Operating systems Books
McGraw-Hill Education CompTIA A Certification AllinOne Exam Guide
Book SynopsisThis bestselling on-the-job reference and test preparation guide has been fully revised for new 2022 exam objectivesThis fully revised and updated resource offers complete coverage of the latest release of CompTIA A+ exams 220-1101 & 220-1102. Youâll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the CompTIA A+ exams with ease, this definitive guide also serves as an essential on-the-job IT reference.Covers all exam topics, including how to: Work with CPUs, RAM, BIOS, motherboards, power supplies, and other personal computer components Install, configure, and maintain hard drives Manage input devices and removable media Set up, upgrade, and maintain Microsoft Windows Troubleshoot and fix computer problems Install printers and other peripherals Configure and secure mobile devices Connect to the IntTable of ContentsCH 1 Safety and ProfessionalismCH 2 The Visible ComputerCH 3 CPUsCH 4 RAMCH 5 FirmwareCH 6 MotherboardsCH 7 Power SuppliesCH 8 Mass Storage TechnologiesCH 9 Implementing Mass StorageCH 10 Essential PeripheralsCH 11 Installing and Upgrading Operating SystemsCH 12 Operating System OperationsCH 13 Users, Groups, and PermissionsCH 14 Maintaining and Optimizing Operating SystemsCH 15 Command Line InterfaceCH 16 Troubleshooting Operating SystemsCH 17 Display TechnologiesCH 18 Networking EssentialsCH 19 Local Area NetworkingCH 20 Wireless NetworkingCH 21 The InternetCH 22 VirtualizationCH 23 Portable ComputingCH 24 Mobile DevicesCH 25 Securing Mobile DevicesCH 26 Printers and Multifunction DevicesCH 27 Securing ComputersCH 28 Operational ProceduresApp A Mapping to the CompTIA A+ ObjectivesApp B About the Online ContentGL Glossary
£35.99
Pearson Education (US) Systems Performance
Book SynopsisTable of ContentsPreface xxixAcknowledgments xxxvAbout the Author xxxvii Chapter 1: Introduction 1 1.1 Systems Performance 1 1.2 Roles 2 1.3 Activities 3 1.4 Perspectives 4 1.5 Performance Is Challenging 5 1.6 Latency 6 1.7 Observability 7 1.8 Experimentation 13 1.9 Cloud Computing 14 1.10 Methodologies 15 1.11 Case Studies 16 1.12 References 19 Chapter 2: Methodologies 21 2.1 Terminology 22 2.2 Models 23 2.3 Concepts 24 2.4 Perspectives 37 2.5 Methodology 40 2.6 Modeling 62 2.7 Capacity Planning 69 2.8 Statistics 73 2.9 Monitoring 77 2.10 Visualizations 79 2.11 Exercises 85 2.12 References 86 Chapter 3: Operating Systems 89 3.1 Terminology 90 3.2 Background 91 3.3 Kernels 111 3.4 Linux 114 3.5 Other Topics 122 3.6 Kernel Comparisons 124 3.7 Exercises 124 3.8 References 125 Chapter 4: Observability Tools 129 4.1 Tool Coverage 130 4.2 Tool Types 133 4.3 Observability Sources 138 4.4 sar 160 4.5 Tracing Tools 166 4.6 Observing Observability 167 4.7 Exercises 168 4.8 References 168 Chapter 5: Applications 171 5.1 Application Basics 172 5.2 Application Performance Techniques 176 5.3 Programming Languages 182 5.4 Methodology 186 5.5 Observability Tools 199 5.6 Gotchas 213 5.7 Exercises 216 5.8 References 217 Chapter 6: CPUs 219 6.1 Terminology 220 6.2 Models 221 6.3 Concepts 223 6.4 Architecture 229 6.5 Methodology 244 6.6 Observability Tools 254 6.7 Visualizations 288 6.8 Experimentation 293 6.9 Tuning 294 6.10 Exercises 299 6.11 References 300 Chapter 7: Memory 303 7.1 Terminology 304 7.2 Concepts 305 7.3 Architecture 311 7.4 Methodology 323 7.5 Observability Tools 328 7.6 Tuning 350 7.7 Exercises 354 7.8 References 355 Chapter 8: File Systems 359 8.1 Terminology 360 8.2 Models 361 8.3 Concepts 362 8.4 Architecture 372 8.5 Methodology 383 8.6 Observability Tools 391 8.7 Experimentation 411 8.8 Tuning 414 8.9 Exercises 419 8.10 References 420 Chapter 9: Disks 423 9.1 Terminology 424 9.2 Models 425 9.3 Concepts 427 9.4 Architecture 435 9.5 Methodology 449 9.6 Observability Tools 458 9.7 Visualizations 487 9.8 Experimentation 490 9.9 Tuning 493 9.10 Exercises 495 9.11 References 496 Chapter 10: Network 499 10.1 Terminology 500 10.2 Models 501 10.3 Concepts 503 10.4 Architecture 509 10.5 Methodology 524 10.6 Observability Tools 533 10.7 Experimentation 562 10.8 Tuning 567 10.9 Exercises 574 10.10 References 575 Chapter 11: Cloud Computing 579 11.1 Background 580 11.2 Hardware Virtualization 587 11.3 OS Virtualization 605 11.4 Lightweight Virtualization 630 11.5 Other Types 634 11.6 Comparisons 634 11.7 Exercises 636 11.8 References 637 Chapter 12: Benchmarking 641 12.1 Background 642 12.2 Benchmarking Types 651 12.3 Methodology 656 12.4 Benchmark Questions 667 12.5 Exercises 668 12.6 References 669 Chapter 13: perf 671 13.1 Subcommands Overview 672 13.2 One-Liners 674 13.3 perf Events 679 13.4 Hardware Events 681 13.5 Software Events 683 13.6 Tracepoint Events 684 13.7 Probe Events 685 13.8 perf stat 691 13.9 perf record 694 13.10 perf report 696 13.11 perf script 698 13.12 perf trace 701 13.13 Other Commands 702 13.14 perf Documentation 703 13.15 References 703 Chapter 14: Ftrace 705 14.1 Capabilities Overview 706 14.2 tracefs (/sys) 708 14.3 Ftrace Function Profiler 711 14.4 Ftrace Function Tracing 713 14.5 Tracepoints 717 14.6 kprobes 719 14.7 uprobes 722 14.8 Ftrace function_graph 724 14.9 Ftrace hwlat 726 14.10 Ftrace Hist Triggers 727 14.11 trace-cmd 734 14.12 perf ftrace 741 14.13 perf-tools 741 14.14 Ftrace Documentation 748 14.15 References 749 Chapter 15: BPF 751 15.1 BCC 753 15.2 bpftrace 761 15.3 References 782 Chapter 16: Case Study 783 16.1 An Unexplained Win 783 16.2 Additional Information 792 16.3 References 793 Appendix A: USE Method: Linux 795Appendix B: sar Summary 801Appendix C: bpftrace One-Liners 803Appendix D: Solutions to Selected Exercises 809Appendix E: Systems Performance Who's Who 811 Glossary 815Index 825
£43.19
Simon & Schuster In the Plex
Book SynopsisDelivers the inside story behind Google, the most successful and admired technology company of our time, now updated with a new Afterword.
£14.24
Pearson Education Limited Modern Operating Systems Global Edition
Book SynopsisAbout our authors Andrew S. Tanenbaum has an S.B. degree from M.I.T. and a Ph.D. from the University of California at Berkeley. He is currently a Professor Emeritus of Computer Science at the Vrije Universiteit in Amsterdam, The Netherlands. He was formerly Dean of the Advanced School for Computing and Imaging, an interuniversity graduate school doing research on advanced parallel, distributed, and imaging systems. He was also an Academy Professor of the Royal Netherlands Academy of Arts and Sciences, which has saved him from turning into a bureaucrat. He also won a prestigious European Research Council Advanced Grant. In the past, he has done research on compilers, operating systems, networking, local-area distributed systems and distributed systems. This research has led to over 200 refereed publications in journals and conferences. Prof. Tanenbaum has also authored or co-authored 5 books, which have been translated into over 20 languages, ranging Table of Contents Introduction Processes and Threads Memory Management File Systems Input/Ouput Deadlocks Virtualization and the Cloud Multiple Processor Systems Security Case Study 1: Unix, Linux, and Android Case Study 2: Windows 11 Operating System Design Reading List and Bibliography
£77.89
Pearson Education (US) The AWK Programming Language
Book SynopsisAlfred V. Aho is Lawrence Gussman Professor Emeritus of Computer Science at Columbia University, and former department chair. Well known for his work on algorithms, data structures, programming languages, compilers, and the foundations of computer science, he has received the ACM A. M. Turing Award and the IEEE John von Neumann Medal. Brian W. Kernighan was a member of the Computing Science Research Center at Bell Labs and is currently a professor in the Computer Science department at Princeton. He is the co-creator of several programming languages and the co-author of numerous books, including the computing classic, The C Programming Language. Peter J. Weinberger, currently at Google, has served as chief technology officer at Renaissance Technologies and as leader of computer science research at Bell Labs. He is a Fellow of the AAAS.Table of ContentsPreface ix Chapter 1: An Awk Tutorial 11.1 Getting Started 11.2 Simple Output 41.3 Formatted Output 71.4 Selection 81.5 Computing with Awk 101.6 Control-Flow Statements 131.7 Arrays 161.8 Useful One-liners 171.9 What Next? 19 Chapter 2: Awk in Action 212.1 Personal Computation 212.2 Selection 232.3 Transformation 252.4 Summarization 272.5 Personal Databases 282.6 A Personal Library 312.7 Summary 34 Chapter 3: Exploratory Data Analysis 353.1 The Sinking of the Titanic 363.2 Beer Ratings 413.3 Grouping Data 433.4 Unicode Data 453.5 Basic Graphs and Charts 473.6 Summary 49 Chapter 4: Data Processing 514.1 Data Transformation and Reduction 514.2 Data Validation 574.3 Bundle and Unbundle 594.4 Multiline Records 604.5 Summary 66 Chapter 5: Reports and Databases 675.1 Generating Reports 675.2 Packaged Queries and Reports 735.3 A Relational Database System 755.4 Summary 83 Chapter 6: Processing Words 856.1 Random Text Generation 856.2 Interactive Text-Manipulation 906.3 Text Processing 926.4 Making an Index 996.5 Summary 105 Chapter 7: Little Languages 1077.1 An Assembler and Interpreter 1087.2 A Language for Drawing Graphs 1117.3 A Sort Generator 1137.4 A Reverse-Polish Calculator 1157.5 A Different Approach 1177.6 A Recursive-Descent Parser for Arithmetic Expressions 1197.7 A Recursive-Descent Parser for a Subset of Awk 1227.8 Summary 126 Chapter 8: Experiments with Algorithms 1298.1 Sorting 1298.2 Profiling 1428.3 Topological Sorting 1448.4 Make: A File Updating Program 1488.5 Summary 153 Chapter 9: Epilogue 1559.1 Awk as a Language 1559.2 Performance 1579.3 Conclusion 160 Appendix A: Awk Reference Manual 163A.1 Patterns 165A.2 Actions 176A.3 User-Defined Functions 196A.4 Output 197A.5 Input 202A.6 Interaction with Other Programs 207A.7 Summary 208 Index 209
£28.79
Penguin Putnam Inc UNIX and Linux System Administration Handbook
Book SynopsisEvi Nemeth pioneered the discipline of UNIX system administration. She taught and mentored computer science students at the University of Colorado Boulder, was visiting faculty member at Dartmouth College and UC San Diego, and helped bring Internet technology to the developing world through her work with the Internet Society and the United Nations. Garth Snyder has worked at NeXT and Sun and holds a BS in Engineering from Swarthmore College and an MD and an MBA from the University of Rochester. Trent R. Hein (@trenthein) is a serial entrepreneur who is passionate about practical cybersecurity and automation. Outside of technology, he loves hiking, skiing, fly fishing, camping, bluegrass, dogs, and the Oxford comma. Trent holds a BS in Computer Science from the University of Colorado. Ben Whaley is the founder of WhaleTech, an independent consultancy. He was honored by Amazon as one of the first
£51.29
O'Reilly Media The Site Reliability Workbook
Book SynopsisGoogle’s Site Reliability Engineering book ignited an industry discussion on what it means to run production services today. Now, Google engineers who worked on that bestseller introduce The Site Reliability Workbook, a hands-on companion that uses concrete examples to show you how to put SRE principles and practices to work in your environment.
£38.39
Pearson Education Limited Operating Systems Internals and Design Principles
Book SynopsisTable of ContentsOnline Chapters and Appendices VideoNotes Preface About the Author I. Background 1. Computer System Overview 1.1. Basic Elements 1.2. Evolution of the Microprocessor 1.3. Instruction Execution 1.4. Interrupts 1.5. The Memory Hierarchy 1.6. Cache Memory 1.7. Direct Memory Access 1.8. Multiprocessor and Multicore Organization 1.9. Key Terms, Review Questions, and Problems 1A. Performance Characteristics of Two-Level Memories 2. Operating System Overview 2.1. Operating System Objectives and Functions 2.2. The Evolution of Operating Systems 2.3. Major Achievements 2.4. Developments Leading to Modern Operating Systems 2.5. Fault Tolerance 2.6. Os Design Considerations for Multiprocessor and Multicore 2.7. Microsoft Windows Overview 2.8. Traditional Unix Systems 2.9. Modern Unix Systems 2.10. Linux 2.11. Android 2.12. Key Terms, Review Questions, and Problems II. Processes 3. Process Description and Control 3.1. What is a Process? 3.2. Process States 3.3. Process Description 3.4. Process Control 3.5. Execution of the Operating System 3.6. Unix Svr4 Process Management 3.7. Summary 3.8. Key Terms, Review Questions, and Problems 4. Threads 4.1. Processes and Threads 4.2. Types of Threads 4.3. Multicore and Multithreading 4.4. Windows Process and Thread Management 4.5. Solaris Thread and Smp Management 4.6. Linux Process and Thread Management 4.7. Android Process and Thread Management 4.8. Mac OS X Grand Central Dispatch 4.9. Summary 4.10. Key Terms, Review Questions, and Problems 5. Concurrency: Mutual Exclusion and Synchronization 5.1. Mutual Exclusion: Software Approaches 5.2. Principles of Concurrency 5.3. Mutual Exclusion: Hardware Support 5.4. Semaphores 5.5. Monitors 5.6. Message Passing 5.7. Readers/Writers Problem 5.8. Summary 5.9. Key Terms, Review Questions, and Problems 6. Concurrency: Deadlock and Starvation 6.1. Principles of Deadlock 6.2. Deadlock Prevention 6.3. Deadlock Avoidance 6.4. Deadlock Detection 6.5. An Integrated Deadlock Strategy 6.6. Dining Philosophers Problem 6.7. Unix Concurrency Mechanisms 6.8. Linux Kernel Concurrency Mechanisms 6.9. Solaris Thread Synchronization Primitives 6.10. Windows Concurrency Mechanisms 6.11. Android Interprocess Communication 6.12. Summary 6.13. Key Terms, Review Questions, and Problems III. Memory 7. Memory Management 7.1. Memory Management Requirements 7.2. Memory Partitioning 7.3. Paging 7.4. Segmentation 7.5. Summary 7.6. Key Terms, Review Questions, and Problems 7A. Loading and Linking 8. Virtual Memory 8.1. Hardware and Control Structures 8.2. Operating System Software 8.3. Unix and Solaris Memory Management 8.4. Linux Memory Management 8.5. Windows Memory Management 8.6. Android Memory Management 8.7. Summary 8.8. Key Terms, Review Questions, and Problems IV. Scheduling 9. Uniprocessor Scheduling 9.1. Types of Processor Scheduling 9.2. Scheduling Algorithms 9.3. Traditional Unix Scheduling 9.4. Summary 9.5. Key Terms, Review Questions, and Problems <
£72.09
O'Reilly Media Certified Kubernetes Administrator CKA Study
Book SynopsisThis study guide walks you through all the topics covered to fully prepare you for the Certified Kubernetes Administrator (CKA) certification exam.
£42.39
Syngress Media,U.S. Deploying Secure Containers for Training and
Book SynopsisTable of ContentsIntroduction Chapter 1- Containers Chapter 2- Using containers in Training Chapter 3- Experimentation
£26.59
Pearson Education (US) Practical Guide to Linux Commands Editors and
Book Synopsis Mark G. Sobell has forty years of experience working with UNIX and Linux systems and is the author of many best-selling books, including A Practical Guide to Fedora and Red Hat Enterprise Linux, Seventh Edition, and A Practical Guide to Ubuntu Linux, Fourth Edition. Matthew Helmke got his first computer in 1981, a TRS-80 Color Computer. He started using UNIX in 1987 while studying LISP. He works as a technical writer and has written about Linux and other topics for magazines and a diverse set of companies. He is the author of several books, including Ubuntu Unleashed, The Official Ubuntu Book, and VMware Cookbook. Trade Review Praise for Previous Editions of A Practical Guide to Linux® Commands, Editors, and Shell Programming “This book is a very useful tool for anyone who wants to ‘look under the hood’ so to speak, and really start putting the power of Linux to work. What I find particularly frustrating about man pages is that they never include examples. Sobell, on the other hand, outlines very clearly what the command does and then gives several common, easy-to-understand examples that make it a breeze to start shell programming on one’s own. As with Sobell’s other works, this is simple, straight-forward, and easy to read. It’s a great book and will stay on the shelf at easy arm’s reach for a long time.” –Ray Bartlett, Travel Writer “Overall I found this book to be quite excellent, and it has earned a spot on the very front of my bookshelf. It covers the real ‘guts’ of Linux– the command line and its utilities–and does so very well. Its strongest points are the outstanding use of examples, and the Command Reference section. Highly recommended for Linux users of all skill levels. Well done to Mark Sobell and Prentice Hall for this outstanding book!” –Dan Clough, Electronics Engineer and Slackware Linux User “Totally unlike most Linux books, this book avoids discussing everything via GUI and jumps right into making the power of the command line your friend.” –Bjorn Tipling, Software Engineer, ask.com “This book is the best distro-agnostic, foundational Linux reference I’ve ever seen, out of dozens of Linux-related books I’ve read. Finding this book was a real stroke of luck. If you want to really understand how to get things done at the command line, where the power and flexibility of free UNIX-like OSes really live, this book is among the best tools you’ll find toward that end.” –Chad Perrin, Writer, TechRepublic “I moved to Linux from Windows XP a couple of years ago, and after some distro hopping settled on Linux Mint. At age 69 I thought I might be biting off more than I could chew, but thanks to much reading and the help of a local LUG I am now quite at home with Linux at the GUI level. “Now I want to learn more about the CLI and a few months ago bought your book: A Practical Guide to Linux® Commands, Editors, and Shell Programming, Second Edition. “For me, this book is proving to be the foundation upon which my understanding of the CLI is being built. As a comparative ‘newbie’ to the Linux world, I find your book a wonderful, easy-to-follow guide that I highly recommend to other Linux users.” –John Nawell, CQLUG (Central Queensland Linux User Group) “I have the second edition of A Practical Guide to Linux® Commands, Editors, and Shell Programming and am a big fan. I used it while working as a Cisco support engineer. I plan to get the third edition as soon as it is released. We will be doing a ton of command-line work on literally 1000 boxes (IMS core nodes). I feel you have already given me a lot of tools with the second edition. I want to get your new book as soon as possible. The way you write works very well for my style of learning.” –Robert Lingenfelter, Support Engineer, VoIP/IMS Praise for Other Books by Mark G. Sobell “Since I’m in an educational environment, I found the content of Sobell’s book to be right on target and very helpful for anyone managing Linux in the enterprise. His style of writing is very clear. He builds up to the chapter exercises, which I find to be relevant to real-world scenarios a user or admin would encounter. An IT/IS student would find this book a valuable complement to their education. The vast amount of information is extremely well balanced and Sobell manages to present the content without complicated asides and meandering prose. This is a ‘must have’ for anyone managing Linux systems in a networked environment or anyone running a Linux server. I would also highly recommend it to an experienced computer user who is moving to the Linux platform.” –Mary Norbury, IT Director, Barbara Davis Center, University of Colorado at Denver, from a review posted on slashdot.org “I had the chance to use your UNIX books when I when was in college years ago at Cal Poly, San Luis Obispo, CA. I have to say that your books are among the best! They’re quality books that teach the theoretical aspects and applications of the operating system.” –Benton Chan, IS Engineer “The book has more than lived up to my expectations from the many reviews I read, even though it targets FC2. I have found something very rare with your book: It doesn’t read like the standard technical text, it reads more like a story. It’s a pleasure to read and hard to put down. Did I say that?! :-)” –David Hopkins, Business Process Architect “Thanks for your work and for the book you wrote. There are really few books that can help people to become more efficient administrators of different workstations. We hope (in Russia) that you will continue bringing us a new level of understanding of Linux/UNIX systems.” –Anton Petukhov “Mark Sobell has written a book as approachable as it is authoritative.” –Jeffrey Bianchine, Advocate, Author, Journalist “Excellent reference book, well suited for the sysadmin of a Linux cluster, or the owner of a PC contemplating installing a recent stable Linux. Don’t be put off by the daunting heft of the book. Sobell has striven to be as inclusive as possible, in trying to anticipate your system administration needs.” –Wes Boudville, Inventor “A Practical Guide to Red Hat® Linux® is a brilliant book. Thank you, Mark Sobell.” –C. Pozrikidis, University of California at San Diego “This book presents the best overview of the Linux operating system that I have found. . . . [It] should be very helpful and understandable no matter what the reader’s background: traditional UNIX user, new Linux devotee, or even Windows user. Each topic is presented in a clear, complete fashion and very few assumptions are made about what the reader knows. . . . The book is extremely useful as a reference, as it contains a 70-page glossary of terms and is very well indexed. It is organized in such a way that the reader can focus on simple tasks without having to wade through more advanced topics until they are ready.” –Cam Marshall, Marshall Information Service LLC, Member of Front Range UNIX Users Group [FRUUG], Boulder, Colorado “Conclusively, this is THE book to get if you are a new Linux user and you just got into RH/Fedora world. There’s no other book that discusses so many different topics and in such depth.” –Eugenia Loli-Queru, Editor in Chief, OSNews.com “I currently own one of your books, A Practical Guide to Linux®. I believe this book is one of the most comprehensive and, as the title says, practical guides to Linux I have ever read. I consider myself a novice and I come back to this book over and over again.” –Albert J. Nguyen “Thank you for writing a book to help me get away from Windows XP and to never touch Windows Vista. The book is great; I am learning a lot of new concepts and commands. Linux is definitely getting easier to use.” –James Moritz “I am so impressed by how Mark Sobell can approach a complex topic in such an understandable manner. His command examples are especially useful in providing a novice (or even an advanced) administrator with a cookbook on how to accomplish real-world tasks on Linux. He is truly an inspired technical writer!” –George Vish II, Senior Education Consultant, Hewlett-Packard Company “Overall, I think it’s a great, comprehensive Ubuntu book that’ll be a valuable resource for people of all technical levels.” –John Dong, Ubuntu Forum Council Member, Backports Team Leader “The JumpStart sections really offer a quick way to get things up and running, allowing you to dig into the details of the book later.” –Scott Mann, Aztek Networks “I would so love to be able to use this book to teach a class about not just Ubuntu or Linux but about computers in general. It is thorough and well written with good illustrations that explain important concepts for computer usage.” –Nathan Eckenrode, New York Local Community Team “Ubuntu is gaining popularity at the rate alcohol did during Prohibition, and it’s great to see a well-known author write a book on the latest and greatest version. Not only does it contain Ubuntu-specific information, but it also touches on general computer-related topics, which will help the average computer user to better understand what’s going on in the background. Great work, Mark!” –Daniel R. Arfsten, Pro/ENGINEER Drafter/Designer “I read a lot of Linux technical information every day, but I’m rarely impressed by tech books. I usually prefer online information sources instead. Mark Sobell’s books are a notable exception. They’re clearly written, technically accurate, comprehensive, and actually enjoyable to read.” –Matthew Miller, Senior Systems Analyst/Administrator, BU Linux Project, Boston University Office of Information Technology “This is well-written, clear, comprehensive information for the Linux user of any type, whether trying Ubuntu on for the first time and wanting to know a little about it, or using the book as a very good reference when doing something more complicated like setting up a server. This book’s value goes well beyond its purchase price and it’ll make a great addition to the Linux section of your bookshelf.” –Linc Fessenden, Host of The LinuxLink TechShow, tllts.org “The author has done a very good job at clarifying such a detail-oriented operating system. I have extensive Unix and Windows experience and this text does an excellent job at bridging the gaps between Linux, Windows, and Unix. I highly recommend this book to both ‘newbs’ and experienced users. Great job!” –Mark Polczynski, Information Technology Consultant “Your text, A Practical Guide to Ubuntu Linux®, Third Edition, is a well constructed, informative, superbly written text. You deserve an award for outstanding talent; unfortunately my name is not Pulitzer.” –Harrison Donnelly, Physician “When I first started working with Linux just a short ten years or so ago, it was a little more difficult than now to get going. . . . Now, someone new to the community has a vast array of resources available on the web, or if they are inclined to begin with Ubuntu, they can literally find almost every single thing they will need in the single volume of Mark Sobell’s A Practical Guide to Ubuntu Linux®. “I’m sure this sounds a bit like hyperbole. Everything a person would need to know? Obviously not everything, but this book, weighing in at just under 1200 pages, covers so much so thoroughly that there won’t be much left out. From install to admin, networking, security, shell scripting, package management, and a host of other topics, it is all there. GUI and command-line tools are covered. There is not really any wasted space or fluff, just a huge amount of information. There are screen shots when appropriate but they do not take up an inordinate amount of space. This book is information-dense.” –JR Peck, Editor, GeekBook.org “I have been wanting to make the jump to Linux but did not have the guts to do so–until I saw your familiarly titled A Practical Guide to Red Hat® Linux® at the bookstore. I picked up a copy and am eagerly looking forward to regaining my freedom.” –Carmine Stoffo, Machine and Process Designer to pharmaceutical industry “I am currently reading A Practical Guide to Red Hat® Linux® and am finally understanding the true power of the command line. I am new to Linux and your book is a treasure.” –Juan Gonzalez “Overall, A Practical Guide to Ubuntu Linux® by Mark G. Sobell provides all of the information a beginner to intermediate user of Linux would need to be productive. The inclusion of the Live DVD of the Gutsy Gibbon release of Ubuntu makes it easy for the user to test-drive Linux without affecting his installed OS. I have no doubts that you will consider this book money well spent.” –Ray Lodato, Slashdot contributor, www.slashdot.orgTable of Contents Preface 1: Welcome to Linux and Mac OS X Part I: The Linux and Mac OS X Operating Systems 2: Getting Started 3: The Utilities 4: The Filesystem 5: The Shell Part II: The Editors 6: The vim Editor 7: The emacs Editor Part III: The Shells 8: The Bourne Again Shell (bash) 9: The TC Shell (tcsh) Part IV: Programming Tools 10: Programming the Bourne Again Shell (bash) 11: The Perl Scripting Language 12: The Python Programming Language 13: The MySQL Database Management System 14: The AWK Pattern Processing Language 15: The sed Editor Part V: Secure Network Utilities 16: The rsync Secure Copy Utility 17: The OpenSSH Secure Communication Utilities Part VI: Command Reference Utilities That Display and Manipulate Files Network Utilities Utilities That Display and Alter Status Utilities That Are Programming Tools Miscellaneous Utilities Standard Multiplicative Suffixes Common Options The Sample Utility Part VII: Appendices Appendix A: Regular Expressions Appendix B: Help Appendix C: Keeping the System Up-to-Date Appendix D: Mac OS X Notes Glossary File Tree Index Utility Index Main Index
£40.04
Pearson Education (US) macOS Support Essentials 12 Apple Pro Training
Book SynopsisTable of ContentsInstallation and Configuration Lesson 1 Introduction to macOS Lesson 2 Update, Upgrade, or Reinstall macOS Lesson 3 Set Up and Configure macOS Lesson 4 Use the Command-Line Interface Lesson 5 Use macOS Recovery Lesson 6 Update macOS User Accounts Lesson 7 Manage User Accounts Lesson 8 Manage User Home Folders Lesson 9 Manage Security and Privacy Lesson 10 Manage Password Changes File Systems Lesson 11 Manage File Systems and Storage Lesson 12 Manage FileVault Lesson 13 Manage Permissions and Sharing Lesson 14 Use Hidden Items, Shortcuts, and File Archives Data Management Lesson 15 Manage System Resources Lesson 16 Use Metadata, Siri, and Spotlight Lesson 17 Manage Time Machine Apps and Processes Lesson 18 Install Apps Lesson 19 Manage Files Lesson 20 Manage and Troubleshoot Apps Network Configuration Lesson 21 Manage Basic Network Settings Lesson 22 Manage Advanced Network Settings Lesson 23 Troubleshoot Network Issues Network Services Lesson 24 Manage Network Services Lesson 25 Manage Host Sharing and Personal Firewall System Management Lesson 26 Troubleshoot Peripherals Lesson 27 Manage Printers and Scanners Lesson 28 Troubleshoot Startup and System Issues
£49.39
Pearson Education Limited Brilliant OS X Mountain Lion
Book Synopsis
£15.29
Pearson Education Limited Brilliant Windows 8
Book Synopsis
£16.19
Pearson Education (US) Practice of System and Network Administration The
Book SynopsisThomas A. Limoncelli is an internationally recognized author, speaker, and system administrator with more than twenty years of experience at companies like Google, Bell Labs, and StackOverflow.com. Christina J. Hogan has more than twenty years of experience in system administration and network engineering, from Silicon Valley to Italy and Switzerland. She has a master's degree in computer science, a doctorate in aeronautical engineering, and has been part of a Formula 1 racing team. Strata R. Chalup has more than twenty-five years of experience in Silicon Valley, focusing on IT strategy, best-practices, and scalable infrastructures at firms that include Apple, Sun, Cisco, McAfee, and Palm.Table of ContentsPreface xxxix Acknowledgments xlvii About the Authors li Part I: Game-Changing Strategies 1 Chapter 1: Climbing Out of the Hole 3 1.1 Organizing WIP 5 1.2 Eliminating Time Sinkholes 12 1.3 DevOps 16 1.4 DevOps Without Devs 16 1.5 Bottlenecks 18 1.6 Getting Started 20 1.7 Summary 21 Exercises 22 Chapter 2: The Small Batches Principle 23 2.1 The Carpenter Analogy 23 2.2 Fixing Hell Month 24 2.3 Improving Emergency Failovers 26 2.4 Launching Early and Often 29 2.5 Summary 34 Exercises 34 Chapter 3: Pets and Cattle 37 3.1 The Pets and Cattle Analogy 37 3.2 Scaling 39 3.3 Desktops as Cattle 40 3.4 Server Hardware as Cattle 41 3.5 Pets Store State 43 3.6 Isolating State 44 3.7 Generic Processes 47 3.8 Moving Variations to the End 51 3.9 Automation 53 3.10 Summary 53 Exercises 54 Chapter 4: Infrastructure as Code 55 4.1 Programmable Infrastructure 56 4.2 Tracking Changes 57 4.3 Benefits of Infrastructure as Code 59 4.4 Principles of Infrastructure as Code 62 4.5 Configuration Management Tools 63 4.6 Example Infrastructure as Code Systems 67 4.7 Bringing Infrastructure as Code to Your Organization 71 4.8 Infrastructure as Code for Enhanced Collaboration 72 4.9 Downsides to Infrastructure as Code 73 4.10 Automation Myths 74 4.11 Summary 75 Exercises 76 Part II: Workstation Fleet Management 77 Chapter 5: Workstation Architecture 79 5.1 Fungibility 80 5.2 Hardware 82 5.3 Operating System 82 5.4 Network Configuration 84 5.5 Accounts and Authorization 86 5.6 Data Storage 89 5.7 OS Updates 93 5.8 Security 94 5.9 Logging 97 5.10 Summary 98 Exercises 99 Chapter 6: Workstation Hardware Strategies 101 6.1 Physical Workstations 101 6.2 Virtual Desktop Infrastructure 105 6.3 Bring Your Own Device 110 6.4 Summary 113 Exercises 114 Chapter 7: Workstation Software Life Cycle 117 7.1 Life of a Machine 117 7.2 OS Installation 120 7.3 OS Configuration 120 7.4 Updating the System Software and Applications 123 7.5 Rolling Out Changes . . . Carefully 128 7.6 Disposal 130 7.7 Summary 134 Exercises 135 Chapter 8: OS Installation Strategies 137 8.1 Consistency Is More Important Than Perfection 138 8.2 Installation Strategies 142 8.3 Test-Driven Configuration Development 147 8.4 Automating in Steps 148 8.5 When Not to Automate 152 8.6 Vendor Support of OS Installation 152 8.7 Should You Trust the Vendor's Installation? 154 8.8 Summary 154 Exercises 155 Chapter 9: Workstation Service Definition 157 9.1 Basic Service Definition 157 9.2 Refresh Cycles 161 9.3 Tiered Support Levels 165 9.4 Workstations as a Managed Service 168 9.5 Summary 170 Exercises 171 Chapter 10: Workstation Fleet Logistics 173 10.1 What Employees See 173 10.2 What Employees Don't See 174 10.3 Configuration Management Database 183 10.4 Small-Scale Fleet Logistics 186 10.5 Summary 188 Exercises 188 Chapter 11: Workstation Standardization 191 11.1 Involving Customers Early 192 11.2 Releasing Early and Iterating 193 11.3 Having a Transition Interval (Overlap) 193 11.4 Ratcheting 194 11.5 Setting a Cut-Off Date 195 11.6 Adapting for Your Corporate Culture 195 11.7 Leveraging the Path of Least Resistance 196 11.8 Summary 198 Exercises 199 Chapter 12: Onboarding 201 12.1 Making a Good First Impression 201 12.2 IT Responsibilities 203 12.3 Five Keys to Successful Onboarding 203 12.4 Cadence Changes 212 12.5 Case Studies 212 12.6 Summary 216 Exercises 217 Part III: Servers 219 Chapter 13: Server Hardware Strategies 221 13.1 All Eggs in One Basket 222 13.2 Beautiful Snowflakes 224 13.3 Buy in Bulk, Allocate Fractions 228 13.4 Grid Computing 235 13.5 Blade Servers 237 13.6 Cloud-Based Compute Services 238 13.7 Server Appliances 241 13.8 Hybrid Strategies 242 13.9 Summary 243 Exercises 244 Chapter 14: Server Hardware Features 245 14.1 Workstations Versus Servers 246 14.2 Server Reliability 249 14.3 Remotely Managing Servers 254 14.4 Separate Administrative Networks 257 14.5 Maintenance Contracts and Spare Parts 258 14.6 Selecting Vendors with Server Experience 261 14.7 Summary 263 Exercises 263 Chapter 15: Server Hardware Specifications 265 15.1 Models and Product Lines 266 15.2 Server Hardware Details 266 15.3 Things to Leave Out 278 15.4 Summary 278 Exercises 279 Part IV: Services 281 Chapter 16: Service Requirements 283 16.1 Services Make the Environment 284 16.2 Starting with a Kick-Off Meeting 285 16.3 Gathering Written Requirements 286 16.4 Customer Requirements 288 16.5 Scope, Schedule, and Resources 291 16.6 Operational Requirements 292 16.7 Open Architecture 298 16.8 Summary 302 Exercises 303 Chapter 17: Service Planning and Engineering 305 17.1 General Engineering Basics 306 17.2 Simplicity 307 17.3 Vendor-Certified Designs 308 17.4 Dependency Engineering 309 17.5 Decoupling Hostname from Service Name 313 17.6 Support 315 17.7 Summary 319 Exercises 319 Chapter 18: Service Resiliency and Performance Patterns 321 18.1 Redundancy Design Patterns 322 18.2 Performance and Scaling 326 18.3 Summary 333 Exercises 334 Chapter 19: Service Launch: Fundamentals 335 19.1 Planning for Problems 335 19.2 The Six-Step Launch Process 336 19.3 Launch Readiness Review 345 19.4 Launch Calendar 348 19.5 Common Launch Problems 349 19.6 Summary 351 Exercises 351 Chapter 20: Service Launch: DevOps 353 20.1 Continuous Integration and Deployment 354 20.2 Minimum Viable Product 357 20.3 Rapid Release with Packaged Software 359 20.4 Cloning the Production Environment 362 20.5 Example: DNS/DHCP Infrastructure Software 363 20.6 Launch with Data Migration 366 20.7 Controlling Self-Updating Software 369 20.8 Summary 370 Exercises 371 Chapter 21: Service Conversions 373 21.1 Minimizing Intrusiveness 374 21.2 Layers Versus Pillars 376 21.3 Vendor Support 377 21.4 Communication 378 21.5 Training 379 21.6 Gradual Roll-Outs 379 21.7 Flash-Cuts: Doing It All at Once 380 21.8 Backout Plan 383 21.9 Summary 385 Exercises 385 Chapter 22: Disaster Recovery and Data Integrity 387 22.1 Risk Analysis 388 22.2 Legal Obligations 389 22.3 Damage Limitation 390 22.4 Preparation 391 22.5 Data Integrity 392 22.6 Redundant Sites 393 22.7 Security Disasters 394 22.8 Media Relations 394 22.9 Summary 395 Exercises 395 Part V: Infrastructure 397 Chapter 23: Network Architecture 399 23.1 Physical Versus Logical 399 23.2 The OSI Model 400 23.3 Wired Office Networks 402 23.4 Wireless Office Networks 406 23.5 Datacenter Networks 408 23.6 WAN Strategies 413 23.7 Routing 419 23.8 Internet Access 420 23.9 Corporate Standards 422 23.10 Software-Defined Networks 425 23.11 IPv6 426 23.12 Summary 428 Exercises 429 Chapter 24: Network Operations 431 24.1 Monitoring 431 24.2 Management 432 24.3 Documentation 437 24.4 Support 440 24.5 Summary 446 Exercises 447 Chapter 25: Datacenters Overview 449 25.1 Build, Rent, or Outsource 450 25.2 Requirements 452 25.3 Summary 456 Exercises 457 Chapter 26: Running a Datacenter 459 26.1 Capacity Management 459 26.2 Life-Cycle Management 465 26.3 Patch Cables 468 26.4 Labeling 471 26.5 Console Access 475 26.6 Workbench 476 26.7 Tools and Supplies 477 26.8 Summary 480 Exercises 481 Part VI: Helpdesks and Support 483 Chapter 27: Customer Support 485 27.1 Having a Helpdesk 485 27.2 Offering a Friendly Face 488 27.3 Reflecting Corporate Culture 488 27.4 Having Enough Staff 488 27.5 Defining Scope of Support 490 27.6 Specifying How to Get Help 493 27.7 Defining Processes for Staff 493 27.8 Establishing an Escalation Process 494 27.9 Defining “Emergency” in Writing 495 27.10 Supplying Request-Tracking Software 496 27.11 Statistical Improvements 498 27.12 After-Hours and 24/7 Coverage 499 27.13 Better Advertising for the Helpdesk 500 27.14 Different Helpdesks for Different Needs 501 27.15 Summary 502 Exercises 503 Chapter 28: Handling an Incident Report 505 28.1 Process Overview 506 28.2 Phase A—Step 1: The Greeting 508 28.3 Phase B: Problem Identification 509 28.4 Phase C: Planning and Execution 515 28.5 Phase D: Verification 518 28.6 Perils of Skipping a Step 519 28.7 Optimizing Customer Care 521 28.8 Summary 525 Exercises 527 Chapter 29: Debugging 529 29.1 Understanding the Customer's Problem 529 29.2 Fixing the Cause, Not the Symptom 531 29.3 Being Systematic 532 29.4 Having the Right Tools 533 29.5 End-to-End Understanding of the System 538 29.6 Summary 540 Exercises 540 Chapter 30: Fixing Things Once 541 30.1 Story: The Misconfigured Servers 541 30.2 Avoiding Temporary Fixes 543 30.3 Learn from Carpenters 545 30.4 Automation 547 30.5 Summary 549 Exercises 550 Chapter 31: Documentation 551 31.1 What to Document 552 31.2 A Simple Template for Getting Started 553 31.3 Easy Sources for Documentation 554 31.4 The Power of Checklists 556 31.5 Wiki Systems 557 31.6 Findability 559 31.7 Roll-Out Issues 559 31.8 A Content-Management System 560 31.9 A Culture of Respect 561 31.10 Taxonomy and Structure 561 31.11 Additional Documentation Uses 562 31.12 Off-Site Links 562 31.13 Summary 563 Exercises 564 Part VII: Change Processes 565 Chapter 32: Change Management 567 32.1 Change Review Boards 568 32.2 Process Overview 570 32.3 Change Proposals 570 32.4 Change Classifications 571 32.5 Risk Discovery and Quantification 572 32.6 Technical Planning 573 32.7 Scheduling 574 32.8 Communication 576 32.9 Tiered Change Review Boards 578 32.10 Change Freezes 579 32.11 Team Change Management 581 32.12 Starting with Git 583 32.13 Summary 585 Exercises 585 Chapter 33: Server Upgrades 587 33.1 The Upgrade Process 587 33.2 Step 1: Develop a Service Checklist 588 33.3 Step 2: Verify Software Compatibility 591 33.4 Step 3: Develop Verification Tests 592 33.5 Step 4: Choose an Upgrade Strategy 595 33.6 Step 5: Write a Detailed Implementation Plan 598 33.7 Step 6: Write a Backout Plan 600 33.8 Step 7: Select a Maintenance Window 600 33.9 Step 8: Announce the Upgrade 602 33.10 Step 9: Execute the Tests 603 33.11 Step 10: Lock Out Customers 604 33.12 Step 11: Do the Upgrade with Someone 605 33.13 Step 12: Test Your Work 605 33.14 Step 13: If All Else Fails, Back Out 605 33.15 Step 14: Restore Access to Customers 606 33.16 Step 15: Communicate Completion/Backout 606 33.17 Summary 608 Exercises 610 Chapter 34: Maintenance Windows 611 34.1 Process Overview 612 34.2 Getting Management Buy-In 613 34.3 Scheduling Maintenance Windows 614 34.4 Planning Maintenance Tasks 615 34.5 Selecting a Flight Director 616 34.6 Managing Change Proposals 617 34.7 Developing the Master Plan 620 34.8 Disabling Access 621 34.9 Ensuring Mechanics and Coordination 622 34.10 Change Completion Deadlines 628 34.11 Comprehensive System Testing 628 34.12 Post-maintenance Communication 630 34.13 Reenabling Remote Access 631 34.14 Be Visible the Next Morning 631 34.15 Postmortem 631 34.16 Mentoring a New Flight Director 632 34.17 Trending of Historical Data 632 34.18 Providing Limited Availability 633 34.19 High-Availability Sites 634 34.20 Summary 636 Exercises 637 Chapter 35: Centralization Overview 639 35.1 Rationale for Reorganizing 640 35.2 Approaches and Hybrids 642 35.3 Summary 643 Exercises 644 Chapter 36: Centralization Recommendations 645 36.1 Architecture 645 36.2 Security 645 36.3 Infrastructure 648 36.4 Support 654 36.5 Purchasing 655 36.6 Lab Environments 656 36.7 Summary 656 Exercises 657 Chapter 37: Centralizing a Service 659 37.1 Understand the Current Solution 660 37.2 Make a Detailed Plan 661 37.3 Get Management Support 662 37.4 Fix the Problems 662 37.5 Provide an Excellent Service 663 37.6 Start Slowly 663 37.7 Look for Low-Hanging Fruit 664 37.8 When to Decentralize 665 37.9 Managing Decentralized Services 666 37.10 Summary 667 Exercises 668 Part VIII: Service Recommendations 669 Chapter 38: Service Monitoring 671 38.1 Types of Monitoring 672 38.2 Building a Monitoring System 673 38.3 Historical Monitoring 674 38.4 Real-Time Monitoring 676 38.5 Scaling 684 38.6 Centralization and Accessibility 685 38.7 Pervasive Monitoring 686 38.8 End-to-End Tests 687 38.9 Application Response Time Monitoring 688 38.10 Compliance Monitoring 689 38.11 Meta-monitoring 690 38.12 Summary 690 Exercises 691 Chapter 39: Namespaces 693 39.1 What Is a Namespace? 693 39.2 Basic Rules of Namespaces 694 39.3 Defining Names 694 39.4 Merging Namespaces 698 39.5 Life-Cycle Management 699 39.6 Reuse 700 39.7 Usage 701 39.8 Federated Identity 708 39.9 Summary 709 Exercises 710 Chapter 40: Nameservices 711 40.1 Nameservice Data 711 40.2 Reliability 714 40.3 Access Policy 721 40.4 Change Policies 723 40.5 Change Procedures 724 40.6 Centralized Management 726 40.7 Summary 728 Exercises 728 Chapter 41: Email Service 729 41.1 Privacy Policy 730 41.2 Namespaces 730 41.3 Reliability 731 41.4 Simplicity 733 41.5 Spam and Virus Blocking 735 41.6 Generality 736 41.7 Automation 737 41.8 Monitoring 738 41.9 Redundancy 738 41.10 Scaling 739 41.11 Security Issues 742 41.12 Encryption 743 41.13 Email Retention Policy 743 41.14 Communication 744 41.15 High-Volume List Processing 745 41.16 Summary 746 Exercises 747 Chapter 42: Print Service 749 42.1 Level of Centralization 750 42.2 Print Architecture Policy 751 42.3 Documentation 754 42.4 Monitoring 755 42.5 Environmental Issues 756 42.6 Shredding 757 42.7 Summary 758 Exercises 758 Chapter 43: Data Storage 759 43.1 Terminology 760 43.2 Managing Storage 765 43.3 Storage as a Service 772 43.4 Performance 780 43.5 Evaluating New Storage Solutions 784 43.6 Common Data Storage Problems 787 43.7 Summary 789 Exercises 790 Chapter 44: Backup and Restore 793 44.1 Getting Started 794 44.2 Reasons for Restores 795 44.3 Corporate Guidelines 799 44.4 A Data-Recovery SLA and Policy 800 44.5 The Backup Schedule 801 44.6 Time and Capacity Planning 807 44.7 Consumables Planning 809 44.8 Restore-Process Issues 815 44.9 Backup Automation 816 44.10 Centralization 819 44.11 Technology Changes 820 44.12 Summary 821 Exercises 822 Chapter 45: Software Repositories 825 45.1 Types of Repositories 826 45.2 Benefits of Repositories 827 45.3 Package Management Systems 829 45.4 Anatomy of a Package 829 45.5 Anatomy of a Repository 833 45.6 Managing a Repository 837 45.7 Repository Client 841 45.8 Build Environment 843 45.9 Repository Examples 845 45.10 Summary 848 Exercises 849 Chapter 46: Web Services 851 46.1 Simple Web Servers 852 46.2 Multiple Web Servers on One Host 853 46.3 Service Level Agreements 854 46.4 Monitoring 855 46.5 Scaling for Web Services 855 46.6 Web Service Security 859 46.7 Content Management 866 46.8 Summary 868 Exercises 869 Part IX: Management Practices 871 Chapter 47: Ethics 873 47.1 Informed Consent 873 47.2 Code of Ethics 875 47.3 Customer Usage Guidelines 875 47.4 Privileged-Access Code of Conduct 877 47.5 Copyright Adherence 878 47.6 Working with Law Enforcement 881 47.7 Setting Expectations on Privacy and Monitoring 885 47.8 Being Told to Do Something Illegal/Unethical 887 47.9 Observing Illegal Activity 888 47.10 Summary 889 Exercises 889 Chapter 48: Organizational Structures 891 48.1 Sizing 892 48.2 Funding Models 894 48.3 Management Chain's Influence 897 48.4 Skill Selection 898 48.5 Infrastructure Teams 900 48.6 Customer Support 902 48.7 Helpdesk 904 48.8 Outsourcing 904 48.9 Consultants and Contractors 906 48.10 Sample Organizational Structures 907 48.11 Summary 911 Exercises 911 Chapter 49: Perception and Visibility 913 49.1 Perception 913 49.2 Visibility 925 49.3 Summary 933 Exercises 934 Chapter 50: Time Management 935 50.1 Interruptions 935 50.2 Follow-Through 937 50.3 Basic To-Do List Management 938 50.4 Setting Goals 939 50.5 Handling Email Once 940 50.6 Precompiling Decisions 942
£66.80
Cambridge University Press Compiling with Continuations
Book SynopsisThis book shows how continuation-passing style is used as an intermediate representation on which to perform optimisations and program transformations. It will be essential reading for compiler writers in both industry and academe, as well as for students and researchers in programming language theory.Trade Review"I recommend the book to language designers and implementors specializing in the functional paradigm." F.G. Pagan, Computing ReviewsTable of ContentsAcknowledgements; 1. Overview; 2. Continuation-passing style; 3. Semantics of the CPS; 4. ML-specific optimizations; 5. Conversion into CPS; 6. Optimization of the CPS; 7. Beta expansion; 8. Hoisting; 9. Common subexpressions; 10. Closure conversion; 11. Register spilling; 12. Space complexity; 13. The abstract machine; 14. Machine-code generation; 15. Performance evaluation; 16. The runtime system; 17. Parallel programming; 18. Future directions; Appendices; Bibliography; Index.
£75.99
O'Reilly Media sed awk Pocket Reference
Book SynopsisThis is a reference guide to the information presented in the larger volumes. It presents a concise summary of regular expressions and pattern matching, and summaries of Sed and Awk.Table of ContentsConventions used in this book; matching text; filenames versus patterns; metacharacters; metacharacters, listed by Unix program; examples of searching; the Sed editor; command-line syntax; syntax of Sed commands; group summary of Sed commands; alphabetical summary of Sed commands; the Awk programming language; command-line syntax; important Gawk options; profiling with PGAwk; patterns and procedures; built-in variables; operators variable and array assignment; octal and hexadecimal constants in GAwk; user-defined functions; group listing of Awk functions and commands; coprocesses and sockets with GAwk; implementation limits; alphabetical summary of Awk functions and commands; internationalization with GAwk; additional resources; source code books.
£14.39
Mike Murach & Associates Inc. MVS TSO Concepts and ISPF Pt1
Book Synopsis
£35.19
Wood Islands Prints C and the 8051 4th Edition
£31.50
£51.04
Recursive Books Operating Systems Principles and Practice
£52.25
CRC Press Bootstrap
Book SynopsisIf you want to build websites, understanding Bootstrap will save you a lot of time and effort. Bootstrap is a user-friendly CSS framework that allows developers to create mobile-friendly and responsive websites. Bootstrap is the most widely used framework for creating mobile-first, responsive websites. It fixes a number of issues that we experienced previously, including cross-browser compatibility. Today, webpages are optimized for all browsers (Internet Explorer, Firefox, and Chrome, to name but a few) and screen sizes (desktop, tablets, phablets, and phones). Regardless of project size, Bootstrap provides a solid foundation for any website. It includes Reboot, which is based on Normalize.css and aids with the smoothing out of browser disparities for various page elements. Bootstrap also has fantastic typography. Checkboxes, radio buttons, choose choices, and other basic HTML form elements have been restyled to give them a more modern look.Bootstrap's scope extends b
£44.09
Taylor & Francis Ltd Raspberry Pi OS System Administration with
Book SynopsisThe second in a new series exploring the basics of Raspberry Pi Operating System administration, this installment builds on the insights provided in Volume 1 to provide a compendium of easy-to-use and essential Raspberry Pi OS system administration for the novice user, with specific focus on Python and Python3.The overriding idea behind system administration of a modern, 21st-century Linux system such as the Raspberry Pi OS is the use of systemd to ensure that the Linux kernel works efficiently and effectively to provide these three foundation stones of computer operation and management: computer system concurrency, virtualization, and secure persistence. Exercises are included throughout to reinforce the readers' learning goals with solutions and example code provided on the accompanying GitHub site.This book is aimed at students and practitioners looking to maximize their use of the Raspberry Pi OS. With plenty of practical examples, projects, and exercises, this volTable of ContentsSeries Preface. Volume 2 Preface. 0. "Quick Start" into Sysadmin for the Raspberry Pi OS. 1. Raspberry Pi OS System Administration Fundamentals. 2. Python3. Questions, Problems, and Projects. Index.
£42.74
Taylor & Francis Ltd Tiny Android Projects Using Kotlin
Book SynopsisIn today's fast-paced world, Android development is a rapidly evolving field that requires regular updates to keep up with the latest trends and technologies. Tiny Android Projects Using Kotlin is an excellent resource for developers who want to learn to build Android applications using the latest tools and frameworks.KEY FEATURES Teaches building Android apps using Kotlin, XML, and Jetpack Compose Includes saving data on the device using the Room database library Teaches communication between an Android device and data on the internet using REST API Shows how to create different Android menu navigations using Jetpack Compose Introduces the most architectures used in Android Projects and implements MVVM With Kotlin being the most preferred language for Android development, this book provides a practical, hands-on approach to learning the language and building high-quality Android apps using Kotlin, XML, and Table of ContentsChapter 1 ◾ Introduction and Getting StartedChapter 2 ◾ Basic XML Widgets in AndroidChapter 3 ◾ More on Android XML Views: Project 2 – Quiz App: Part 1Chapter 4 ◾ Intents in Android: Project 2 – Quiz App – Part 2Chapter 5 ◾ Android Fragments and ViewPager2Chapter 6 ◾ Networking in Android Using RetrofitChapter 7 ◾ Google Firebase Services: Project 5 – Tour Guide AppChapter 8 ◾ Android MVVM Architecture: Project 5 – Tour Guide Part 2Chapter 9 ◾ Basic Jetpack Compose ElementsChapter 10 ◾ More on Compose ElementsChapter 11 ◾ Room Database with Jetpack ComposeChapter 12 ◾ Menus and Navigation in Jetpack ComposeAPPENDIX
£42.74
CRC Press Propaganda
Book SynopsisThe book is a modern primer on propagandaâaspects like disinformation, trolls, bots, information influence, psychological operations, information operations, and information warfare. Propaganda: From Disinformation and Influence to Operations and Information Warfare offers a contemporary model for thinking about the subject.The first two decades of the 21st century have brought qualitative and quantitative technological and societal changes, and the subject of information influence needs to be re-ordered. Now is the time.The book explains the origins of the meaning and phenomenon of propagandaâwhere it came from and how it has changed over the centuries. The book also covers modern methods, including artificial intelligence (AI) and advertising technologies. Legal, political, diplomatic, and military considerations ensure that the material is covered in depth.The book is recommended for security and cybersecurity professionals (both technical and non-tech
£42.74
O'Reilly Media Learning Modern Linux
Book SynopsisIf you use Linux in development or operations and need a structured approach to help you dive deeper, this book is for you. Author Michael Hausenblas also provides tips and tricks for improving your workflow with this open source operating system.
£42.39
O'Reilly Media Ansible Up and Running
Book SynopsisWith this updated third edition, you'll quickly learn how to be productive with Ansible whether you're a developer deploying code or a system administrator looking for a better automation solution.
£42.39
O'Reilly Linux Pocket Guide
Book Synopsis
£20.39
John Wiley & Sons Inc VCADCV VMware Certified Associate on vSphere
Book SynopsisUse this expert guide to prepare for the VCA-DCV exam VCA-DCV VMware Certified Associate on vSphere Study Guide: VCAD-510 is a comprehensive study guide for the VMware Certified Associate Data Center Virtualization exam. Hands-on examples, real-world scenarios, and expert review questions cover the full exam blueprint, and the companion website offers a suite of tools to help you prepare for the exam including practice exams, electronic flashcards, and a glossary of key terms. In addition, the website includes videos that demonstrate how to complete the more challenging tasks. Focused on practical skills, this study guide not only prepares you for the certification exam, but also for the duties expected of a VCA. The VMware Certified Associate-Data Center Virtualization certification targets those with limited virtualization and VMware data center technology experience, providing a springboard to the popular VMware Certified Professional-Data Center VirtualizaTable of ContentsIntroduction xv Assessment Test xxi Chapter 1 Intro to Virtualization 1 What Is Data Center Virtualization? 2 Virtualization Then and Now 3 Physical and Virtual Data Center Components 4 Physical Data Center Components 4 Virtual Data Center Components 5 Physical and Virtual Component Differences 7 Benefits of Using Virtualization 9 Online Tools 13 Summary 14 Exam Essentials 15 Review Questions 16 Chapter 2 VMware Solutions 21 Availability Challenges 22 VMware Availability Products and Technologies 23 Management Challenges 27 VMware Management Products and Technologies 27 Scalability Challenges 28 VMware Scalability Products and Technologies 29 Optimization Challenges 31 VMware Optimization Products and Technologies 32 Summary 36 Exam Essentials 37 Review Questions 39 Chapter 3 vSphere Core Components 43 Virtual Machines 44 What Is a Virtual Machine, Anyway? 44 What Can You Do with Virtual Machines? 45 ESXi Hypervisor 47 vCenter Server 47 vMotion 48 Distributed Resource Scheduler 49 Distributed Power Management 49 Storage vMotion 50 Storage DRS 50 Ftoc.indd 03/24/2015 Page xi vSphere Data Protection 51 High‐Availability Configuration 51 Fault Tolerance 52 vSphere Replication 52 Migration 53 High Availability 54 Host HA 55 Virtual Machine HA 56 Applications HA 57 Fault Tolerance 57 Clusters and Resource Pools 58 Clusters 58 Resource Pools 59 Other VMware Data Center Products 61 vCenter Operations Manager 61 vSphere Data Protection 62 Nsx 62 Virtual SAN 62 vCenter Site Recovery Manager 62 Summary 63 Exam Essentials 64 Review Questions 65 Chapter 4 Storage in a VMware Environment 71 Physical vs. Virtual Storage 72 What Is Shared Storage? 73 VMware Storage Types 75 Local Storage 75 Fibre Channel 76 iSCSI 77 Network File System 77 Virtual Machine File System 78 The VMFS vs. the NFS 78 Disk Provisioning 78 Thick Provisioning 79 Thin Provisioning 80 VMware Virtual Storage Technologies 82 Summary 83 Exam Essentials 84 Review Questions 86 Chapter 5 Networking in a VMware Environment 91 Differentiate Physical and Virtual Networking 92 Physical Switches 92 Ftoc.indd 03/24/2015 Page xii Virtual Switches 94 Differences Between Physical and Virtual Switches 97 Differentiate VMware Virtual Switch Technologies 97 Standard Virtual Switches 98 Distributed Virtual Switches 98 Identify VMware Virtual Switch Components 101 Standard Virtual Switch 101 Distributed Virtual Switch 102 Identify Common Virtual Switch Policies 103 Port Group Policies 103 Distributed Virtual Switch Policies 106 Identify Capabilities of Network I/O Control 108 Summary 113 Exam Essentials 113 Review Questions 115 Chapter 6 Business Challenges Meet VMware Solutions 119 Availability Challenges and Solutions 120 vMotion 121 Storage vMotion 121 Virtual Machine Snapshots 122 High Availability 123 Fault Tolerance 123 vSphere Replication 124 vSphere Data Protection 124 Site Recovery Manager 125 Management Challenges and Solutions 126 Virtual Machines/Physical‐to‐Virtual Conversions 126 vCenter Server 126 vCenter Configuration Manager 127 Optimization Challenges and Solutions 128 vCenter Operations Manager 128 Thin Provisioning 129 Distributed Switches with QoS 130 Distributed Power Management 130 Storage I/O Control 131 vFlash 131 VM Storage Profiles 131 Memory Ballooning 132 Transparent Page Sharing 132 Scalability Challenges and Solutions 133 Virtual Machines 133 Virtual Machine Templates 134 Distributed Resource Scheduler 135 Ftoc.indd 03/24/2015 Page xiii Storage DRS 135 vSphere Storage Appliance 136 Hot Add 136 Distributed Virtual Switches 136 The Differences between SMB and Enterprise Challenges and Solutions 137 Summary 138 Exam Essentials 139 Review Questions 140 Appendices 145 Appendix A Answers to Review Questions 147 Appendix B Online Resources 159 Index 165
£25.60
McGraw-Hill Companies Looseleaf for Survey of Operating Systems 7e
Book Synopsis
£174.60
Pearson Education Limited Modern Operating Systems Global Edition 4 Ed
Book SynopsisTable of Contents CHAPTER 1 "INTRODUCTION" CHAPTER 2 "PROCESSES AND THREADS" CHAPTER 3 "MEMORY MANAGEMENT" CHAPTER 4 "FILE SYSTEMS" CHAPTER 5 "INPUT/OUTPUT" CHAPTER 6 "DEADLOCKS" CHAPTER 7 "VIRTUALIZATION AND THE CLOUD" CHAPTER 8 "MULTIPLE PROCESSOR SYSTEMS" CHAPTER 9 "SECURITY" CHAPTER 10 "CASE STUDY 1: UNIX, LINUX, AND ANDROID" CHAPTER 11 "CASE STUDY 2: WINDOWS 8" CHAPTER 13 "OPERATING SYSTEM DESIGN" CHAPTER 14 READING LIST AND BIBLIOGRAPHY
£68.39
Cengage Learning, Inc Shelly Cashman Series MicrosoftÂWindows 10
Book SynopsisNo matter what your depth or range of experience, the practical, user-friendly Shelly Cashman Series MICROSOFT WINDOWS 10: COMPREHENSIVE can equip you with the complete skills and thorough knowledge you need to effectively navigate and fully utilize Microsoft Windows 10. Part of the acclaimed Shelly Cashman Series, this book offers a trademark, step-by-step, screen-by-screen approach that encourages you to expand your understanding of the Microsoft Windows 10 operating system through experimentation, exploration, and advanced planning. You'll find proven, hands-on features and accompanying online resources specifically designed to keep your attention and prepare you for future success in working with MS Office and Windows.Table of ContentsFront Matter. 1. Introduction to Windows 10. 2. Working with the Windows 10 Desktop. 3. File and Folder Management. 4. Personalizing Your Work Environment. 5. Advanced Personalization and Customization. 6. Advanced Searching Techniques. 7. Microsoft Edge. 8. Mastering Digital Media. 9. Understanding Security, Networking and Utilities. Index.
£180.27
APress Exploring the Raspberry Pi 2 with C
Book SynopsisYou have a Pi 2, but what exactly can you do with it? This book takes you on a tour of the Pi 2 hardware and all of the fantastic things that you can do to create innovative and useful projects with your Pi. Start with creating a workstation that does actual work, and move into installing a custom kernel, creating a clock, learning the ins and outs of the GPIO interface, and pick up some useful C++ skills along the way.Warren Gay, author of Mastering the Raspberry Pi, takes you through a set of experiments to show just what the Pi 2 is capable of and how you can use it to make your own fantastic creations.What You Will Learn: How to create an experimenter''s workstation for the Pi 2, complete with breadboard and even Arduino All the details of GPIO, including a custom command for working with it Useful projects like a general purpose clock and the PiSpy Quick intro to C++ for the Table of ContentsChapter 1: Introduction to Pi 2.- Chapter 2: Workstation.- Chapter 3: The Matrix.- Chapter 4: Installing a Kernel.- Chapter 5: GPIO gp Command.- Chapter 6: General Purpose Clock.- Chapter 7: Pulse Width Modulation.- Chapter 8: Physics of the GPIO Interface.- Chapter 9: PiSpy.- Chapter 10: Debouncing.- Chapter 11: Fast Track to C++.- Chapter 12: Multi-core Webserver.- Appendix A: GPIO Class, Part I.- Appendix B: GPIO Class, Part II.- Appendix C: GPIO Class, Part III.- Appendix D: MAX7219 Class.- Appendix E: Matrix Class.- Appendix F: MTop and Diskstat.- Appendix G: The Rest.
£35.99
APress Cybersecurity for Hospitals and Healthcare
Book SynopsisLearn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support equipment on which lives depend. News reports inform us how hackers strike hospitals with ransomware that prevents staff from accessing patient records or scheduling appointments. Unfortunately, medical equipment also can be hacked and shut down remotely as a form of extortion. Criminal hackers will not ask for a $500 payment to unlock an MRI, PET or CT scan, or X-ray machinethey will ask for much more. Litigation is bound to follow and the resulting punitive awards will drive up hospital insurance costs and healthcare costs in general. This will undoubtedly result in increased regulations for hospitals and higher costs for compliance. Unless hosTable of ContentsChapter 1: Hacker Reconnaissance of a Hospital Network .- Chapter 2: How Hackers Gain Access to a Hospital Network .- Chapter 3: Active Medical Device Cyber-Attacks.- Chapter 4: Medical Facility Cyber-Physical Attacks.- Chapter 5: Hospital Insider Threat.- Chapter 6: Detection of Cyber-Attacks.- Chapter 7: Preventing Cyber-Attacks.- Chapter 8: Cyber-Attack Response and Recovery Planning.- Chapter 9: Appendix. Cyber-Attack Response Procedures Template.-
£51.99
Apress Professional Sitecore 8 Development
Book SynopsisTable of ContentsChapter 1: Getting Started.- Chapter 2: Building Your First Component.- Chapter 3: Data Templates and Content.- Chapter 4: Back-End Dev Architectures.- Chapter 5: Improving the Design with Patterns.- Chapter 6: Front-End Dev Techniques.- Chapter 7: Unit Testing Sitecore.- Chapter 8: Search-Driven Solutions.- Chapter 9: Programming the Customer Journey.- Chapter 10: PowerShell Extensions for Sitecore.- Chapter 11: Extending the Experience Editor.-
£49.49
APress Practical NATS
Book SynopsisLearn to use NATS and messaging as a solution for communication between services. The NATS project has been around since 2010, but it has become more popular in recent years due to how well it fits into the paradigm of cloud native applications and microservices architectures. It''s fast becoming a very attractive option thanks to its great performance characteristics--a single server can push millions of messages per second--and overall simple design. First you will learn the fundamentals of NATS, such as its design, protocol and the styles of communications it enables, internals of the NATS clients, and how to use the basic API provided by all the official clients. You will also understand how to setup and configure NATS servers using the configuration file. Next you''ll work with real-world projects and see how to develop a production-ready cloud native application using NATS as the control plane over which clients communicate. Finally you''ll learn Table of Contents1. Introduction to NATS2. The NATS Protocol3. The NATS Clients4. Setting up NATS5. High Availability with NATS Clustering6. Developing a Cloud Native NATS Application7. Monitoring NATS8. Securing NATS9. Troubleshooting NATS10. Advanced NATS Techniques
£49.49
APress Patterns in the Machine
Book SynopsisDiscover how to apply software engineering patterns to develop more robust firmware faster than traditional embedded development approaches. In the authors'' experience, traditional embedded software projects tend towards monolithic applications that are optimized for their target hardware platforms. This leads to software that is fragile in terms of extensibility and difficult to test without fully integrated software and hardware. Patterns in the Machine focuses on creating loosely coupled implementations that embrace both change and testability.This book illustrates how implementing continuous integration, automated unit testing, platform-independent code, and other best practices that are not typically implemented in the embedded systems world is not just feasible but also practical for today''s embedded projects.After reading this book, you will have a better idea of how to structure your embedded software projects. You will recognize that while writing unit tests, creating simulators, and implementing continuous integration requires time and effort up front, you will be amply rewarded at the end of the project in terms of quality, adaptability, and maintainability of your code. What You Will Learn Incorporate automated unit testing into an embedded project Design and build functional simulators for an embedded project Write production-quality software when hardware is not available Use the Data Model architectural pattern to create a highly decoupled design and implementation Understand the importance of defining the software architecture before implementation starts and how to do it Discover why documentation is essential for an embedded project Use finite state machines in embedded projects Who This Book Is ForMid-level or higher embedded systems (firmware) developers, technical leads, software architects, and development managers.Table of Contents1: Introduction2: Core Concepts3: Design Theory For Embedded Programming4: Persistent Storage Example5: Software Architecture6: Automated Unit Testing7: Functional Simulator8: Continuous Integration9: Data Model10: Finite State Machines11: Documentation12: File Organization and Naming13: More About Late Bindings14: Main and Initialization15: More Best Practices16: Example Code17: Rules For DevelopmentAppendix A: TerminologyAppendix B: UML Cheat SheetAppendix C: Notation for State MachinesAppendix D: Coding ConventionsAppendix E: Why C++
£35.99
APress Salt Open
Book SynopsisThere is a rapid growth of automation in server rooms and data centers. The days of having many administrators running around busily configuring and maintaining servers are gone and have been replaced with droves of Salt-Minions; agents beavering away on the target nodes ensuring the configuration is as specified. This book covers Salt Open (also known as SaltStack Open) from the ground up and shows you how to work with two Linux distributions. You'll see how Salt Open is duplicated with ArubaOS and IOS networking devices, which can be configured without the underlying OS. As you step through the configuration options, you'll learn how to run remote execution modules from the CLI before looking at stateful configuration using SLS files. Moving on, you'll learn how to configure the systems where you also need to monitor your devices and that is when reactors and beacons come into play. Creating beacons to alert the server when thresholds are exceeded, you will be able to create reactoTable of ContentsChapter 1: Understanding Salt and Configuration AutomationChapter Goal: Learn about Salt Open and its' commercial sibling, SaltConfig, from VMwareNo of pages 8Sub - Topics-Salt Open and the SaltProjectSaltConfig and VMwareSpeed, the Salt advantageSpeed, the Salt advantageChapter 2: Installing Salt Chapter Goal: In this chapter we will outline the labs systems used throughout the book and optional networking equipment before moving onto installing the Salt-Master Salt-Minions and providing basic tests No of pages: 12 Sub - Topics 1. Identity Lab setup 2. Install latest version of Salt Master and Minions 3. Configuring Master and Minions 4. Configuring Times Services 5. Signing Keys 6. Implementing basic tests 7. Implement firewalling on the Salt Master Chapter 3: Installing Additional Minions Chapter Goal: We have just one server and a Minion on the same server. We will now expand this to include additional Linux distribution and learn more about Salt authentication No of pages : 8 Sub - Topics: 1. Authenticating with Minion public keys and key management 2. Automating key signing 3. Locating the Salt Master 4. Automating the Minion ID Chapter 4: Targeting Minions Chapter Goal: Learn how we can target tasks to the required Minions in Salt Open No of pages: 12 Sub - Topics: 1. Salt Targeting 2. Understanding grains and using them as targets 3. Targeting using regular expressions and IP notation 4. Creating Node groups and using them as targets Chapter 5: Working with Remote Execution Modules in Salt Open Chapter Goal: At the heart of Salt we have remote execution modules and we stale a look at the construction in Python and how we use them and find their documentation No of pages: 15Sub topics 1. Using Modules and Functions 2. Listing the salt module indices 3. Using salt and salt-call to execute modules 4. Locate command line help 5. The big three: packages, services, and files Chapter 6: Writing YAML Chapter Goal: Learn to write and understand YAML files. Configure your command line editor for YAML No of pages: 8 Sub - Topics: 1. YAML Ain't Markup Language 2. Using Online Parser to process YAML 3. Configuring the nano editor 4. Configuring the vim editor for YAML and SLS filesChapter 7: Writing Salt State Files Chapter Goal: Create repeatable configurations using SLS files No of pages: 15 Sub - Topics: 1. State vs Flow 2. Jinja and YAML Parsing 3. Creating Jinja2 templates 4. Installing packages with Salt states 5. Managing services with state files 6. Delivering files with salt states 7. Syntax checking state filesChapter 8: Building an effective state tree Chapter Goal: The top.sls file can be referenced as the inverted root of the state tree to include the required states for different systems No of pages: 8 Sub - Topics: 1. Creating the top file 2. Understanding state.sl, state.apply and state.highstate 3. Targeting in the top file Chapter 9: Creating Reusable State Files Chapter Goal: Learn to implement states that fit a variety of systems No of pages: 15 Sub - Topics: 1. Using variables and Jinja 2. Using grains 3. Configuring Salt Pillar 4. Using logic to remove reliance on external data 5. Speeding the process with map files 6. Accessing templated data Chapter 10: Implementing Reactors and Beacons Chapter Goal: The Salt Master maintain the high-speed message bus. Events are written to this bust and we can view the events to help understand and debug the salt system. Working with events we can configure the master to react to events using Reactors. This can move configuration management into the realms of orchestration. Taking this further we can configure beacons on Minions to send events to the bus when triggered by thresholds on the managed device No of pages: 18 Sub - Topics: 1. Reading and Identify events on the event bus 2. Configuring reactors on the Salt Master 3. Configuring Beacons on MinionsChapter 11: Using Salt-SSH Chapter Goal: Where a long running Minion service is not desirable we can use salt-ssh to deploy configuration No of pages: 8 Sub - Topics: 1. Salt-SSH 2. Deploy key based ssh authentication 3. Using Salt-SSH Chapter 12: Deploy Virtual Machines Using Salt-Cloud Chapter Goal: Using salt-cloud the single utility can be used to manage your virtual machine deployment irrespective of the cloud system used No of pages: 10 Sub - Topics: 1. Managing VMs with salt-cloud 2. Using salt-cloud with AWS 3. Configuring providers and profiles 4. Using map files 5. Managing systems Chapter 13: Scaling Configuration Management Using Salt-Syndic Chapter Goal: Implementing Salt-syndic you add additional masters to the system that report back to the Master or Masters. This can load balance your Minions or act to traverse a network link No of pages: 6 Sub - Topics: 1. Installing Salt Syndic 2. Configuring Syndic on minion 3. Configuring Minions to use Syndic Chapter 14: Automating Network Infrastructure with Salt Proxy Chapter Goal: Salt Proxy is used to connect to devices that don’t maintain a long running Minion such as network devices No of pages: 15 Sub - Topics: 1. Configuring Pillar Data for Proxy 2. Installing NAPALM modules 3. Configuring Proxy Systems 4. Enabling SSH on Cisco IOS 5. Configuring NTP services on Cisco Devices 6. Backing up Configuration on Cisco and Aruba systems 7. Restoring configurations 8. Using salt-sproxy as a Proxy Minion alternative
£42.49
APress Beginning Ethereum Smart Contracts Programming
Book SynopsisUse this book to write an Ethereum blockchain smart contract, test it, deploy it, and create a web application to interact with your smart contract. This new edition has been expanded and updated to cover web3.js APIs, additional Consensus Protocols, non-Fungible Tokens (NFTs), developing NFT tokens using ERC-721, and more! Beginning Ethereum Smart Contracts Programming, second edition is your fastest and most efficient means of getting started if you are unsure where to begin and how to connect to the Ethereum blockchain. The book begins with a foundational discussion of blockchain and the motivation behind it. From there, you will get up close and personal with the Ethereum blockchain, learning how to use an Ethereum client (geth) to create a private Ethereum blockchain to perform transactions such as sending Ethers to another account on another node. You will learn about smart contracts without haviTable of Contents---NEW Chapter---- Chapter 1 - Technologies Behind Blockchain Basic Cryptography Types of Cryptographic algorithms Symmetric Asymmetric Hashing Digital Signature Summary Chapter 2 - Understanding Blockchain ---NEW Section--- Consensus Protocols Proof of Stake (PoS) Proof of Elapsed Time Proof of Space ... ----------------- Chapter 3 - Implementing Your Own Blockchain using Python Chapter 4 - Connecting to the Ethereum Blockchain using Geth Chapter 5 - Creating Your Own Private Ethereum Test Networks Chapter 6 - Using the Crypto Wallet - MetaMask Chapter 7 - Getting Started with Solidity Smart Contracts Chapter 8 - Testing Smart Contracts using Ganache Chapter 9 - Building Decentralized Apps using the web3.js APIs Chapter 10 - Handling Smart Contract Events Chapter 11 - Project - Online Lottery Chapter 12 - Creating Tokens using ERC-20 ---revised using OpenZepplin’s contract--- ---NEW Chapters---- Chapter 13 - Creating Non-Fungible Tokens using ERC-721 What is a NFT? Storing Digital Assets using IPFS What is IPFS Uploading a file to IPFS Accessing a file from IPFS NFT and IPFS Creating the NFT Token Contract Deploying the contract Minting the NFT Token Contract Getting the Owner of the NFT Getting the Name and Symbol of NFT Finding the Balance of NFT for an Address Getting the Owner of the NFT Getting the TokenURI Transferring a NFT Transferring Ownership of the NFT Contract Chapter 14 – Introduction to DeFi What is Decentralized Finance Stablecoins Types of Stablecoins USDC DAI Services in DeFi Components in DeFi Applications of DeFi ------------------
£41.24
APress Practical Rust Projects
Book SynopsisGo beyond the basics and build complete applications using the Rust programming language, updated for Rust 2021 edition. The applications you''ll build over the course of this book include a high-performance web client, an embedded computer (for a robot, for example), a game, a serverless web app, and an application that incorporates AI and machine learning. Each chapter is organized in the following format: what the kind of should application look like; requirements and user stories of our example program; an introduction to the Rust libraries used; the actual implementation of the example program, including common pitfalls and their solutions; and a brief comparison of libraries for building each application, if there is no clear preference. Practical Rust Projects, Second Edition will open your eyes to how Rust can be put to practical, real-world use. After reading this book, you will be able to use Rust to build a varTable of Contents1. Welcome to the World of Rust2. Building a Command-Line Program3. Creating Graphical User Interfaces (GUIs)4. High-performance Web Frontend using WebAssembly5. Building REST APIs6. Going Serverless with Amazon AWS Rust SDK7. Building a Game8. Physical Computing in Rust9. Artificial Intelligence and Machine Learning10. What else can you do with Rust?---------------------------------------------------------1. Welcome to the World of Rust * Add a note on what's changed in the 2nd edition. * Add a note on Rust 20212. Building a Command-Line Program3. Creating Graphical User Interfaces (GUIs) * Upgrade to GTK 4?4. High-performance Web Frontend using WebAssembly5. Building REST APIs 6. 6. Going Serverless with Amazon AWS Rust SDK * Using the new AWS SDK for Rust and Rust runtime for AWS Lambda7. Building a Game * Use a different game engine because the one used in the 1st edition seized development8. Physical Computing in Rust * Maybe add a section on using WebAssembly on RPi9. Artificial Intelligence and Machine Learning * Maybe add a section on deep learning10. What else can you do with Rust? * Remove the web part that is included in 2nd edition
£46.74
APress Kafka Troubleshooting in Production
Book SynopsisThis book provides Kafka administrators, site reliability engineers, and DataOps and DevOps practitioners with a list of real production issues that can occur in Kafka clusters and how to solve them. The production issues covered are assembled into a comprehensive troubleshooting guide for those engineers who are responsible for the stability and performance of Kafka clusters in production, whether those clusters are deployed in the cloud or on-premises. This book teaches you how to detect and troubleshoot the issues, and eventually how to prevent them. Kafka stability is hard to achieve, especially in high throughput environments, and the purpose of this book is not only to make troubleshooting easier, but also to prevent production issues from occurring in the first place. The guidance in this book is drawn from the author's years of experience in helping clients and internal customers diagnose and resolve knotty production problems and stabilize their Kafka environments. The book Table of Contents
£26.99
APress Creative Prototyping with Generative AI
Book SynopsisReimagine different generative AI as useful creative prototyping tools that can be used to augment your own creative process and projects. Gain a deeper understanding of how generative AI can elevate your creative future. You will acquire a comprehensive understanding of how AI works, uncover tools that can enhance your AI interactions, learn how to extract maximum potential from AI-produced content, and experiment with methods for assessing, refining, and boosting the content to transform your creative projects. You'll also explore how creative professionals from varied disciplines are employing generative AI in their workflows to produce distinctive contributions to the world. Each chapter provides examples of how designers and other creative individuals can utilize these technological wonders, adopting various prototyping techniques to fast-track and optimize design processes and workflows. Creators from all disciplines can tap into the vast capabilities and benefits of generatiTable of Contents Rapid Prototyping with Generative AI1. Introduction: Your AI Best Friend2. AI as a Creative Muse3. Prototyping with AI4. Creative Tools and Processes5. AI Structures6. The Master of Mash-Up: Leveraging AI for Prototyping7. Uncanny by Nature8. Layering AI Generation9. The Art of the Prompt10. Five Dilemmas Using AI11. AI Curator for Hire
£35.99
APress Pro Bash
Book SynopsisLearn how to effectively utilize the Bash shell in your programming. This refreshed and expanded third edition has been updated to Bash 5.2, and many scripts have been rewritten to make them more idiomatically Bash, taking better advantage of features specific to Bash. It is easy to read, understand, and will teach you how to get to grips with Bash programming without drowning you in pages and pages of syntax. Using this book you will be able to use the shell efficiently, make scripts run faster using expansion and external commands, and understand how to overcome many common mistakes that cause scripts to fail. This book is perfect for all beginning Linux and Unix system administrators who want to be in full control of their systems, and really get to grips with Bash programming. The Bash shell is a complete programming language, not merely a glue to combine external Linux commands. By taking full advantage of Shell internals, Shell programs can perform as snappily as utilities wrTable of Contents1. Hello, World: Your First Shell Program.- 2. Input, Output and Throughput.- 3. Looping and Branching.- 4. Command-Line parsing and Expansion.- 5. Parameters and Variables.- 6. Shell Functions.- 7. String Manipulation.- 8. File Operations and Commands.- 9. Reserved Words and Built-in Commands.- 10. Writing Bug-Free Scripts and Debugging the Rest.- 11. Programming for the Command Line.- 12. Runtime Configuration.- 13. Data Processing.-14. Scripting the Screen.- 15. Entry Level Programming.
£42.49
APress Practical GraphQL
Book SynopsisMaster the query language that is revolutionizing how websites are developed and built. This book is a hands-on guide to GraphQL, and will teach you how to use this open source tool to develop and deploy applications quickly and with minimal fuss. Using a project-based approach, you'll learn how to use GraphQL from the ground up. You'll start with the basics, including set up and key details regarding queries and mutations, before moving on to more advanced topics and projects. Over the course of the book, you will gain a thorough understanding of the web development ecosystem from frontend to backend by building React applications using Prisma Apollo Client and MongoDB. After completing this book, you'll be equipped with the knowledge and skills needed to turbo charge your own enterprise projects.What You'll LearnUnderstand what GraphQL is and how to use itDistinguish between queries and mutations, and how to leverage themGaina greater knowledge of full-stack applications with ReaTable of Contents1.Getting Started. - 2. Queries.- 3. Mutations.- 4. Full Stack GraphQL.- 5 App with Prisma.- 6. Connecting with the Frontend.
£38.24
APress Modern TypeScript
Book SynopsisDive into the world of TypeScript, a popular superset of the JavaScript language that enhances the development experience with static typing. This book covers every aspect of TypeScript in a concise and easy-to-understand style, making it the ultimate resource for mastering TypeScript.Author Ben Beattie-Hood provides comprehensive coverage of TypeScript's features, such as structural typing, optionality and union types, computed and recursive types, and much more. Each chapter is packed with practical, real-world examples and insider tips drawn from his 20 years of experience as a trainer, ensuring you understand the most important concepts and learn how to avoid common pitfalls.Modern TypeScript will put you on the path to becoming a TypeScript expert, help you greatly reduce errors, and boost your delivery velocity. Whether you're building small projects or large-scale applications, this book will give you the skills and confidence to write cleaner, scalable, and more maintainable coTable of Contents
£28.04
APress How JavaScript Works
Book SynopsisJavaScript is a complicated language with a lot of misinformation surrounding how it works. This book provides a comprehensive introduction to JavaScript, from how it works at a technical level to how it is used to create websites and applications. Everything you need to know to start a career in JavaScript development is covered here. How JavaScript Worksbeginswith a practical introduction of the basics before moving into the technical underpinnings of JavaScript, detailing everything you need to know, including variables, memory storage, functions, classes, types, maps, sets and APIs.Once you've fully absorbed these key topics. author Jonathan Simpson will show you how to put them into practice, demonstrating how they are employed for modern web development. You'll learn how to use JavaScript with HTML and CSS to construct web pages and applications, how to change CSS with JavaScript, and how to utilize Fetch and asynchronous operations. Uponcompleting this book, you will have thTable of ContentsCh1 Introduction to JavaScript.- Ch2 Variables, Comments, and Logical Statements.- Ch3 Introduction to Objects, Arrays.- Ch4 Loops and Iterables.- Ch5 References, Values, and Memory Management.- Ch6 Functions and Classes.- Ch7 Types.- Ch8 Manipulating and Interacting with HTML.- Ch9 Maps and Sets.- Ch10 Fetching Data, APIs and Promises.- Ch11 Errors and the Console.- Ch12 Maps and Sets.- Ch13 Websockets.- Conclusion.- Appendix.
£28.04
O'Reilly Media Version Control with Git
Book SynopsisThrough a series of step-by-step tutorials, this practical guide quickly takes you from Git fundamentals to advanced techniques, and provides friendly yet rigorous advice for navigating Git's many functions. You'll learn how to work with everything from small to very large projects with speed and efficiency.
£42.39
Taylor & Francis Inc Graph Polynomials
Book SynopsisThis book covers both theoretical and practical results for graph polynomials. Graph polynomials have been developed for measuring combinatorial graph invariants and for characterizing graphs. Various problems in pure and applied graph theory or discrete mathematics can be treated and solved efficiently by using graph polynomials. Graph polynomials have been proven useful areas such as discrete mathematics, engineering, information sciences, mathematical chemistry and related disciplines.Table of ContentsThe Alliance Polynomial of a Graph. Aspects of the Interlace Polynomial of a Graph. The clique-transversal set problem in clawfree graphs with degree at most 4. Permanental Polynomials of Graphs. Tutte polynomial and its generalizations. Graphs characterized by various polynomials. Recurrence relations of graph polynomials. Independence polynomials of k-tree related graphs. Generatingfunctionology for Graph Polynomials. Symmetric representations and the connection with linear recurrences. From the Ising and Potts model to the general graph homomorphism polynomial.
£147.25