Getting Structured Data from the InternetUtilize web scraping at scale to quickly get unlimited amounts of free data available on the web into a structured format. This book teaches you to use Python scripts to crawl through websites at scale and scrape data from HTML and JavaScript-enabled pages and convert it into structured data formats such as CSV, Excel, JSON, or load it into a SQL database of your choice.
This book goes beyond the basics of web scraping and covers advanced topics such as natural language processing (NLP) and text analytics to extract names of people, places, email addresses, contact details, etc., from a page at production scale using distributed big data techniques on an Amazon Web Services (AWS)-based cloud infrastructure. It book covers developing a robust data processing and ingestion pipeline on the Common Crawl corpus, containing petabytes of data publicly available and a web crawl data set available on AWS's registry of open data.
Getting Structured Data from the Internet also includes a st ...
SQL Server 2019 AlwaysOn, 3rd EditionGet a fast start to using AlwaysOn, the SQL Server solution to high-availability and disaster recovery. This third edition is newly-updated to cover the 2019 editions of both SQL Server and Windows Server and includes strong coverage of implementing AlwaysOn Availability Groups on both Windows and Linux operating systems. The book provides a solid and accurate understanding of how to implement systems requiring consistent and continuous uptime, as well as how to troubleshoot those systems in order to keep them running and reliable. This edition is updated to account for all new major functionality and also includes coverage of implementing atypical configurations, such as clusterless and domain-independent Availability Groups, distributed Availability Groups, and implementing Availability Groups on Azure.
The book begins with an introduction to high-availability and disaster recovery concepts such as Recovery Point Objectives (RPOs), Recovery Time Objectives (RTOs), availability lev ...
Pro Google Kubernetes EngineDiscover methodologies and best practices for getting started with Google Kubernetes Engine (GKE). This book helps you understand how GKE provides a fully managed environment to deploy and operate containerized applications on Google Cloud infrastructure.
You will see how Kubernetes makes it easier for users to manage clusters and the container ecosystem. And you will get detailed guidance on deploying and managing applications, handling administration of container clusters, managing policies, and monitoring cluster resources. You will learn how to operate the GKE environment through the GUI-based Google Cloud console and the "gcloud" command line interface.
The book starts with an introduction to GKE and associated services. The authors provide hands-on examples to set up Container Registry and GKE Cluster, and you will follow through an application deployment on GKE. Later chapters focus on securing your GCP GKE environment, GKE monitoring and dashboarding, and CI/CD automation ...
Machine Learning in the Oil and Gas IndustryApply machine and deep learning to solve some of the challenges in the oil and gas industry. The book begins with a brief discussion of the oil and gas exploration and production life cycle in the context of data flow through the different stages of industry operations. This leads to a survey of some interesting problems, which are good candidates for applying machine and deep learning approaches. The initial chapters provide a primer on the Python programming language used for implementing the algorithms; this is followed by an overview of supervised and unsupervised machine learning concepts. The authors provide industry examples using open source data sets along with practical explanations of the algorithms, without diving too deep into the theoretical aspects of the algorithms employed. Machine Learning in the Oil and Gas Industry covers problems encompassing diverse industry topics, including geophysics (seismic interpretation), geological modeling, reservoir engineering, and prod ...
Microservices Security in ActionUnlike traditional enterprise applications, Microservices applications are collections of independent components that function as a system. Securing the messages, queues, and API endpoints requires new approaches to security both in the infrastructure and the code. Microservices Security in Action teaches you how to address microservices-specific security challenges throughout the system. This practical guide includes plentiful hands-on exercises using industry-leading open-source tools and examples using Java and Spring Boot.
Integrating independent services into a single system presents special security challenges in a microservices deployment. With proper planning, however, you can build in security from the start. Learn to create secure services and protect application data throughout development and deployment. As microservices continue to change enterprise application systems, developers and architects must learn to integrate security into their design and implementation. Beca ...
Svelte and Sapper in ActionImagine web apps with fast browser load times that also offer amazing developer productivity and require less code to create. That's what Svelte and Sapper deliver! Svelte pushes a lot of the work a frontend framework would handle to the compile step, so your app components come out as tight, well-organized JavaScript modules. Sapper is a lightweight web framework that minimizes application size through server-rendering front pages and only loading the JavaScript you need. The end result is more efficient apps with great UX and simplified state management.
Many web frameworks load hundreds of "just-in-case" code lines that clutter and slow your apps. Svelte, an innovative, developer-friendly tool, instead compiles applications to very small bundles for lightning-fast load times that do more with less code. Pairing Svelte with the Sapper framework adds features for flexible and simple page routing, server-side rendering, static site development, and more.
Svelte and Sapper in Acti ...
Coffee Break Python SlicingPuzzle-based learning is an active learning technique. With code puzzles, you will learn faster, smarter, and better.
Coffee Break Python Slicing is all about growing your Python expertise - one coffee at a time. The focus lies on the important slicing technique to access consecutive data ranges. Understanding slicing thoroughly is crucial for your success as a Python developer.
This book teaches you everything you need to know about slicing in Python. As a bonus, you will track your individual Python coding skill level throughout the book. ...
High-Tech LEGO ProjectsHigh Tech LEGO hijacks the MINDSTORMS EV3 revolution, showing you how to build creative technical inventions with practical applications. You'll learn to build a dynamic array of working devices for outdoor research, home security, spycraft, and more.
Among the book's 16 fascinating projects you'll find a motion-activated animal cam, a Morse code transmitter, a laser security fence, a motion-sensing radar detector, an automated insect trapper, and a heat-seeking infrared cannon. Welcome to a whole new world of building!
Every project brings together science, mechanics, electronics, optics, and software to create complex instruments for studying and measuring the world around you, all while maintaining the playfulness of LEGO. Each easy-to-follow model combines illustrated instructions with step-by-step guidance on the engineering methods at play. ...
Web Security for DevelopersThe world has changed. Today, every time you make a site live, you're opening it up to attack.
A first-time developer can easily be discouraged by the difficulties involved with properly securing a website. But have hope: an army of security researchers is out there discovering, documenting, and fixing security flaws. Thankfully, the tools you'll need to secure your site are freely available and generally easy to use.
Web Security for Developers will teach you how your websites are vulnerable to attack and how to protect them. Each chapter breaks down a major security vulnerability and explores a real-world attack, coupled with plenty of code to show you both the vulnerability and the fix.
You'll learn how to: Protect against SQL injection attacks, malicious JavaScript, and cross-site request forgery; Add authentication and shape access control to protect accounts; Lock down user accounts to prevent attacks that rely on guessing passwords, stealing sessions, or escalating priv ...
Effective CThe world runs on code written in the C programming language, yet most schools begin the curriculum with Python or Java. Effective C bridges this gap and brings C into the modern era - covering the modern C17 Standard as well as potential C2x features. With the aid of this instant classic, you'll soon be writing professional, portable, and secure C programs to power robust systems and solve real-world problems.
Robert C. Seacord introduces C and the C Standard Library while addressing best practices, common errors, and open debates in the C community. Developed together with other C Standards committee experts, Effective C will teach you how to debug, test, and analyze C programs. You'll benefit from Seacord's concise explanations of C language constructs and behaviors, and from his 40 years of coding experience.
You'll learn: How to identify and handle undefined behavior in a C program; The range and representations of integers and floating-point values; How dynamic memory alloc ...