Book picks similar to
Network Analysis and Troubleshooting by J. Scott Haugdahl
network-engineering
professional
smith-library-2-0
technology
Calm Technology: Designing for Billions of Devices and the Internet of Things
Amber Case - 2016
You ll learn how to design products that work well, launch well, are easy to support, easy to use, and don t get in the way of a user s life.Old systems and bad interfaces will plague us if we don t learn how to design for the long term. By writing code that s small instead of large, and making simple systems rather than complex ones, we can begin to design technology that gets out of our way.Discover principles that follow the human lifestyle and environment in mind, allowing technology to amplify humanness instead of taking it awayDelve into types of alerts, product launch, "calming" technology, and tech that smoothly enters people s livesLearn from a trained anthropologist and a technology hobbyist who sits on the edge between technology and how people use itThis book is ideal for anyone who actively builds or makes decisions about technology, including user experience designers, product designers, managers, creative directors, and developers."
The RSpec Book
David Chelimsky - 2009
Get the most out of BDD in Ruby with The RSpec Book, written by the lead developer of RSpec, David Chelimsky. You'll get started right away with RSpec 2 and Cucumber by developing a simple game, using Cucumber to express high-level requirements in language your customer understands, and RSpec to express more granular requirements that focus on the behavior of individual objects in the system. You'll learn how to use test doubles (mocks and stubs) to control the environment and focus the RSpec examples on one object at a time, and how to customize RSpec to "speak" in the language of your domain. You'll develop Rails 3 applications and use companion tools such as Webrat and Selenium to express requirements for web applications both in memory and in the browser. And you'll learn to specify Rails views, controllers, and models, each in complete isolation from the other. Whether you're developing applications, frameworks, or the libraries that power them, The RSpec Book will help you write better code, better tests, and deliver better software to happier users.
Pull: The Power of the Semantic Web to Transform Your Business
David Siegel - 2009
This book claimed that through a piece of software called a "browser," which accesses "web sites," the world economy and our daily lives would change forever. Would you have believed even 10 percent of that book? Did you take advantage of the first Internet wave and get ahead of the curve? "Pull" is the blueprint to the next disruptive wave. Some call it Web 3.0; others call it the semantic web. It's a fundamental transition from pushing information to pulling, using a new way of thinking and collaborating online. Using the principles of this book, you will slash 5-20 percent off your bottom line, make your customers happier, accelerate your industry, and prepare your company for the twenty-first century. It isn't going to be easy, and you don't have any choice. By 2015, your company will be more agile and your processes more flexible than you ever thought possible. The semantic web leads to possibilities straight from science fiction, such as buildings that can order their own supplies, eliminating the IRS, and lawyers finally making sense. But it also leads to major changes in every field, from shipping and retail distribution to health care and financial reporting. Through clear examples, case studies, principles, and scenarios, business strategist David Siegel takes you on a tour of this new world. You'll learn: -Which industries are already ahead. -Which industries are already dead. -How to make the power shift from pushing to pulling information. -How software, hardware, media, and marketing will all change. -How to plan your own strategy for embracing the semantic web. We are at the beginning of a new technology curve that will affect all areas of business. Right now, you have a choice. You can decide to start preparing for the exciting opportunities that lay ahead or you can leave this book on the shelf and get left in the dust like last time.
IT Governance: How Top Performers Manage IT Decision Rights for Superior Results
Peter Weill - 2004
These top performers have custom designed IT governance for their strategies. Just as corporate governance aims to ensure quality decisions about all corporate assets, IT governance links IT decisions with company objectives and monitors performance and accountability. Based on a study of 250 enterprises worldwide, IT Governance shows how to design and implement a system of decision rights that will transform IT from an expense to a profitable investment.
Ethereum: The Ultimate Guide to the World of Ethereum, Ethereum Mining, Ethereum Investing, Smart Contracts, Dapps and DAOs, Ether, Blockchain Technology
Ikuya Takashima - 2017
This book is going to provide you with everything you need to know about Ethereum and whether it is worth investing in now. Like many people, I became interested in Bitcoin years ago, when Bitcoin was still relatively new, but hinting at a huge profit margin for those who took the risk and invested. It was after a couple of years playing around on the Bitcoin market that I heard about a new type of blockchain technology, one that wasn’t just a digital form of payment, but one that could support potentially endless different types of applications. Not only that, but it comes with its own currency. This, to me, sounded like a potentially profitable situation, so I decided to dig a little deeper. Unlike Bitcoin, Ethereum is still largely unknown to those who don’t keep up with the cryptocurrency world, so the amount of information available is limited or highly technical. Still, it was fascinating and the more I read about Ethereum, the more I began to see its huge potential. And I’m not alone. More and more Fortune 500 companies are investing in Ethereum technology as it becomes increasingly lucrative and poises to change business processes as we know them. I decided to condense my research and share my knowledge on Ethereum by writing this book. The book is designed for those who are new to cryptocurrency, but want to invest in it or learn more about it, as well as for more experienced traders looking to expand their portfolios. With a 5,000% increase in value in the first few months of 2017, Ethereum is proving to be a profitable currency. Still, as it is so new – it was only launched in 2015 – it comes with many infancy-related risks. It’s partly this that makes it so exciting. This book will help you make your own investment decisions and decide if Ethereum is the right coin for you after weighing up the pros and cons that are presented here. So far, Ethereum has made me good money and I was lucky to make the investment when I did. However, now is not too late to invest, not by a long shot. In fact, now is the perfect moment to make the most of Ethereum’s infancy and gain potential first-mover advantages. Ethereum’s technology is only at the beginning of its potential growth stages, possibly reaching to dozens of industries and thousands of services. If its technology is adopted the way it is expected to be, Ethereum will enjoy a long and lucrative spot at the top. The profits are ripe for the taking. Here Is A Preview Of What’s Included… What Is Ethereum? Smart Contracts, Dapps, And DAOs The Technology Behind Ethereum What Is Ethereum Mining? Uses Of Ethereum What Is Ether? The Financial History Of Ether How to Buy, Sell, And Store Ether The Mining Process Of Ether Should I Invest In Ether? The Future Of Ethereum Much, Much More! Get your copy today!
Ubuntu: The Beginner's Guide
Jonathan Moeller - 2011
In the Guide, you'll learn how to: -Use the Ubuntu command line. -Manage users, groups, and file permissions. -Install software on a Ubuntu system, both from the command line and the GUI. -Configure network settings. -Use the vi editor to edit system configuration files. -Install and configure a Samba server for file sharing. -Install SSH for remote system control using public key/private key encryption. -Install a DHCP server for IP address management. -Install a LAMP server. -Install web applications like WordPress and Drupal. -Configure an FTP server. -Manage ebooks. -Convert digital media. -Manage and configure Unity, the default Ubuntu environment. -Manage and halt processes from the command line. -Set up both a VNC server and a client. -Enjoy games on Ubuntu. -And many other topics.
Learning SAS by Example: A Programmer's Guide
Ron Cody - 2007
In an instructive and conversational tone, Cody clearly explains how to program SAS, illustrating with one or more real-life examples and giving a detailed description of how the program works.
An Introduction to Genetic Algorithms
Melanie Mitchell - 1996
This brief, accessible introduction describes some of the most interesting research in the field and also enables readers to implement and experiment with genetic algorithms on their own. It focuses in depth on a small set of important and interesting topics--particularly in machine learning, scientific modeling, and artificial life--and reviews a broad span of research, including the work of Mitchell and her colleagues.The descriptions of applications and modeling projects stretch beyond the strict boundaries of computer science to include dynamical systems theory, game theory, molecular biology, ecology, evolutionary biology, and population genetics, underscoring the exciting general purpose nature of genetic algorithms as search methods that can be employed across disciplines.An Introduction to Genetic Algorithms is accessible to students and researchers in any scientific discipline. It includes many thought and computer exercises that build on and reinforce the reader's understanding of the text. The first chapter introduces genetic algorithms and their terminology and describes two provocative applications in detail. The second and third chapters look at the use of genetic algorithms in machine learning (computer programs, data analysis and prediction, neural networks) and in scientific models (interactions among learning, evolution, and culture; sexual selection; ecosystems; evolutionary activity). Several approaches to the theory of genetic algorithms are discussed in depth in the fourth chapter. The fifth chapter takes up implementation, and the last chapter poses some currently unanswered questions and surveys prospects for the future of evolutionary computation.
Go in Practice
Matt Butcher - 2015
Following a cookbook-style Problem/Solution/Discussion format, this practical handbook builds on the foundational concepts of the Go language and introduces specific strategies you can use in your day-to-day applications. You'll learn techniques for building web services, using Go in the cloud, testing and debugging, routing, network applications, and much more.
Async in C# 5.0
Alex Davies - 2012
Along with a clear introduction to asynchronous programming, you get an in-depth look at how the async feature works and why you might want to use it in your application.Written for experienced C# programmers—yet approachable for beginners—this book is packed with code examples that you can extend for your own projects.Write your own asynchronous code, and learn how async saves you from this messy choreDiscover new performance possibilities in ASP.NET web server codeExplore how async and WinRT work together in Windows 8 applicationsLearn the importance of the await keyword in async methodsUnderstand which .NET thread is running your code—and at what points in the programUse the Task-based Asynchronous Pattern (TAP) to write asynchronous APIs in .NETTake advantage of parallel computing in modern machinesMeasure async code performance by comparing it with alternatives
Pro Django
Marty Alchin - 2008
Learn how to leverage the Django web framework to its full potential in this advanced tutorial and reference. Endorsed by Django, Pro Django more or less picks up where The Definitive Guide to Django left off and examines in greater detail the unusual and complex problems that Python web application developers can face and how to solve them.Provides in-depth information about advanced tools and techniques available in every Django installation Runs the gamut from the theory of Django's internal operations to actual code that solves real-world problems for high-volume environments Goes above and beyond other books, leaving the basics behind Shows how Django can do things even its core developers never dreamed possible
Blue Team Field Manual (BTFM)
Alan J. White - 2017
Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting of the five core functions of Identify, Protect, Detect, Respond, and Recover by providing the tactical steps to follow and commands to use when preparing for, working through and recovering from a Cyber Security Incident.
Zero Trust Networks: Building Secure Systems in Untrusted Networks
Evan Gilman - 2017
Hosts behind the firewall have no defenses of their own, so when a host in the trusted zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they're internet-facing, and considers the entire network to be compromised and hostile.Authors Evan Gilman and Doug Barth show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You'll learn the architecture of a zero trust network, including how to build one using currently available technology.Understand how the zero trust model embeds security within the system's operation, rather than layering it on topExamine the fundamental concepts at play in a zero trust network, including network agents and trust enginesUse existing technology to establish trust among the actors in a networkLearn how to migrate from a perimeter-based network to a zero trust network in productionExplore case studies of zero trust on the client side (Google) and on the server (PagerDuty)
Designing for People
Henry Dreyfuss - 1967
Dreyfuss have shaped the cultural landscape of the 20th century. Written in a robust, fresh style, this book offers an inviting mix of professional advice, case studies, and design history along with historical black-and-white photos and the author's whimsical drawings. In addition, the author's uncompromising commitment to public service, ethics, and design responsibility makes this masterful guide a timely read for today's designers.
Customers Included: How to Transform Products, Companies, and the World - With a Single Step
Mark Hurst - 2013
Using real-world case studies - from Apple, Netflix, and Walmart to an African hand pump, a New York City park, and the B-17 bomber - the book clearly explains why including the customer is an essential ingredient of success for any team, company, or organization. Coauthors Mark Hurst and Phil Terry, pioneers in the field of customer experience, provide practical tips for a strategic, customer-inclusive approach that generates results.