This guide is an introduction to developing microservices-based applications and managing them using containers. It discusses architectural design and implementation approaches using .NET Core and Docker containers. To make it easier to get started with containers and microservices, the guide focuses on a reference containerized and microservice-ba...
With the introduction of container support in Windows Server 2016, we open a world of opportunities that takes traditional monolithic applications on a journey to modernize them for better agility. Containers are a stepping stone that can help IT organizations understand what key items in modern IT environments, such as DevOps, Agile, Scrum, Infras...
Blazor technology enables you to create sophisticated, manageable, and extensible single-page applications using C# and Razor syntax. Blazor Succinctly will cover the core elements of Blazor, then explore additional features by building a sample help desk application. Michael Washington will take readers from creating the project in Visual Studio t...
The Entity Framework Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
James McCaffrey leads you through the fundamental concepts of neural networks, including their architecture, input-output, tanh and softmax activation, back-propagation, error and accuracy, normalization and encoding, and model interpretation. Although most concepts are relatively simple, there are many of them, and they interact with each other in...
As machine learning is increasingly leveraged to find patterns, conduct analysis, and make decisions - sometimes without final input from humans who may be impacted by these findings - it is crucial to invest in bringing more stakeholders into the fold. This book of Python projects in machine learning tries to do just that: to equip the developers ...
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making ...
Even the best programmers make mistakes, and experienced programmer Mike Pirnat has made his share during 15+ years with Python. Some have been simple and silly; others were embarrassing and downright costly. In this O'Reilly report, he dissects some of his most memorable blunders, peeling them back layer-by-layer to reveal just what went wron...
Neural networks are a powerful tool for developers, but harnessing them can be a challenge. With Keras Succinctly, author James McCaffrey introduces Keras, an open-source, neural network library designed specifically to make working with backend neural network tools easier....
Microsoft CNTK (Cognitive Toolkit, formerly Computational Network Toolkit), an open source code framework, enables you to create feed-forward neural network time series prediction systems, convolutional neural network image classifiers, and other deep learning systems. In Introduction to CNTK Succinctly, author James McCaffrey offers instruction on...
TensorFlow is a free and open-source software library for machine learning. It can be used across a range of tasks but has a particular focus on training and inference of deep neural networks.
This book is a somewhat intermediate-level introduction to Tensorflow 2. We will eventually cover everything tf.keras, but no so fast until we implemented t...
With so much media and political criticism of their shortcomings and failures, it is easy to overlook the fact that many governments work pretty well much of the time. Great Policy Successes turns the spotlight on instances of public policy that are remarkably successful. It develops a framework for identifying and assessing policy successes, payin...
The goals of this textbook are to help students acquire the technical skills of using software and managing a database, and develop research skills of collecting data, analyzing information and presenting results. We emphasize that the need to investigate the potential and practicality of GIS technologies in a typical planning setting and evaluate ...
At least 80% of all information being collected by enterprises includes geolocation data. The Bing Maps V8 library is a very large collection of JavaScript code that allows web developers to place a map on a webpage, query for data, and manipulate objects on a map, creating a geo-application. In Bing Maps V8 Succinctly, James McCaffrey takes reader...
Physiology - The word physiology is from the Ancient Greek (phusiologĂa) and it is the study of how organisms perform their vital functions. An example is the study of how a muscle contracts or the force contracting muscles exert on the skeleton. It was introduced by French physician Jean Fernery in 1552. Physiology is built upon a tripod of scien...
The figures are eye-opening: more than 1.6 billion works on 9 million websites are licensed under Creative Commons (CC). These materials constitute an extraordinarily rich repository for teaching, learning, sharing, and creative reuse. Knowing your way around CC will help you make the most of the Open Access (OA) and open educational resources (OER...
In Protecting SQL Server Data, John Magnabosco demonstrates how sensitive data, stored in SQL Server, can be protected using an efficient and maintainable encryption-based data architecture.
He explains how to assess and categorize data elements according to sensitivity, regulate access to the various categories of data using database roles, vie...
The utility simply known as make is one of the most enduring features of both Unix and other operating systems. First invented in the 1970s, make still turns up to this day as the central engine in most programming projects; it even builds the Linux kernel. In the third edition of the classic Managing Projects with GNU make, readers will learn why ...
Blazor is a framework for creating SPA webpages with either client-side or server-side architectures, using Razor technology written with the C# language. Because client-side Blazor with WebAssembly executes entirely on a user's browser, it's very fast for many applications. In Blazor WebAssembly Succinctly, Michael Washington will take r...
With the ascent of DevOps, microservices, containers, and cloud-based development platforms, the gap between state-of-the-art solutions and the technology that enterprises typically support has greatly increased. But as Markus Eisele explains in this O'Reilly report, some enterprises are now looking to bridge that gap by building microservice-...
This open book gathers authoritative contributions concerning multiscale problems in biomechanics, geomechanics, materials science and tribology. It is written in memory of Sergey Grigorievich Psakhie to feature various aspects of his multifaceted research interests, ranging from theoretical physics, computer modeling of materials and material char...
The emergence of the Internet of Things (IoT), combined with greater heterogeneity not only online in cloud computing architectures but across the cloud-to-edge continuum, is introducing new challenges for managing applications and infrastructure across this continuum. The scale and complexity is simply so complex that it is no longer realistic for...
The Internet of Things offers massive societal and economic opportunities while at the same time significant challenges, not least the delivery and management of the technical infrastructure underpinning it, the deluge of data generated from it, ensuring privacy and security, and capturing value from it.
This open access pivot explores these chall...
This open book presents and analyzes the results of more than 30 years of long-term ecological research in riparian forest ecosystems with the aim of casting light on changes in the dynamics of riparian forests over time. The research, focusing on the Ooyamazawa riparian forest, one of the remaining old-growth forests in Japan, has yielded a number...
This open book provides an overview of the recent advances in representation learning theory, algorithms and applications for natural language processing (NLP). It is divided into three parts. Part I presents the representation learning techniques for multiple language entries, including words, phrases, sentences and documents. Part II then introdu...
Through fifteen essays that work from a rich array of primary sources, this collection makes the novel claim that early modern European women, like men, had a youth. European culture recognised that, between childhood and full adulthood, early modern women experienced distinctive physiological, social, and psychological transformations. Drawing on ...
The audience for this guide is mainly developers, development leads, and architects who are interested in building modern web applications using Microsoft technologies and services in the cloud.
A secondary audience is technical decision makers who are already familiar ASP.NET or Azure and are looking for information on whether it makes sense to...
Greatly enhanced and updated from the third edition, this is the title any JavaScripter cannot afford to be without! JavaScript Bible, 4th Edition covers the new powerful functionality JavaScript will gain with the release of new revs of Internet Explorer and Netscape Communicator. This book features essential new JS information, additional ready-t...
Durable Functions is an Azure Functions extension that implements triggers and bindings that abstract and manage state persistence. Using Durable Functions, you can easily create stateful objects entirely managed by the extension. Azure Durable Functions Succinctly author Massimo Bonanni will take readers from a recap of Azure Functions through Dur...
With more and more companies moving on-premises applications to the cloud, software and cloud solution architects alike are busy investigating ways to improve load balancing, performance, security, and high availability for workloads. This practical book describes Microsoft Azure's load balancing options and explains how NGINX can contribute t...
Computer Networks: A Systems Approach, Sixth Edition, explores the key principles of computer networking, using real world examples from network and protocol design. Using the Internet as the primary example, this best-selling classic textbook explains various protocols and networking technologies. The systems-oriented approach encourages students ...
What does it mean to say that someone is autistic?
Towards an Ethics of Autism is an exploration of this question and many more. In this thoughtful, wide-ranging book, Kristien Hens examines a number of perspectives on autism, including psychiatric, biological, and philosophical, to consider different ways of thinking about autism, as well as it...