular features and brings it up to date with coverage of the C99 standard. The new edition also adds a significant number of exercises and longer programming projects, and includes extensive revisions and updates.
Graph Theory With Applications To Engineering And Computer Science
Narsingh Deo - 2004
GRAPH THEORY WITH APPLICATIONS TO ENGINEERING AND COMPUTER SCIENCE-PHI-DEO, NARSINGH-1979-EDN-1