The LEGO BOOST Activity BookThe LEGO BOOST kit lets younger builders create fun, multifunctional robots by combining bricks with code, but it doesn't come with a manual. With the help of this complete guide to the LEGO BOOST set, you'll be on your way to building and programming BOOST robots in no time.
You'll begin your exploration by building a basic rover robot called MARIO to help you learn the fundamentals of the BOOST programming environment. Next, you'll add features to your rover to control its movement and make it repeat actions and react to colors and sounds. Once you've learned some programming basics, you'll learn how to program your robot to do things like follow lines on the ground, scan its environment to decide where to go, and even play darts. As final projects, you'll create two complete robots: BrickPecker to help you organize your bricks and CYBOT, a robot that talks, shoots objects, and executes voice commands.
As you advance through the book, optional lessons aim to deepen your underst ...
The IoT Hacker's HandbookTake a practioner's approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.
You'll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You'll also learn to assess a device physically by opening it, looking at the PCB, and identifying the chipsets and interfaces. You'll then use that information to gain entry to the device or to perform other actions, such as dumping encryption keys and firmware.
As the IoT rises to one of the most popular tech trends, manufactures need to take necessary steps to secure devices and protect them from attackers. The IoT Hacker's Handbook breaks down the Internet of Things, exploits it, and reveals how these devices can be built securely.
Perform a threat model of a real-world IoT device and locate all possible attacker entry points; Use reverse engineering of firmware binaries to identify securi ...
Beginning Kubernetes on the Google Cloud PlatformUse this beginner's guide to understand and work with Kubernetes on the Google Cloud Platform and go from single monolithic Pods (the smallest unit deployed and managed by Kubernetes) all the way up to distributed, fault-tolerant stateful backing stores.
You need only a familiarity with Linux, Bash, and Python to successfully use this book. Proficiency in Docker or cloud technology is not required. You will follow a learn-by-doing approach, running small experiments and observing the effects.
Google open sourced Kubernetes in 2015 and now it is the industry standard in container orchestration. It has been adopted by all leading vendors of cloud, on-prem, and hybrid infrastructure services: Microsoft (Azure AKS), Amazon (AWS EKS), IBM (IBM Cloud Kubernetes Services), Alibaba Cloud (ACK), RedHat (OpenShift), and Pivotal (PKS). Even though Kubernetes is offered by all of the market-leading cloud providers, the Google Cloud Platform (GCP) offers an integrated shell (Google Cloud Shell) ...
MongoDB: The Definitive Guide, 3rd EditionManage your data with a system designed to support modern application development. Updated for MongoDB 4.2, the third edition of this authoritative and accessible guide shows you the advantages of using document-oriented databases. You'll learn how this secure, high-performance system enables flexible data models, high availability, and horizontal scalability.
Authors Shannon Bradshaw, Eoin Brazil, and Kristina Chodorow provide guidance for database developers, advanced configuration for system administrators, and use cases for a variety of projects. NoSQL newcomers and experienced MongoDB users will find updates on querying, indexing, aggregation, transactions, replica sets, ops management, sharding and data administration, durability, monitoring, and security.
In six parts, this book shows you how to: Work with MongoDB, perform write operations, find documents, and create complex queries; Index collections, aggregate data, and use transactions for your application; Configure a ...
Cassandra: The Definitive Guide, 3rd EditionImagine what you could do if scalability wasn't a problem. With this hands-on guide, you'll learn how the Cassandra database management system handles hundreds of terabytes of data while remaining highly available across multiple data centers. This third edition - updated for Cassandra 4.0 - provides the technical details and practical examples you need to put this database to work in a production environment.
Authors Jeff Carpenter and Eben Hewitt demonstrate the advantages of Cassandra's nonrelational design, with special attention to data modeling. If you're a developer, DBA, or application architect looking to solve a database scaling issue or future-proof your application, this guide helps you harness Cassandra's speed and flexibility.
Understand Cassandra's distributed and decentralized structure; Use the Cassandra Query Language (CQL) and cqlsh - the CQL shell; Create a working data model and compare it with an equivalent relational model; Develop sample applications using ...
Presto: The Definitive GuidePerform fast interactive analytics against different data sources using the Presto high-performance, distributed SQL query engine. With this practical guide, you'll learn how to conduct analytics on data where it lives, whether it's Hive, Cassandra, a relational database, or a proprietary data store. Analysts, software engineers, and production engineers will learn how to manage, use, and even develop with Presto.
Initially developed by Facebook, open source Presto is now used by Netflix, Airbnb, LinkedIn, Twitter, Uber, and many other companies. Matt Fuller, Manfred Moser, and Martin Traverso show you how a single Presto query can combine data from multiple sources to allow for analytics across your entire organization.
Get started: Explore Presto's use cases and learn about tools that will help you connect to Presto and query data;
Go deeper: Learn Presto's internal workings, including how to connect to and query data sources with support for SQL statements, operators, funct ...
Rational Cybersecurity for BusinessUse the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will know how to prioritize your security program, and motivate and retain your team.
Misalignment between security and your business can start at the top at the C-suite or happen at the line of business, IT, development, or user level. It has a corrosive effect on any security project it touches. But it does not have to be like this.
Author Dan Blum presents valuable lessons learned from interviews with over 70 security and business leaders. You will discover how to successfully solve issues related to: risk management, operational security, privacy protection, hybrid cloud management, security culture and user awareness, and communication challenges.
This open access book presents si ...
Guide to Computer Network Security, 4th EditionThis definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent on. Fully revised and updated, this timely new edition encompasses the latest developments in system resource virtualization, cloud computing models, and mobile computing technology, including a new chapter on the Internet of Things.
Topics and features: Highlights the magnitude of the vulnerabilities, weaknesses and loopholes inherent in current computer network technologies; Discusses how to develop effective security solutions, protocols, and best practices for the continuously evolving computing environment; Examines the role of legislation, regulation, and enforcement in securing computing and mobile systems; Describes the burning security issues increasingly brought about by the rapid advances in technologies like the Inte ...
How the Internet Really WorksThe internet has profoundly changed interpersonal communication, but most of us don't really understand how it works. What enables information to travel across the internet? Can we really be anonymous and private online? Who controls the internet, and why is that important? And… what's with all the cats?
How the Internet Really Works answers these questions and more. Using clear language and whimsical illustrations, the authors translate highly technical topics into accessible, engaging prose that demystifies the world's most intricately linked computer network. Alongside a feline guide named Catnip, you'll learn about:
- The "How-What-Why" of nodes, packets, and internet protocols;
- Cryptographic techniques to ensure the secrecy and integrity of your data;
- Censorship, ways to monitor it, and means for circumventing it;
- Cybernetics, algorithms, and how computers make decisions;
- Centralization of internet power, its impact on democracy, and how it hurts human rights;
- ...
How Computers Really WorkHow Computers Really Work is a hands-on guide to the computing ecosystem: everything from circuits to memory and clock signals, machine code, programming languages, operating systems, and the internet.
But you won't just read about these concepts, you'll test your knowledge with exercises, and practice what you learn with 41 optional hands-on projects. Build digital circuits, craft a guessing game, convert decimal numbers to binary, examine virtual memory usage, run your own web server, and more.
Explore concepts like how to:
- Think like a software engineer as you use data to describe a real world concept;
- Use Ohm's and Kirchhoff's laws to analyze an electrical circuit;
- Think like a computer as you practice binary addition and execute a program in your mind, step-by-step.
The book's projects will have you translate your learning into action, as you:
- Learn how to use a multimeter to measure resistance, current, and voltage;
- Build a half adder to see how logical op ...