Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Training Site Reliability Engineers
This book discusses how to train Site Reliability Engineers, or SREs. Before we go any further, we'd like to clarify the term "SRE." "SRE" means a variety of things: - Site Reliability Engineer or a Site Reliability Engineering team, based on the context (singular, SRE, or plural, SREs) - Site Reliability Engineering concep...
Reinforcement Learning
Reinforcement learning, one of the most active research areas in artificial intelligence, is a computational approach to learning whereby an agent tries to maximize the total amount of reward it receives while interacting with a complex, uncertain environment. In Reinforcement Learning, Richard Sutton and Andrew Barto provide a clear and simple acc...
DevOps: WTF?
"DevOps" is creating a lot of anxiety amongst the IT professionals of the world. It's also causing a bit of a boom for technology marketing people, who in turn are making the whole concept confusing for businesses and professionals alike. This is an effort to set the record straight for someone who might be feeling a little vague ...
Engineering Reliable Mobile Applications
Imagine a situation where your services report healthy and serving but you receive multiple user reports of poor availability. How are these users accessing your service? Most likely, they are using your service through a client application, such as a mobile application on their phone. SRE traditionally has only supported systems and services run i...
Introductory Statistics
Introductory Statistics follows scope and sequence requirements of a one-semester introduction to statistics course and is geared toward students majoring in fields other than math or engineering. The text assumes some knowledge of intermediate algebra and focuses on statistics application over theory. Introductory Statistics includes innovative pr...
Business Process Flow Mapping Succinctly
In a company, when the business process is defined, employees feel confident in their roles. They understand expectations and can easily identify when something is amiss or requires escalation. In Business Process Flow Mapping Succinctly, Erica Quigley will show you the activities that should occur in order to completely define a business process s...
Machine Learning Yearning
AI is transforming numerous industries. Machine Learning Yearning, a free ebook from Andrew Ng, teaches you how to structure Machine Learning projects. This book is focused not on teaching you ML algorithms, but on how to make ML algorithms work. After reading Machine Learning Yearning, you will be able to: - Prioritize the most promising direc...
Using .NET Core, Docker, and Kubernetes Succinctly
Terms like container and Docker, unknown to Microsoft programmers until now, have recently become essential in technical discussions about the development, distribution, and management of our applications. Containers can solve some of programmers' everyday problems, but a challenge with them is managing their lifecycles and the communication a...
PostgreSQL for Beginners
PostgreSQL for Beginners book is intended for those who only start getting acquainted with the world of PostgreSQL. It contains some basic information about this DBMS and its main features, history of its creation and development roadmap, step-by-step installation instructions and a getting started guide....
The Little Redis Book
The book is many years old, but still relevant. Redis has evolved a lot, but most of that has been in the form of internal improvements, new advanced features (like lua scripting) and awesome new data types. The best way to learn Redis is still to start by understanding the fundamentals presented in this book....
Crypto 101
Crypto 101 is an introductory course on cryptography, freely available for programmers of all ages and skill levels. Learn how to exploit common cryptographic flaws, armed with nothing but a little time and your favorite programming language. Forge administrator cookies, recover passwords, and even backdoor your own random number generator....
A Graduate Course in Applied Cryptography
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making ...
Evolve the Monolith to Microservices with Java and Node
Microservices is an architectural style in which large, complex software applications are composed of one or more smaller services. Each of these microservices focuses on completing one task that represents a small business capability. These microservices can be developed in any programming language. This book shows how to break out a traditiona...
The AI Ladder
The processes for gathering, organizing, analyzing, and ultimately infusing AI throughout your organization can be thought of as a ladder. A ladder helps you climb far higher than you could go on your own by turning an impossible leap into a series of steps. Knowing what the ladder looks like helps you evaluate your organization's readiness fo...
Agency: Moral Identity and Free Will
There is agency in all we do: thinking, doing, or making. We invent a tune, play, or use it to celebrate an occasion. Or we make a conceptual leap and ask more abstract questions about the conditions for agency. They include autonomy and self-appraisal, each contested by arguments immersing us in circumstances we don't control. But can it be t...
How to Make Mistakes in Python
Even the best programmers make mistakes, and experienced programmer Mike Pirnat has made his share during 15+ years with Python. Some have been simple and silly; others were embarrassing and downright costly. In this O'Reilly report, he dissects some of his most memorable blunders, peeling them back layer-by-layer to reveal just what went wron...
Keras Succinctly
Neural networks are a powerful tool for developers, but harnessing them can be a challenge. With Keras Succinctly, author James McCaffrey introduces Keras, an open-source, neural network library designed specifically to make working with backend neural network tools easier....
Effective AWK Programming
When processing text files, the awk language is ideal for handling data extraction, reporting, and data-reformatting jobs. This practical guide serves as both a reference and tutorial for POSIX-standard awk and for the GNU implementation, called gawk. This book is useful for novices and awk experts alike. In this thoroughly revised 5th edition, ...
The Basics of User Experience Design
If you're looking to gain an introduction into the world of user experience (UX) design - or maybe even freshen up your knowledge of the field - then this UX design book is the ideal place to start. You'll cover a wide range of topics over nine highly readable chapters, with each one acting as a mini crash course. By the end, you'...
Inferring and Explaining
Inferring and Explaining is a book in practical epistemology. It examines the notion of evidence and assumes that good evidence is the essence of rational thinking. Evidence is the cornerstone of the natural, social, and behavioral sciences. But it is equally central to almost all academic pursuits and, perhaps most importantly, to the basic need t...
Peace and Democratic Society
Recent acts of terrorism and the current unrest in the Middle East remind us how important it is to understand the relationship between violence, peace and democracy. In a challenging and insightful essay, Amartya Sen explores ideas around 'organised violence' (such as war, genocide and terrorism) and violence against the individual. High...
Project Management Skills for All Careers
Project Management Skills for All Careers offers a framework for managing projects in any career area. The concepts can be applied no matter where you work. As a matter of fact, many of our dislocated workers are trained to become certified in Project Management. Project management skills are essential and invaluable for anyone who initiates or is ...
Algorithmic Graph Theory and Sage
This is an introductory book on algorithmic graph theory. Theory and algorithms are illustrated using the Sage open source mathematics software....
Confessions of an IT Manager
From IT projects that have trampled all over the guiding principles of successful development, to tips on training your manager to the required standard, each of Phil's tales is shot through with a wild seam of anarchic humour. And yet, in each case, the humor is just a sugar coating for a pill of sage advice, wrought from years of rough-and-t...
Networking with the Micro:bit
This book presents a series of activities to teach the basics of computer networks. While you will not learn all aspects of computer networking, we hope that it will serve as a good starting point. To network micro:bits, we use custom micro:bit radio to radio communication. When one hears the word radio, what comes to mind is the radio that blas...
Writing Unleashed
Welcome to Writing Unleashed, designed for use as a book in first-year college composition programs, written as an extremely brief guide for students, jam-packed with teachers' voices, students' voices, and engineered for fun....
Grey Area
Coffeeshops are the most famous example of Dutch tolerance. But in fact, these cannabis distributors are highly regulated. Coffeeshops are permitted to break the law, but not the rules. On the premises, there cannot be minors, hard drugs or more than 500 grams. Nor can a coffeeshop advertise, cause nuisance or sell over five grams to a person in a ...
Rewriting Language
Inclusive language remains a hot topic. Despite decades of empirical evidence and revisions of formal language use, many inclusive adaptations of English and German continue to be ignored or contested. But how to convince speakers of the importance of inclusive language? Rewriting Language provides one possible answer: by engaging readers with the ...
A Conversation about Healthy Eating
What constitutes a healthy diet? Mainstream media and advertisers would like you to think that the answer to this question is complicated and controversial. But science, fortunately, tells us otherwise. A Conversation about Healthy Eating brings together all the relevant science about healthy eating in one place, and it's exactly that - a c...
Statistical inference for data science
The ideal reader for this book will be quantitatively literate and has a basic understanding of statistical concepts and R programming. The book gives a rigorous treatment of the elementary concepts in statistical inference from a classical frequentist perspective. After reading this book and performing the exercises, the student will understand th...
Responsible Innovation
This book is based on the MOOC Responsible Innovation offered by the TU Delft. It provides a framework to reflect on the ethics and risks of new technologies. How can we make sure that innovations do justice to social and ethical values? How can we minimize (unknown) risks? The book explains: - The concept and importance of responsible innovati...
Cloud Design Patterns
Cloud applications have a unique set of characteristics. They run on commodity hardware, provide services to untrusted users, and deal with unpredictable workloads. These factors impose a range of problems that you, as a designer or developer, need to resolve. Your applications must be resilient so that they can recover from failures, secure to pro...

1 ... 11 12 13 14 15 ... 17