Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Microservices Best Practices for Java
Microservices is an architectural style in which large, complex software applications are composed of one or more smaller services. Each of these microservices focuses on completing one task that represents a small business capability. These microservices can be developed in any programming language. This book covers Microservices best practices fo...
Access Denied
A study of Internet blocking and filtering around the world: analyses by leading researchers and survey results that document filtering practices in dozens of countries. Many countries around the world block or filter Internet content, denying access to information that they deem too sensitive for ordinary citizens - most often about politics, b...
PHP: The Right Way
There's a lot of outdated information on the Web that leads new PHP users astray, propagating bad practices and insecure code. PHP: The Right Way is an easy-to-read, quick reference for PHP popular coding standards, links to authoritative tutorials around the Web and what the contributors consider to be best practices at the present time. T...
Operating Systems and Middleware
Suppose you sit down at your computer to check your email. One of the messages includes an attached document, which you are to edit. You click the attachment, and it opens up in another window. After you start editing the document, you realize you need to leave for a trip. You save the document in its partially edited state and shut down the comput...
Protecting SQL Server Data
In Protecting SQL Server Data, John Magnabosco demonstrates how sensitive data, stored in SQL Server, can be protected using an efficient and maintainable encryption-based data architecture. He explains how to assess and categorize data elements according to sensitivity, regulate access to the various categories of data using database roles, vie...
Introducing Windows 10 for IT Professionals
Get a head start evaluating Windows 10-with technical insights from award-winning journalist and Windows expert Ed Bott. This guide introduces new features and capabilities, providing a practical, high-level overview for IT professionals ready to begin deployment planning now. The goal of this book is to help you sort out what's new in Wind...
The Missing Link
Web development is an evolving amalgamation of languages that work in concert to receive, modify, and deliver information between parties using the Internet as a mechanism of delivery. While it is easy to describe conceptually, implementation is accompanied by an overwhelming variety of languages, platforms, templates, frameworks, guidelines, and ...
Cisco ACE to Nginx
This ebook provides step-by-step instructions on replacing Cisco ACE with Nginx and off-the-shelf servers. Nginx helps you cut costs and modernize. Cisco entered the hardware load balancer market with an add-on "Application Control Engine" (ACE) module for its Catalyst 6500-series switches, the Cisco ACE30. Soon after they released the...
Agroecology Now!
This open book develops a framework for advancing agroecology transformations focusing on power, politics and governance. It explores the potential of agroecology as a sustainable and socially just alternative to today's dominant food regime. Agroecology is an ecological approach to farming that addresses climate change and biodiversity loss w...
The State of Peacebuilding in Africa
This open book on the state of peacebuilding in Africa brings together the work of distinguished scholars, practitioners, and decision makers to reflect on key experiences and lessons learned in peacebuilding in Africa over the past half century. The core themes addressed by the contributors include conflict prevention, mediation, and management; p...
The Cloud-to-Thing Continuum
The Internet of Things offers massive societal and economic opportunities while at the same time significant challenges, not least the delivery and management of the technical infrastructure underpinning it, the deluge of data generated from it, ensuring privacy and security, and capturing value from it. This open access pivot explores these chall...
External Collaboration with Azure AD B2B Succinctly
Secure collaboration in your organization's applications and services with outside groups can be tricky, but Azure Active Directory boasts features that make it simple. In External Collaboration with Azure AD B2B Succinctly, author Sjoukje Zaal takes readers step-by-step through creating guest accounts, managing security groups, and adding use...
Building Modern Web Applications With Spring Boot and Vaadin
This guide is a practical introduction to web application development with Spring Boot and Vaadin. It covers the entire development process, from setup to deployment, following a step-by-step approach. You can replicate each section at your own pace as you follow along. The content is suitable for anyone familiar with Java who wants to build ...
Defend Dissent
Defend Dissent is an introduction to cryptography paired with the social impacts of surveillance and the protective potential of encryption, with a focus on US social movements. Each chapter ends with a story that brings social context to the material - from surveillance used against contemporary US protests to the African National Congress's ...
The Little ASP.NET Core Book
If you're new to programming, this book will introduce you to thepatterns and concepts used to build modern web applications. You'lllearn how to build a web app (and how the big pieces fit together) by building something from scratch! While this little book won't be able tocover absolutely everything you need to know about programmin...
Hacking Portugal
As technology and software become more and more important to Portuguese society, it is time for Portugal to take them more seriously, and become a real player in that world. This book discusses several ideas to make Portugal a place where programming, TDD, Open Source, learning how to code, hacking (aka bug-bounty style), and DevOps receive the con...
Cloud Native DevOps with Kubernetes
Kubernetes has become the operating system of today's cloud native world, providing a reliable and scalable platform for running containerized workloads. In this friendly, pragmatic book, cloud experts Justin Domingus and John Arundel show you what Kubernetes can do-and what you can do with it. This updated second edition guides you through...
Symfony
The Symfony Framework is well-known for being really flexible and is used to build micro-sites, enterprise applications that handle billions of connections and even as the basis for other frameworks. Since its release in July 2011, the community has learned a lot about what's possible and how to do things best. These community resources - l...
97 Things Every SRE Should Know
Site reliability engineering (SRE) is more relevant than ever. Knowing how to keep systems reliable has become a critical skill. With this practical book, newcomers and old hats alike will explore a broad range of conversations happening in SRE. You'll get actionable advice on several topics, including how to adopt SRE, why SLOs matter, when y...
The Enterprise Path to Service Mesh Architectures
Planning to build a microservice-driven cloud native application or looking to modernize existing application services? Consider using a service mesh. A service mesh approach can help you create robust and scalable applications, but it also introduces new challenges. This updated report answers common questions regarding service mesh architectures ...
Defense against the Black Arts
As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It...
A Treatise on Systems (volume 1)
Network and System Administration usually refers only to the traditional skills and recipes for keeping computers and networks running properly. But, in truth, this view omits the most important part of the system: humans. The skill needed to comprehend and tame systems comprising both humans and machines is that of managing complexity. In this boo...
Introduction to Embedded Systems
An introduction to the engineering principles of embedded systems, with a focus on modeling, design, and analysis of cyber-physical systems. The most visible use of computers and software is processing information for human consumption. The vast majority of computers in use, however, are much less visible. They run the engine, brakes, seatbelts,...
Load Balancing in the Cloud
Use of redundant servers has long been a solution for meeting sudden spikes in demand, machine failures, and outages. Cloud services greatly reduce the cost and hassle of provisioning redundant equipment and load balancers and give you the ability to deal with separate network, application, and client-side loads. But today there are many options to...
Kafka: The Definitive Guide
Every enterprise application creates data, whether it consists of log messages, metrics, user activity, or outgoing messages. Moving all this data is just as important as the data itself. With this updated edition, application architects, developers, and production engineers new to the Kafka streaming platform will learn how to handle data in motio...
A Practical Guide to Cloud Migration
Why do enterprises feel daunted when undertaking a large-scale cloud transformation? A move to the cloud usually offers substantial rewards. Once companies make this transition, they unlock new business opportunities that fundamentally change the way they work. With this report, members of the Google team will show you how to navigate the cultural ...
Atlas of Challenges and Opportunities in European Neighbourhoods
This atlas provides a macro-regional overview of the areas that surround the European Union, from the Sahara to the Middle East, Western Balkans to European Russia, Turkey to the Arctic. Detailing key socio-economic data as well as developmental trends, the maps provide a comprehensive territorial analysis at a local scale and explore the potential...
Asian Century… on a Knife-edge
This book delves into the widely held belief that the 21st century will be the "Asian Century" by examining the Asia's rapid economic development in the post-war era and the challenges it faces in forging ahead of world leaders in the West.The impact of the current turbulent global political climate on Asia is critically analyzed, em...
Social Theory of Fear
In the current crisis of the capitalist world system, elites promote fear of crime and terrorism to keep and expand their privileges and control the masses. This book offers an analysis of the crisis and strategies for rebellion....
Anti-fragile ICT Systems
This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-frag...
Agile Processes in Software Engineering and Extreme Programming
This book constitutes the proceedings of the 19th International Conference on Agile Software Development, XP 2018, held in Porto, Portugal, in May 2018. XP is the premier agile software development conference combining research and practice, and XP 2018 provided a playful and informal environment to learn and trigger discussions around its main th...
Evaluating Climate Change Action for Sustainable Development
This book is open access under a Creative Commons license.This authoritative book presents the ever progressing state of the art in evaluating climate change strategies and action. It builds upon a selection of relevant and practical papers and presentations given at the 2nd International Conference on Evaluating Climate Change and Development held...

1 2 3 4 5 6 ... 9