This book is designed to introduce you to using Ansible to manage your servers. You'll learn how to install and configure Ansible on a control node, and then how to use it to configure and run commands on remote servers. You'll also learn how to collect tasks into complete Playbooks to automate server setup from start to finish.
The to...
This book is the first academic study of the post-mortem practice of gibbeting ('hanging in chains'), since the nineteenth century. Gibbeting involved placing the executed body of a malefactor in an iron cage and suspending it from a tall post. A body might remain in the gibbet for many decades, while it gradually fell to pieces. Hanging ...
This book explores the magical and medical history of executions from the eighteenth to the early twentieth century by looking at the afterlife potency of criminal corpses, the healing activities of the executioner, and the magic of the gallows site. The use of corpses in medicine and magic has been recorded back into antiquity. The lacerated bodie...
This book is the culmination of many years of research on what happened to the bodies of executed criminals in the past. Focusing on the eighteenth and nineteenth centuries, it looks at the consequences of the 1752 Murder Act. These criminal bodies had a crucial role in the history of medicine, and the history of crime, and great symbolic resonance...
Azure Functions is a new service available in Microsoft Azure to help developers run code on serverless architectures. In essence, Azure Functions is about events and code - developers write some code that will be executed upon some triggering event - but what sets Azure Functions apart is its simplicity. Developers can write just the code they nee...
Vim is a console-based multi-mode (modal) text editor. It is widely used and available by default on all Unix, Linux, and Apple OS X systems. Vim has a large active community and a wide user base. The editor supports all popular programming languages, and many plugins are available to extend its features.
It is an unofficial and free Vim book cr...
Node.js is a popular open-source runtime environment that can execute JavaScript outside of the browser. The Node runtime is commonly used for back-end web development, leveraging its asynchronous capabilities to create networking applications and web servers. Node is also a popular choice for building command line tools.
In this book, you will ...
Learn how to accelerate C++ programs using data parallelism. This open book enables C++ programmers to be at the forefront of this exciting and important new development that is helping to push computing to new levels. It is full of practical advice, detailed explanations, and code examples to illustrate key topics.
Data parallelism in C++ enables...
Mastering Dyalog APL is a complete guide to the use of Dyalog, beginning with a thorough introduction to the APL programming language. Following this, the tutorial describes a large number of common coding techniques and discusses a variety of interfaces, including file handling and COM/OLE. Bernard Legrand provides a comprehensive introduction to ...
Every Database Administrator, developer, report writer, and anyone else who writes T-SQL to access SQL Server data, must understand how to read and interpret execution plans. My book leads you right from the basics of capturing plans, through how to interrupt them in their various forms, graphical or XML, and then how to use the information you fin...
Svelte departs from the virtual DOM approach by compiling the code you write into native-browser JavaScript when you build your application. The result is minimal and highly optimized pure JavaScript that the browser executes with no heavy runtime. In Svelte Succinctly, Ed Freitas will show readers how to install Svelte and give them a condensed ov...
This book is a step-by-step introduction on how shell scripting can help solve many of the data processing tasks that Health and Life specialists face everyday with minimal software dependencies. The examples presented in the book show how simple command line tools can be used and combined to retrieve data and text from web resources, to filter and...
Those convicted of homicide were hanged on the public gallows before being dissected under the Murder Act in Georgian England. Yet, from 1752, whether criminals actually died on the hanging tree or in the dissection room remained a medical mystery in early modern society. Dissecting the Criminal Corpse takes issue with the historical cliché of cor...
Intel Xeon Phi Coprocessor Architecture and Tools: The Guide for Application Developers provides developers a comprehensive introduction and in-depth look at the Intel Xeon Phi coprocessor architecture and the corresponding parallel data structure tools and algorithms used in the various technical computing applications for which it is suitable. It...
This book is a modern guide for all C++ programmers to learn Threading Building Blocks (TBB). Written by TBB and parallel programming experts, this book reflects their collective decades of experience in developing and teaching parallel programming with TBB, offering their insights in an approachable manner. Throughout the book the authors present ...
S-BPM stands for "subject-oriented business process management" and focuses on subjects that represent the entities (people, programs etc.) that are actively engaged in processes. S-BPM has become one of the most widely discussed approaches for process professionals. Its potential particularly lies in the integration of advanced informati...
This is the first book to present field studies on the application of subject-oriented business process management (S-BPM). Each case presents a specific story and focuses on an essential modeling or implementation issue, and most end with implications or suggestions for further studies. Significant variables and success factors are identified that...
This book is a multidisciplinary work that investigates the notion of posthumous harm over time. The question what is and when is death, affects how we understand the possibility of posthumous harm and redemption. Whilst it is impossible to hurt the dead, it is possible to harm the wishes, beliefs and memories of persons that once lived. In this wa...
Cloud Computing is enabling many trends in IT today: microservices, pay-as-you-go pricing, and serverless architectures, to name three. The biggest player in the market's Amazon, who offers the most mature cloud systems through their Amazon Web Services (AWS). Other companies are gaining traction as well: Google invests into their Google Cloud...
This free book provides the most in-depth study of capital punishment in Scotland between the mid-eighteenth and early nineteenth century to date. Based upon an extensive gathering and analysis of previously untapped resources, it takes the reader on a journey from the courtrooms of Scotland to the theatre of the gallows. It introduces them to seve...
This book analyses the different types of post-execution punishments and other aggravated execution practices, the reasons why they were advocated, and the decision, enshrined in the Murder Act of 1752, to make two post-execution punishments, dissection and gibbeting, an integral part of sentences for murder. It traces the origins of the Act, and t...
This open access book describes the three planning approaches and legacy impacts for the Olympic Games in one locale: the city of Los Angeles, USA. The author critically compares the similarities and differences of the LA Olympics by reviewing the 1932 and 1984 Olympics and by analyzing the concurrent planning process for the 2028 Olympics. The au...
This free book presents an overview and step-by-step explanation of process management. It starts with the individual participants' perspectives on their work in a process and its structuring and harmonization, and then moves on to its specification in a model and how it is embedded in the organizational and IT environment of the company. Last...
Dynamic Management Views (DMVs) are a significant and valuable addition to the DBA's troubleshooting armory, laying bare previously unavailable information regarding the under-the-covers activity of your database sessions and transactions.
Why, then, aren't all DBAs using them? Why do many DBAs continue to ignore them in favour of &quo...
In this book, you'll discover how to perform each of these backup and restore operations using SQL Server Management Studio (SSMS), basic T-SQL scripts and Redgate's SQL Backup tool. Capturing backups using SSMS or simple scripts is perfectly fine for one-off backup operations, but any backups that form part of the recovery strategy for a...
If you've designed your SQL code intelligently and implemented a sensible indexing strategy, there's a good chance your queries will "fly", when tested in isolation. In the real world, however, where multiple processes can access the same data at the same time, SQL Server often has to make one process wait, sacrificing concurren...
Linux systems are everywhere today, even in companies once considered "pure Windows." If you're a sysadmin, network administrator, or developer in a small Windows shop, you may have to jump in and fix a system problem when your site goes down. What if you have no Linux knowledge? This short guide provides tips to help you survive.
...
Known for its straightforward simplicity, PHP is an open source, general-purpose scripting language oriented for web development. In PHP Succinctly, author José Roberto Olivas Mendoza guides newcomers through PHP's basics, which includes deployment, programming themes such as variables, decision making, arrays, functions, and databases, and t...
The Bash Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Istio is one of the most popular solutions for service meshes in cloud-native infrastructures, and it is most often deployed on Kubernetes clusters. In Istio Succinctly, authors Rahul Rai and Tarun Pabbi provide a practical guide to getting started with Istio, from setting up a Kubernetes cluster, to managing its traffic management, security, obser...
In a company, when the business process is defined, employees feel confident in their roles. They understand expectations and can easily identify when something is amiss or requires escalation. In Business Process Flow Mapping Succinctly, Erica Quigley will show you the activities that should occur in order to completely define a business process s...
Terms like container and Docker, unknown to Microsoft programmers until now, have recently become essential in technical discussions about the development, distribution, and management of our applications. Containers can solve some of programmers' everyday problems, but a challenge with them is managing their lifecycles and the communication a...