Effective DevOpsSome companies think that adopting devops means bringing in specialists or a host of new tools. With this practical guide, you'll learn why devops is a professional and cultural movement that calls for change from inside your organization. Authors Ryn Daniels and Jennifer Davis provide several approaches for improving collaboration within teams, creating affinity among teams, promoting efficient tool usage in your company, and scaling up what works throughout your organization's inflection points.
Devops stresses iterative efforts to break down information silos, monitor relationships, and repair misunderstandings that arise between and within teams in your organization. By applying the actionable strategies in this book, you can make sustainable changes in your environment regardless of your level within your organization.
Explore the foundations of devops and learn the four pillars of effective devops; Encourage collaboration to help individuals work together and build durable ...
Beginning Xamarin Development for the MacDevelop apps for the iPhone, iPad, and Apple wearables using Visual Studio for the Mac.
Learn how to set up your development environment and emulators, and how to create adaptive user interfaces for various platforms. Expert Dawid Borycki guides you through the fundamentals of programming for Apple platforms (Model View Controller, Test Driven Development), navigation patterns, gesture handling, accessing user's location, and reading and consuming data from web services.
After reading this book, you will be able to build native apps that look and feel like other apps built into iOS, watchOS, and tvOS, and have the skills that are in high demand in today's market. If you are already programming C# apps for web or desktop, you will learn how to extend your skill set to Apple mobile, wearable, and smart TV platforms.
Build and implement native apps for Apple platforms; Create adaptive, universal views and handle navigation between them; Access user's location and handle touch in ...
Building Great Software Engineering TeamsBuilding Great Software Engineering Teams provides engineering leaders, startup founders, and CTOs concrete, industry-proven guidance and techniques for recruiting, hiring, and managing software engineers in a fast-paced, competitive environment.
With so much at stake, the challenge of scaling up a team can be intimidating. Engineering leaders in growing companies of all sizes need to know how to find great candidates, create effective interviewing and hiring processes, bring out the best in people and their work, provide meaningful career development, learn to spot warning signs in their team, and manage their people for long-term success. ...
Building Web Applications with Python and Neo4jPy2neo is a simple and pragmatic Python library that provides access to the popular graph database Neo4j via its RESTful web service interface. This brings with it a heavily refactored core, a cleaner API, better performance, and some new idioms.
You will begin with licensing and installing Neo4j, learning the fundamentals of Cypher as a graph query language, and exploring Cypher optimizations. You will discover how to integrate with various Python frameworks such as Flask and its extensions: Py2neo, Neomodel, and Django. Finally, the deployment aspects of your Python-based Neo4j applications in a production environment is also covered. By sequentially working through the steps in each chapter, you will quickly learn and master the various implementation details and integrations of Python and Neo4j, helping you to develop your use cases more quickly. ...
Couchbase EssentialsCouchbase is an extremely fast, flexible, and highly scalable database that applies MapReduce techniques and patterns to find data. Whether you need to store unstructured data or be able to store and retrieve vast amounts of data quickly, Couchbase Server is your database!
This book gives you enough information to successfully set up a Couchbase cluster and provides details on basic server maintenance. It then goes on to give you a detailed overview of how to program against Couchbase Server using both its key/value features and its document capabilities. It also introduces you to the concept of creating views using Couchbase's implementation of MapReduce. This book will then conclude with a walkthrough of building an actual application from scratch using Couchbase. ...
Cyber OperationsLearn to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources.
You'll learn how to configure your network from the ground up, starting by setting up your virtual test environment with basics like DNS and active directory, through common network services, and ending with complex web applications involving web servers and backend databases.
Key defensive techniques are integrated throughout the exposition. You will develop situational awareness of your network and will build a complete defensive infrastructure—including log servers, network firewalls, web application firewalls, and intrusion detection systems. ...
Databases for Small BusinessThis book covers the practical aspects of database design, data cleansing, data analysis, and data protection, among others. The focus is on what you really need to know to create the right database for your small business and to leverage it most effectively to spur growth and revenue.
Databases for Small Business is a practical handbook for entrepreneurs, managers, staff, and professionals in small organizations who are not IT specialists but who recognize the need to ramp up their small organizations' use of data and to round out their own business expertise and office skills with basic database proficiency.
Anna Manning—a data scientist who has worked on database design and data analysis in a computer science university research lab, her own small business, and a nonprofit—walks you through the progression of steps that will enable you to extract actionable intelligence and maximum value from your business data in terms of marketing, sales, customer relations, decision mak ...
Designing Hyper-V SolutionsThis book is a practical, example-oriented tutorial that will guide you through the basics and architecture of the Hyper-V platform and help you understand how to build your virtualization infrastructure from the ground up. It then goes on to focus on scalability and high availability aspects, and trains you to set up highly available Hyper-V clusters and perform the live migration of virtual machines. You will also learn about advancements in virtual networking and storage in Windows Server 2012 and Windows Server 2012 R2.
Finally, the book then advises you on how to set up backup and recovery and how to prepare a disaster recovery plan via Hyper-V Replica, concluding with insight into Microsoft VDI implementation guidance. ...
Elasticsearch BlueprintsElasticsearch is a distributed search server similar to Apache Solr with a focus on large datasets, schemaless setup, and high availability. Utilizing the Apache Lucene library (also used in Apache Solr), Elasticsearch enables powerful full-text search, as well as autocomplete "morelikethis" search, multilingual functionality, and an extensive search query DSL.
This book starts with the creation of a Google-like web search service, enabling you to generate your own search results. You will then learn how an e-commerce website can be built using Elasticsearch. We will discuss various approaches in getting relevant content up the results, such as relevancy based on how well a query matched the text, time-based recent documents, geographically nearer items, and other frequently used approaches.
Finally, the book will cover various geocapabilities of Elasticsearch to make your searches similar to real-world scenarios. ...
Essential Cybersecurity ScienceIf you're involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You'll learn how to conduct scientific experiments on everyday tools and procedures, whether you're evaluating corporate security systems, testing your own security product, or looking for bugs in a mobile game.
Once author Josiah Dykstra gets you up to speed on the scientific method, he helps you focus on standalone, domain-specific topics, such as cryptography, malware analysis, and system security engineering. The latter chapters include practical case studies that demonstrate how to use available tools to conduct domain-specific scientific experiments. ...