IT eBooks
Download, Read, Use
Pro PowerShell Desired State Configuration, 2nd Edition
Pro PowerShell Desired State Configuration, 2nd Edition

Use Windows PowerShell Desired State Configuration (DSC) to configure your infrastructure on-premises and in the cloud. In an environment where changes and deployments are happening all the time, DSC makes the necessary adjustments to the system so you don't have to. Pro Desired State Configuration shows you how. PowerShell Desired State Configuration (DSC) is a powerful configuration management platform that makes it easier than ever to perform configuration management of your infrastructure, whether on-premises or in the cloud. With Pro PowerShell Desired State Configuration, Ravikanth Chaganti revises and significantly expands his previous edition, bringing you a complete in-depth reference for applying this evolving technology in your day-to-day work. Get up-to-date, in-depth guidance on DSC in the data center; Understand the central role that DSC plays in DevOps today; Understand how DSC can be integrated into build and release management tools; Learn to think and act like a ...
Learn Rails 5.2
Learn Rails 5.2

Learn to build Rails-based web applications using all the latest features offered in Rails 5.2. Author Stefan Wintermeyer begins by teaching the basics of Ruby 2.5 before proceeding through all aspects of Rails, utilizing clean, succinct examples - rather than a single large application. This book covers topics including Active Storage, Credentials, Active Record, Scaffolding, REST, Routing, Bundler, Forms, Cookies, and Sessions, all of which are vital for modern Rails web applications. To complement these topics you'll also learn about test-driven development, Action Cable, Active Job, Action Mailer, I18n, Asset Pipeline, and caching. Finally, you'll see a how-to for a production web server with nginx. This complete set of skills will set you up for a future of efficient and elegant Rails coding. Use the Ruby on Rails web development framework; Install and manage the Rails framework; Persist data for your web application with Active Record; Work with forms; Apply a test-driven d ...
Deep Belief Nets in C++ and CUDA C: Volume 1
Deep Belief Nets in C++ and CUDA C: Volume 1

Discover the essential building blocks of the most common forms of deep belief networks. At each step this book provides intuitive motivation, a summary of the most important equations relevant to the topic, and concludes with highly commented code for threaded computation on modern CPUs as well as massive parallel processing on computers with CUDA-capable video display cards. The first of three in a series on C++ and CUDA C deep learning and belief nets, Deep Belief Nets in C++ and CUDA C: Volume 1 shows you how the structure of these elegant models is much closer to that of human brains than traditional neural networks; they have a thought process that is capable of learning abstract concepts built from simpler primitives. As such, you'll see that a typical deep belief net can learn to recognize complex patterns by optimizing millions of parameters, yet this model can still be resistant to overfitting. All the routines and algorithms presented in the book are available in the c ...
Design Patterns in Modern C++
Design Patterns in Modern C++

Apply modern C++17 to the implementations of classic design patterns. As well as covering traditional design patterns, this book fleshes out new patterns and approaches that will be useful to C++ developers. The author presents concepts as a fun investigation of how problems can be solved in different ways, along the way using varying degrees of technical sophistication and explaining different sorts of trade-offs. Design Patterns in Modern C++ also provides a technology demo for modern C++, showcasing how some of its latest features (e.g., coroutines) make difficult problems a lot easier to solve. The examples in this book are all suitable for putting into production, with only a few simplifications made in order to aid readability. Apply design patterns to modern C++ programming; Use creational patterns of builder, factories, prototype and singleton; Implement structural patterns such as adapter, bridge, decorator, facade and more; Work with the behavioral patterns such as chai ...
Practical Data Science Cookbook
Practical Data Science Cookbook

Starting with the basics, this book will cover how to set up your numerical programming environment, introduce you to the data science pipeline (an iterative process by which data science projects are completed), and guide you through several data projects in a step-by-step format. By sequentially working through the steps in each chapter, you will quickly familiarize yourself with the process and learn how to apply it to a variety of situations with examples in the two most popular programming languages for data analysis - R and Python. ...
Building Microservices with ASP.NET Core
Building Microservices with ASP.NET Core

At a time when nearly every vertical, regardless of domain, seems to need software running in the cloud to make money, microservices provide the agility and drastically reduced time to market you require. This hands-on guide shows you how to create, test, compile, and deploy microservices, using the ASP.NET Core free and open-source framework. Along the way, you'll pick up good, practical habits for building powerful and robust services. Building microservices isn't about learning a specific framework or programming language; it's about building applications that thrive in elastically scaling environments that don't have host affinity, and that can start and stop at a moment's notice. This practical book guides you through the process. Learn test-driven and API-first development concepts; Communicate with other services by creating and consuming backing services such as databases and queues; Build a microservice that depends on an external data source; Learn about event sourcing, ...
Agile Application Security
Agile Application Security

Agile continues to be the most adopted software development methodology among organizations worldwide, but it generally hasn't integrated well with traditional security management techniques. And most security professionals aren't up to speed in their understanding and experience of agile development. To help bridge the divide between these two worlds, this practical guide introduces several security tools and techniques adapted specifically to integrate with agile development. Written by security experts and agile veterans, this book begins by introducing security principles to agile practitioners, and agile principles to security practitioners. The authors also reveal problems they encountered in their own experiences with agile security, and how they worked to solve them. Add security practices to each stage of your existing development lifecycle; Integrate security with planning, requirements, design, and at the code level; Include security testing as part of your team's effo ...
The Customer-Driven Playbook
The Customer-Driven Playbook

Despite the wide acceptance of Lean approaches and customer-development strategies, many product teams still have difficulty putting these principles into meaningful action. That's where The Customer-Driven Playbook comes in. This practical guide provides a complete end-to-end process that will help you understand customers, identify their problems, conceptualize new ideas, and create fantastic products they'll love. To build successful products, you need to continually test your assumptions about your customers and the products you build. This book shows team leads, researchers, designers, and managers how to use the Hypothesis Progression Framework (HPF) to formulate, experiment with, and make sense of critical customer and product assumptions at every stage. With helpful tips, real-world examples, and complete guides, you'll quickly learn how to turn Lean theory into action. Collect and formulate your assumptions into hypotheses that can be tested to unlock meaningful insights ...
The Art of Capacity Planning, 2nd Edition
The Art of Capacity Planning, 2nd Edition

In their early days, Twitter, Flickr, Etsy, and many other companies experienced sudden spikes in activity that took their web services down in minutes. Today, determining how much capacity you need for handling traffic surges is still a common frustration of operations engineers and software developers. This hands-on guide provides the knowledge and tools you need to measure, deploy, and manage your web application infrastructure before you experience explosive growth. In this thoroughly updated edition, authors Arun Kejariwal (MZ) and John Allspaw provide a systematic, robust, and practical approach to capacity planning - rather than theoretical models - based on their own experiences and those of many colleagues in the industry. They address the vast sea change in web operations, especially cloud computing. Understand issues that arise on heavily trafficked websites or mobile apps; Explore how capacity fits into web/mobile app availability and performance; Use tools for measur ...
Zero Trust Networks
Zero Trust Networks

Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they're internet-facing, and considers the entire network to be compromised and hostile. Authors Evan Gilman and Doug Barth show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You'll learn the architecture of a zero trust network, including how to build one using currently available technology. Understand how the zero trust model embeds security within the system's operation, rather than layering it on top; Examine the fundamental concepts at play in a zero trust network, including network agents and trust engines; Use exis ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025