Book picks similar to
Grid Computing by Joshy Joseph


casa-mariae
donado-fiuna
technical
technology

Introducing Microsoft SQL Server 2012


Ross Mistry - 2012
    This book is for anyone who has an interest in SQL Server 2012 and wants to understand its capabilities, including database administrators, application developers, and technical decision makers.

UML 2 and the Unified Process: Practical Object-Oriented Analysis and Design


Jim Arlow - 2001
    Even for people not working with the Unified Process, the book is still of great use. UML 2 and the Unified Process, Second Edition is a must-read for every UML 2 beginner and a helpful guide and reference for the experienced practitioner."--Roland Leibundgut, Technical Director, Zuehlke Engineering Ltd."This book is a good starting point for organizations and individuals who are adopting UP and need to understand how to provide visualization of the different aspects needed to satisfy it. "--Eric Naiburg, Market Manager, Desktop Products, IBM Rational SoftwareThis thoroughly revised edition provides an indispensable and practical guide to the complex process of object-oriented analysis and design using UML 2. It describes how the process of OO analysis and design fits into the software development lifecycle as defined by the Unified Process (UP). UML 2 and the Unified Process contains a wealth of practical, powerful, and useful techniques that you can apply immediately. As you progress through the text, you will learn OO analysis and design techniques, UML syntax and semantics, and the relevant aspects of the UP. The book provides you with an accurate and succinct summary of both UML and UP from the point of view of the OO analyst and designer.This book providesChapter roadmaps, detailed diagrams, and margin notes allowing you to focus on your needs Outline summaries for each chapter, making it ideal for revision, and a comprehensive index that can be used as a reference New to this edition:Completely revised and updated for UML 2 syntax Easy to understand explanations of the new UML 2 semantics More real-world examples A new section on the Object Constraint Language (OCL) Introductory material on the OMG's Model Driven Architecture (MDA) The accompanying website providesA complete example of a simple e-commerce system Open source tools for requirements engineering and use case modeling Industrial-strength UML course materials based on the book

Ubuntu Linux Toolbox: 1000+ Commands for Ubuntu and Debian Power Users


Christopher Negus - 2007
    Try out more than 1,000 commands to find and get software, monitor system health and security, and access network resources. Then, apply the skills you learn from this book to use and administer desktops and servers running Ubuntu, Debian, and KNOPPIX or any other Linux distribution.

Field and Wave Electromagnetics


David K. Cheng - 1982
    These include applications drawn from important new areas of technology such as optical fibers, radome design, satellite communication, and microstrip lines. There is also added coverage of several new topics, including Hall effect, radar equation and scattering cross section, transients in transmission lines, waveguides and circular cavity resonators, wave propagation in the ionosphere, and helical antennas. New exercises, new problems, and many worked-out examples make this complex material more accessible to students.

ITIL Foundation: ITIL 4 Edition


AXELOS Limited - 2019
    It is designed to ensure a flexible, coordinated and integrated system for the effective governance and management of IT-enabled services."ITIL Foundation" is the first ITIL 4 publication and the latest evolution of the most widely-adopted guidance for ITSM. Its audience ranges from IT and business students taking their first steps in service management to seasoned professionals familiar with earlier versions of ITIL and other sources of industry best practice.The guidance provided in this publication can be adopted and adapted for all types of organizations and services. To show how the concepts of ITIL can be practically applied to an organization's activities, ITIL Foundation follows the exploits of a fictional company on its ITIL journey.

Cognition


Jacques St-Malo - 2019
    When research suggests how to harness brain evolution, a hunt ensues for a missing link―one that allows to design humans with skills that prodigies of old would have envied.As germline engineering and biological enhancement have become routine, ancient doubts have emerged under new guises: Who are we? Is there a purpose to life? Why is there so much suffering? When faith and science fail to answer these questions, personal greed and national interest quickly fill the void. But gene selection is expensive, and many are excluded from its benefits. The stage is set for tribalism and social discontent on a scale without precedent, and those caught in the fray, whether by choice or by chance, must play roles not always to their liking in the struggle of all creatures against the arbitrariness of existence.

Humans vs Computers


Gojko Adzic - 2017
    You'll read about humans who are invisible to computers, how a default password once caused a zombie apocalypse and why airlines sometimes give away free tickets. This is also a book on how to prevent, avoid and reduce the impact of such problems. Our lives are increasingly tracked, monitored and categorised by software, driving a flood of information into the vast sea of big data. In this brave new world, humans can't cope with information overload. Governments and companies alike rely on computers to automatically detect fraud, predict behaviour and enforce laws. Inflexible automatons, barely smarter than a fridge, now make life-changing decisions. Clever marketing tricks us into believing that phones, TV sets and even cars are somehow smart. Yet all those computer systems were created by people - people who are well-meaning but fallible and biased, clever but forgetful, and who have grand plans but are pressed for time. Digitising a piece of work doesn't mean there will be no mistakes, but instead guarantees that when mistakes happen, they'll run at a massive scale. The next time you bang your head against a digital wall, the stories in this book will help you understand better what's going on and show you where to look for problems. If nothing else, when it seems as if you're under a black-magic spell, these stories will at least allow you to see the lighter side of the binary chaos. For people involved in software delivery, this book will help you find more empathy for people suffering from our mistakes, and discover heuristics to use during analysis, development or testing to make your software less error prone. <

Ruby for Rails: Ruby Techniques for Rails Developers


David A. Black - 2006
    That means you can't tap into the full power of Rails unless you master the Ruby language. ""Ruby for Rails,"" written by Ruby expert David Black (with a forward by David Heinemeier Hansson), helps Rails developers achieve Ruby mastery. Each chapter deepens your Ruby knowledge and shows you how it connects to Rails. You'll gain confidence working with objects and classes and learn how to leverage Ruby's elegant, expressive syntax for Rails application power. And you'll become a better Rails developer through a deep understanding of the design of Rails itself and how to take advantage of it.Newcomers to Ruby will find a Rails-oriented Ruby introduction that's easy to read and that includes dynamic programming techniques, an exploration of Ruby objects, classes, and data structures, and many neat examples of Ruby and Rails code in action. ""Ruby for Rails"": the Ruby guide for Rails developers!What's Inside Classes, modules, and objects Collection handling and filtering String and regular expression manipulation Exploration of the Rails source code Ruby dynamics Many more programming concepts and techniques!

Valkyrie: The North American Xb-70: The Usa's Ill-Fated Supersonic Heavy Bomber


Graham M. Simons - 2011
    . . [with] new information, photographs and first-hand accounts." --FlypastDuring the 1950s, plans were being drawn at North American Aviation in Southern California for an incredible Mach-3 strategic bomber. The concept was born as a result of General Curtis LeMay's desire for a heavy bomber with the weapon load and range of the subsonic B-52 and a top speed in excess of the supersonic medium bomber, the B-58 Hustler. However, in April 1961, Defense Secretary McNamara stopped the production go-ahead for the B-70 because of rapid cost escalation and the USSR's newfound ability to destroy aircraft at extremely high altitude using either missiles or the new Mig-25 fighter. Nevertheless, in 1963 plans for the production of three high-speed research aircraft were approved and construction proceeded. In September 1964 the first Valkyrie, now re-coded A/V-1, took to the air for the first time and in October went supersonic.This book is the most detailed description of the design, engineering and research that went into this astounding aircraft. It is full of unpublished details, photographs and firsthand accounts from those closely associated with the project. Although never put into full production, this giant six-engined aircraft became famous for its breakthrough technology, and the spectacular images captured on a fatal air-to-air photo shoot when an observing Starfighter collided with Valkyrie A/V-2 which crashed into the Mojave Desert."Well-illustrated with numerous diagrams and black and white photographs, the book provides an interesting insight into one of the so-called 'white elephant' projects of the 1960s." --Jets Monthly

Tmux 2: Productive Mouse-Free Development


Brian P. Hogan - 2016
    The time you spend context switching between your editor and your consoles eats away at your productivity. Take control of your environment with tmux, a terminal multiplexer that you can tailor to your workflow. With this updated second edition for tmux 2.3, you'll customize, script, and leverage tmux's unique abilities to craft a productive terminal environment that lets you keep your fingers on your keyboard's home row.You have a database console, web server, test runner, and text editor running at the same time, but switching between them and trying to find what you need takes up valuable time and breaks your concentration. By using tmux 2.3, you can improve your productivity and regain your focus. This book will show you how.This second edition includes many features requested by readers, including how to integrate plugins into your workflow, how to integrate tmux with Vim for seamless navigation - oh, and how to use tmux on Windows 10.Use tmux to manage multiple terminal sessions in a single window using only your keyboard. Manage and run programs side by side in panes, and create the perfect development environment with custom scripts so that when you're ready to work, your programs are waiting for you. Manipulate text with tmux's copy and paste buffers, so you can move text around freely between applications. Discover how easy it is to use tmux to collaborate remotely with others, and explore more advanced usage as you manage multiple tmux sessions, add custom scripts into the tmux status line, and integrate tmux with your system.Whether you're an application developer or a system administrator, you'll find many useful tricks and techniques to help you take control of your terminal.

Podcast Launch - A Step by Step Podcasting Guide Including 15 Video Tutorials


John Lee Dumas - 2013
    This book comes with 15 video tutorials where the author, John Lee Dumas, will walk you through the more technical aspects of podcasting. These tutorials will make your podcast experience enjoyable and stress free. Podcast Launch begins with identifying your podcast, followed by equipment needed, recording and editing, intros and outros, tagging your MP3, uploading to a media host, embedding your MP3 onto your website, submitting your podcast to iTunes, Stitcher Radio, and Blackberry, launching your podcast the right way, building your audience, and monetizing. The author, John Lee Dumas, is the Founder and Host of the top ranked business podcast, EntrepreneurOnFire. EntrepreneurOnFire generates over 150,000 unique downloads every single month in over 140 countries. EntrepreneurOnFire’s lineup consists of Seth Godin, Tim Ferriss, Barbara Corcoran, Gary Vaynerchuk, Chris Brogan, MJ DeMarco, and over 170 others.In Podcast Launch, John Lee Dumas shares how he turned an idea into a red-hot podcast that inspires thousands of people daily. It started with an AHA moment, and passion has guided him ever since. John shares the lessons he learned so you can take advantage of all his victories and learn from all of his failures. Your final result will be a podcast of your own, and it will be amazing.

The 8051 Microcontroller and Embedded Systems


Muhammad Ali Mazidi - 1999
     Simple, concise examples are utilized to show what action each instruction performs, then a sample is provided to show its application. For anyone interested in learning about the 8051 microcontroller.

Unleashing the Killer App: Digital Strategies for Market Dominance


Larry Downes - 1998
    This title identifies the twelve fundamental design principles for building killer apps. It illustrates these principles with classic stories from history and examples from a range of industries that have successfully developed killer apps.

Programming in Go: Creating Applications for the 21st Century


Mark Summerfield - 2012
    With this guide, pioneering Go programmer Mark Summerfield shows how to write code that takes full advantage of Go's breakthrough features and idioms. Both a tutorial and a language reference, "Programming in Go" brings together all the knowledge you need to evaluate Go, think in Go, and write high-performance software with Go. Summerfield presents multiple idiom comparisons showing exactly how Go improves upon older languages, calling special attention to Go's key innovations. Along the way, he explains everything from the absolute basics through Go's lock-free channel-based concurrency and its flexible and unusual duck-typing type-safe approach to object-orientation. Throughout, Summerfield's approach is thoroughly practical. Each chapter offers multiple live code examples designed to encourage experimentation and help you quickly develop mastery. Wherever possible, complete programs and packages are presented to provide realistic use cases, as well as exercises. Coverage includes:-- Quickly getting and installing Go, and building and running Go programs -- Exploring Go's syntax, features, and extensive standard library -- Programming Boolean values, expressions, and numeric types -- Creating, comparing, indexing, slicing, and formatting strings -- Understanding Go's highly efficient built-in collection types: slices and maps -- Using Go as a procedural programming language -- Discovering Go's unusual and flexible approach to object orientation -- Mastering Go's unique, simple, and natural approach to fine-grained concurrency -- Reading and writing binary, text, JSON, and XML files -- Importing and using standard library packages, custom packages, and third-party packages -- Creating, documenting, unit testing, and benchmarking custom packages

Security Metrics: Replacing Fear, Uncertainty, and Doubt


Andrew Jaquith - 2007
    Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index