This open book is a dynamic guide incorporating the essential skills needed to build a foundation in Financial Analysis. Students and readers will learn how to insightfully read a Financial Statement, utilize key financial ratios in order to derive forward-looking investment-related inferences from the accounting data, engage in elementary forecast...
The move to microservices is a seismic shift in web application development and delivery. Because we believe moving to microservices is crucial to the success of our customers, we at NGINX have launched a dedicated program to develop NGINX software features and development practices in support of microservices.
We also recognize that there are m...
Based on coursework developed at Peabody Conservatory, this book breaks down the process of developing an artist mission statement, generating new ideas for creative projects, and creating an engaging project description. It also covers methods for artists to identify their audience, generate a comprehensive project budget, collect compelling work ...
Hacking games requires a unique combination of reversing, memory management, networking, and security skills. Even as ethical hacking has exploded in popularity, game hacking still occupies a very small niche in the wider security community. While it may not have the same headline appeal as a Chrome 0day or a massive data leak, the unique feeling o...
This open textbook supports the learning outcomes of Fanshawe College's Advanced Professional Communications curriculum (COMM 6019). Organized in five major units - Foundational Principles of Business Messaging, The Principles of Business Style, Format, and Composition, The Principles of Social, Cultural and Employment Communication, The Princ...
You are reading a book about the Raku programming language. This language has appeared as a rename of Perl 6 in October 2019.
Like its parent, Perl 5, the Raku language keeps the spirit of being a powerful tool in many areas, from devops programs for configuration management through different command-line applications to concurrent web servers.
...
When you start building your first containerized application, you're excited about the capabilities and opportunities you encounter: it runs the same in dev and in prod, it's straightforward to put together a container image using Docker, and the distribution is taken care of by a container registry.
So, you're satisfied with how ...
NoSQL is a modern data persistence storage paradigm that provides data persistence for environments where high performance is a primary requirement. Within NoSQL, data is stored in such a way as to make both writing and reading quite fast, even under heavy load.
Redis and Redis Enterprise are market-leading, multi-model NoSQL databases that brin...
Why do enterprises feel daunted when undertaking a large-scale cloud transformation? A move to the cloud usually offers substantial rewards. Once companies make this transition, they unlock new business opportunities that fundamentally change the way they work. With this report, members of the Google team will show you how to navigate the cultural ...
A collection of readings and exercises aligned with the course, ME 270, Introduction to Mechanical Engineering Design, at Iowa State University. This course provides an overview of mechanical engineering design with applications to thermal and mechanical systems, and an introduction to current design practices used in industry. As part of the cours...
Contemporary Mathematics is designed to meet the scope and sequence requirements for a liberal arts mathematics course. This resource provides stand-alone sections with a focus on showing relevance in the features as well as the examples, exercises, and exposition. Contemporary Mathematics integrates technology applications, projects, and highlight...
DevOps engineers, developers, and security engineers have ever-changing roles to play in today's cloud native world. In order to build secure and resilient applications, you have to be equipped with security knowledge. Enter security as code.
In this book, authors BK Sarthak Das and Virginia Chu demonstrate how to use this methodology to se...