Use of redundant servers has long been a solution for meeting sudden spikes in demand, machine failures, and outages. Cloud services greatly reduce the cost and hassle of provisioning redundant equipment and load balancers and give you the ability to deal with separate network, application, and client-side loads. But today there are many options to...
Every enterprise application creates data, whether it consists of log messages, metrics, user activity, or outgoing messages. Moving all this data is just as important as the data itself. With this updated edition, application architects, developers, and production engineers new to the Kafka streaming platform will learn how to handle data in motio...
This book is for those whose financial management focus is on small businesses. For you, we adapt the traditional financial management themes emphasized in corporate financial management courses to meet the needs of small businesses.
Many financial managers of small businesses come from farms or agribusinesses. Others are interested in working f...
This collection of essays is the result of the joint efforts of colleagues and students of the leading social anthropology and post-socialism theorist, Professor Chris Hann. With the thirtieth anniversary of the collapse of the Berlin Wall in 2019 as their catalyst, the authors reflect upon Chris Hann's lifelong fieldwork in the discipline, sp...
Microservices architectures introduce several benefits to the application development and delivery process. Microservices-based apps are easier to build, test, maintain, and scale. They also reduce downtime through better fault isolation.
While container-based microservices apps have profoundly changed the way DevOps teams deploy applications, t...
Hacking games requires a unique combination of reversing, memory management, networking, and security skills. Even as ethical hacking has exploded in popularity, game hacking still occupies a very small niche in the wider security community. While it may not have the same headline appeal as a Chrome 0day or a massive data leak, the unique feeling o...
The world has become more complicated with the introduction and development of new technologies and methods, and novel risks such as Covid-19 pandemic. Competition has been tougher than it used to be. Organizations strive to keep up with the changes in the internal and external environment. In the light of unprecedented changes, project managers mu...
This open textbook supports the learning outcomes of Fanshawe College's Advanced Professional Communications curriculum (COMM 6019). Organized in five major units - Foundational Principles of Business Messaging, The Principles of Business Style, Format, and Composition, The Principles of Social, Cultural and Employment Communication, The Princ...
The aim of this short book is to introduce the general themes, challenges, and opportunities in the world of managing API traffic. Most of the examples and recommendations come from my own experience (or that of colleagues) while working with customers, ranging from small local startups to global enterprises.
This book is for those just getting ...
A lot of work is required to release an API, but the effort doesn't always pay off. Overplanning before an API matures is a wasted investment, while underplanning can lead to disaster. The second edition of this book provides maturity models for individual APIs and multi-API landscapes to help you invest the right human and company resources f...
Introduction to engineering mechanics: statics, for those who love to learn. Concepts include: particles and rigid body equilibrium equations, distributed loads, shear and moment diagrams, trusses, method of joints and sections, & inertia.
This is the first of two courses to describe how objects move and the forces that cause motion. This co...
When you start building your first containerized application, you're excited about the capabilities and opportunities you encounter: it runs the same in dev and in prod, it's straightforward to put together a container image using Docker, and the distribution is taken care of by a container registry.
So, you're satisfied with how ...
Introduction to Philosophy provides an overview of a common range of philosophical topics for a first- or second-year general education philosophy course. It is organized thematically, following the principal categories of academic philosophy (logic, metaphysics, epistemology, theories of value, and history of philosophy). A recurring theme of Intr...
This book contains the background that's missing from other tutorials. Here you'll learn key concepts so you'll have a solid foundation for continued study. Whether you choose to continue with another book in this series, a video course, or a code school, everything will make sense when you start here.
You can read this book anywh...
Many forces affect software today: larger datasets, geographical disparities, complex company structures, and the growing need to be fast and nimble in the face of change. Proven approaches such as service-oriented and event-driven architectures are joined by newer techniques such as microservices, reactive architectures, DevOps, and stream process...
NoSQL is a modern data persistence storage paradigm that provides data persistence for environments where high performance is a primary requirement. Within NoSQL, data is stored in such a way as to make both writing and reading quite fast, even under heavy load.
Redis and Redis Enterprise are market-leading, multi-model NoSQL databases that brin...
Now that software development is shifting primarily toward mobile and cloud computing, the venerable C++ programming language is returning to the dominant position it held during the object-oriented boom of the 1990s. In this O'Reilly report, you'll learn why C++ is once again the preferred choice across several diverse industries, after ...
Is Kubernetes ready for stateful workloads? This open source system has become the primary platform for deploying and managing cloud native applications. But because it was originally designed for stateless workloads, working with data on Kubernetes has been challenging. If you want to avoid the inefficiencies and duplicative costs of having separa...
Blockchain For Dummies, 2nd IBM Limited Edition, equips you with an understanding of what blockchain is, how it works, and how it can enhance your business and the industry in which it operates. You learn the fundamentals of blockchain and how this technology revolutionizes transactions and business networks. You also discover the important differe...
Freshly updated for GTK3, the 2nd edition of An Introduction to C & GUI Programming will teach you all you need to know to write simple programs in C and start creating GUIs, even if you're an absolute beginner.
The first half of the book is an introduction to C, and covers the basics of writing simple command-line programs. The second ...
This book is an introduction to the language of systems biology, which is spoken among many disciplines, from biology to engineering. Authors Thomas Sauter and Marco Albrecht draw on a multidisciplinary background and evidence-based learning to facilitate the understanding of biochemical networks, metabolic modeling and system dynamics.
Their pe...
This book is aimed at managers, business owners, marketing managers, and aspiring social media marketing interns and managers. I will assume that however accomplished in your own field - baker, developer, teacher and that even as successful business owners, you approach the topic of social media marketing as a beginner. Even if you are an avid pers...
DevOps engineers, developers, and security engineers have ever-changing roles to play in today's cloud native world. In order to build secure and resilient applications, you have to be equipped with security knowledge. Enter security as code.
In this book, authors BK Sarthak Das and Virginia Chu demonstrate how to use this methodology to se...
This is a chapter from The Criminal Act: The Role and Influence of Routine Activity Theory edited by Martin A. Andresen and Graham Farrell. Target suitability is a cornerstone of Marcus Felson's routine activities approach, and critical in determining crime rates. Recent research identifies reduced target suitability, via improved security, as...
This is a chapter from Absence in Science, Security and Policy edited by Brian Rappert and Brian Balmer. Part reflection on the forthcoming chapters, part analysis of academic literature, and part programmatic agenda setting, this introduction chapter forwards the importance of questioning taken for granted assumptions in sensing what is absent as ...
Pro Git, 2nd Edition is your fully-updated guide to Git and its usage in the modern world. Git has come a long way since it was first developed by Linus Torvalds for Linux kernel development. It has taken the open source world by storm since its inception in 2005, and this book teaches you how to use it like a pro.
Effective and well-implemented v...
The first of its kind, this Open Report is a first step in assessing the state of the humanities worldwide. Based on an extensive literature review and enlightening interviews the book discusses the value of the humanities, the nature of humanities research and the relation between humanities and politics, amongst other issues....
Every four years, Schaeffler provides an insight into its latest developments and technologies from the engine, transmission and chassis as well as hybridization and electric mobility sectors. In 2014 the Schaeffler Symposium with the motto "Solving the Powertrain Puzzle" took place from 3th to 4th of April in Baden-Baden. Mobility for to...
This collection examines how higher education responds to the demands of the automation economy and the fourth industrial revolution. Considering significant trends in how people are learning, coupled with the ways in which different higher education institutions and education stakeholders are implementing adaptations, it looks at new programs ...
This book comprises the Proceedings of the 12th International Congress on Mathematical Education (ICME-12), which was held at COEX in Seoul, Korea, from July 8th to 15th, 2012. ICME-12 brought together 4700 experts from 100 countries, working to understand all of the intellectual and attitudinal challenges in the subject of mathematics education as...
In this edited open access book leading scholars from different disciplinary backgrounds wrestle with social science integration opportunities and challenges. This book explores the growing concern of how best to achieve effective integration of the social science disciplines as a means for furthering natural resource social science and environment...
Romania is an active player in various international higher education areas, while undergoing a series of higher education reforms within its national framework. The Higher Education Evidence Based Policy Making: a necessary premise for progress in Romania project was implemented by the Executive Agency for Higher Education, Research, Development ...