.jpg.7633371fa53fa19028f71f2e3a72fc4e.jpg)
Everything posted by Jessica Brown
-
The Datacenter as a Computer - An Introduction to the Design of Warehouse-scale Machines
The Datacenter as a Computer /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } The Datacenter as a Computer An Introduction to the Design of Warehouse-scale Machines by Luiz André Barroso, Urs Ho lzle Publisher Morgan & Claypool Published Date 2009 Page Count 107 Categories Computers / Computer Architecture, Computers / Hardware / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 159829556X As computation continues to move into the cloud, the computing platform of interest no longer resembles a pizza box or a refrigerator, but a warehouse full of computers. These new large datacenters are quite different from traditional hosting facilities of earlier times and cannot be viewed simply as a collection of co-located servers. Large portions of the hardware and software resources in these facilities must work in concert to efficiently deliver good levels of Internet service performance, something that can only be achieved by a holistic approach to their design and deployment. In other words, we must treat the datacenter itself as one massive warehouse-scale computer (WSe. We describe the architecture of WSCs, the main factors influencing their design, operation, and cost structure, and the characteristics of their software base. We hope it will be useful to architects and programmers of today's WSCs, as well as those of future many-core platforms which may one day implement the equivalent of today's WSCs on a single board. Table of Contents: Introduction / Workloads and Software Infrastructure / Hardware Building Blocks / Datacenter Basics / Energy and Power Efficiency / Modeling Costs / Dealing with Failures and Repairs / Closing Remarks More Information
-
Social Edge Computing - Empowering Human-Centric Edge Computing, Learning and Intelligence
Social Edge Computing /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Social Edge Computing Empowering Human-Centric Edge Computing, Learning and Intelligence by Dong Wang, Daniel 'Yue' Zhang Publisher Springer Nature Published Date 2023-06-22 Page Count 172 Categories Computers / General, Computers / Artificial Intelligence / General, Technology & Engineering / Electrical Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 3031269365 The rise of the Internet of Things (IoT) and Artificial Intelligence (AI) leads to the emergence of edge computing systems that push the training and deployment of AI models to the edge of networks for reduced bandwidth cost, improved responsiveness, and better privacy protection, allowing for the ubiquitous AI that can happen anywhere and anytime. Motivated by the above trend, this book introduces a new computing paradigm, the Social Edge Computing (SEC), that empowers human-centric edge intelligent applications by revolutionizing the computing, intelligence, and the training of the AI models at the edge. The SEC paradigm introduces a set of critical human-centric challenges such as the rational nature of edge device owners, pronounced heterogeneity of the edge devices, real-time AI at the edge, human and AI interaction, and the privacy of the edge users. The book addresses these challenges by presenting a series of principled models and systems that enable the confluence of the computing capabilities of devices and the domain knowledge of the people, while explicitly addressing the unique concerns and constraints from humans. Compared to existing books in the field of edge computing, the vision of this book is unique: we focus on the social edge computing (SEC), an emerging paradigm at the intersection of edge computing, AI, and social computing. This book discusses the unique vision, challenges and applications in SEC. To our knowledge, keeping humans in the loop of edge intelligence has not been systematically reviewed and studied in an existing book. The SEC vision generalizes the current machine-to-machine interactions in edge computing (e.g., mobile edge computing literature), and machine-to-AI interactions (e.g., edge intelligence literature) into a holistic human-machine-AI ecosystem. More Information
-
OpenStack Swift - Using, Administering, and Developing for Swift Object Storage
OpenStack Swift /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } OpenStack Swift Using, Administering, and Developing for Swift Object Storage by Joe Arnold Publisher "O'Reilly Media, Inc." Published Date 2014-10-16 Page Count 338 Categories Computers / System Administration / Storage & Retrieval, Computers / Distributed Systems / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1491903872 Get up and running with OpenStack Swift, the free, open source solution for deploying high-performance object storage clusters at scale. In this practical guide, Joe Arnold, co-founder and CEO of SwiftStack, brings you up-to-speed on the basic concepts of object storage and walks you through what you need to know to plan, build, operate, and measure the performance of your own Swift storage system. Object storage is essential today with the growth of web, mobile, and software-as-a-service (SaaS) applications. This book helps you through the process, with separate sections on application development, installation, administration, and troubleshooting. Learn Swift’s concepts for organizing, distributing, and serving dataExplore basic and advanced features of the Swift RESTful APIDelve into Swift’s many client libraries, including useful Python featuresWrite middleware to customize and simplify your storage systemUnderstand requirements for planning a Swift deployment—including your specific use caseLearn options for coaxing the best performance from your clusterGet best practices for daily operations, such as monitoring and planning capacity additionsPick up techniques for testing and benchmarking your Swift cluster More Information
-
Scaling Python with Ray
Scaling Python with Ray /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Scaling Python with Ray by Holden Karau, Boris Lublinsky Publisher "O'Reilly Media, Inc." Published Date 2022-11-29 Page Count 268 Categories Computers / Data Science / General, Computers / Data Science / Data Analytics, Computers / Languages / Python, Computers / Distributed Systems / Cloud Computing Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1098118774 Serverless computing enables developers to concentrate solely on their applications rather than worry about where they've been deployed. With the Ray general-purpose serverless implementation in Python, programmers and data scientists can hide servers, implement stateful applications, support direct communication between tasks, and access hardware accelerators. In this book, experienced software architecture practitioners Holden Karau and Boris Lublinsky show you how to scale existing Python applications and pipelines, allowing you to stay in the Python ecosystem while reducing single points of failure and manual scheduling. Scaling Python with Ray is ideal for software architects and developers eager to explore successful case studies and learn more about decision and measurement effectiveness. If your data processing or server application has grown beyond what a single computer can handle, this book is for you. You'll explore distributed processing (the pure Python implementation of serverless) and learn how to: Implement stateful applications with Ray actorsBuild workflow management in RayUse Ray as a unified system for batch and stream processingApply advanced data processing with RayBuild microservices with RayImplement reliable Ray applications More Information
-
Azure Security
Azure Security /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Azure Security by Bojan Magusic Publisher Simon and Schuster Published Date 2024-01-09 Page Count 336 Categories Computers / Programming / Macintosh, Computers / Programming / Microsoft, Computers / Security / General, Computers / Distributed Systems / Cloud Computing Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1633438813 Secure your Azure applications the right way. The expert DevSecOps techniques you'll learn in this essential handbook make it easy to keep your data safe. As a Program Manager at Microsoft, Bojan Magusic has helped numerous Fortune 500 companies improve their security posture in Azure. Now, in Azure Security he brings his experience from the cyber security frontline to ensure your Azure cloud-based systems are safe and secure. In Azure Security you’ll learn vital security skills, including how to: Set up secure access through Conditional Access policiesImplement Azure WAF on Application Gateway and Front Door Deploy Azure Firewall Premium for monitoring network activities Enable Microsoft Defender for Cloud to assess workload configurations Utilize Microsoft Sentinel for threat detection and analytics Establish Azure Policy for compliance with business rules Correctly set up out-of-the-box Azure services to protect your web apps against both common and sophisticated threats, learn to continuously assess your systems for vulnerabilities, and discover cutting-edge operations for security hygiene, monitoring, and DevSecOps. Each stage is made clear and easy to follow with step-by-step instructions, complemented by helpful screenshots and diagrams. Purchase of the print book includes a free eBook in PDF and ePub formats from Manning Publications. About the technology Securing cloud-hosted applications requires a mix of tools, techniques, and platform-specific services. The Azure platform provides built-in security tools to keep your systems safe, but proper implementation requires a foundational strategy and tactical guidance. About the book Azure Security details best practices for configuring and deploying Azure’s native security services—from a zero-trust foundation to defense in depth (DiD). Learn from a Microsoft security insider how to establish a DevSecOps program using Microsoft Defender for Cloud. Realistic scenarios and hands-on examples help demystify tricky security concepts, while clever exercises help reinforce what you’ve learned. What's inside Set up secure access policies Implement a Web Application Firewall Deploy MS Sentinel for monitoring and threat detection Establish compliance with business rules About the reader For software and security engineers building and securing Azure applications. About the author Bojan Magusic is a Product Manager with Microsoft on the Security Customer Experience Engineering Team. Table of Contents PART 1 FIRST STEPS 1 About Azure security 2 Securing identities in Azure: The four pillars of identity and Azure Active Directory PART 2 SECURING AZURE RESOURCES 3 Implementing network security in Azure: Firewall, WAF, and DDoS protection 4 Securing compute resources in Azure: Azure Bastion, Kubernetes, and Azure App Service 5 Securing data in Azure Storage accounts: Azure Key Vault 6 Implementing good security hygiene: Microsoft Defender for Cloud and Defender CSPM 7 Security monitoring for Azure resources: Microsoft Defender for Cloud plans PART 3 GOING FURTHER 8 Security operations and response: Microsoft Sentinel 9 Audit and log data: Azure Monitor 10 Importance of governance: Azure Policy and Azure Blueprints 11 DevSecOps: Microsoft Defender for DevOps More Information
-
Robust Cloud Integration with Azure
Robust Cloud Integration with Azure /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Robust Cloud Integration with Azure by Mahindra Morar, Abhishek Kumar, Gyanendra Kumar Gautam Publisher Packt Publishing, Limited Published Date 2017-03-22 Page Count 696 Categories Computers / Distributed Systems / General, Computers / Internet / Web Services & APIs, Computers / System Administration / General, Computers / Distributed Systems / Cloud Computing Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1786465574 Unleash the power of serverless integration with AzureAbout This Book* Build and support highly available and scalable API Apps by learning powerful Azure-based cloud integration* Deploy and deliver applications that integrate seamlessly in the cloud and quickly adapt as per your integration needs* Deploy hybrid applications that work and integrate on the cloud (using Logic Apps and BizTalk Server)Who This Book Is ForThis book is for Microsoft Enterprise developers, DevOps, and IT professionals who would like to use Azure App Service and Microsoft Cloud Integration technologies to create cloud-based web and mobile apps.What You Will Learn* Explore new models of robust cloud integration in Microsoft Azure* Create your own connector and learn how to publish and manage it* Build reliable, scalable, and secure business workflows using Azure Logic Apps* Simplify SaaS connectivity with Azure using Logic Apps* Connect your on-premises system to Azure securely* Get to know more about Logic Apps and how to connect to on-premises "line-of-business" applications using Microsoft BizTalk ServerIn DetailMicrosoft is focusing heavily on Enterprise connectivity so that developers can build scalable web and mobile apps and services in the cloud. In short, Enterprise connectivity from anywhere and to any device. These integration services are being offered through powerful Azure-based services.This book will teach you how to design and implement cloud integration using Microsoft Azure. It starts by showing you how to build, deploy, and secure the API app. Next, it introduces you to Logic Apps and helps you quickly start building your integration applications. We'll then go through the different connectors available for Logic Apps to build your automated business process workflow.Further on, you will see how to create a complex workflow in Logic Apps using Azure Function. You will then add a SaaS application to your existing cloud applications and create Queues and Topics in Service Bus on Azure using Azure Portal. Towards the end, we'll explore event hubs and IoT hubs, and you'll get to know more about how to tool and monitor the business workflow in Logic Apps.Using this book, you will be able to support your apps that connect to data anywhere--be it in the cloud or on-premises.Style and approachThis practical hands-on tutorial shows you the full capability of App Service and other Azure-based integration services to build scalable and highly available web and mobile apps. It helps you successfully build and support your applications in the cloud or on-premises successfully. We'll debunk the popular myth that switching to cloud is risky--it's not! More Information
-
Practical Big Data Analytics - Hands-on Techniques to Implement Enterprise Analytics and Machine Learning Using Hadoop, Spark, NoSQL and R
Practical Big Data Analytics /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Practical Big Data Analytics Hands-on Techniques to Implement Enterprise Analytics and Machine Learning Using Hadoop, Spark, NoSQL and R by Nataraj Dasgupta Publisher Packt Publishing Published Date 2018 Page Count 412 Categories Computers / Computer Architecture, Computers / Data Science / General, Computers / Database Administration & Management, Computers / Data Science / Data Analytics, Computers / Networking / General, Computers / Distributed Systems / General, Computers / Data Science / Data Modeling & Design, Computers / Distributed Systems / Cloud Computing, Computers / Data Science / Machine Learning Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1783554398 Get command of your organizational Big Data using the power of data science and analytics Key Features A perfect companion to boost your Big Data storing, processing, analyzing skills to help you take informed business decisionsWork with the best tools such as Apache Hadoop, R, Python, and Spark for NoSQL platforms to perform massive online analysesGet expert tips on statistical inference, machine learning, mathematical modeling, and data visualization for Big DataBook Description Big Data analytics relates to the strategies used by organizations to collect, organize, and analyze large amounts of data to uncover valuable business insights that cannot be analyzed through traditional systems. Crafting an enterprise-scale cost-efficient Big Data and machine learning solution to uncover insights and value from your organization's data is a challenge. Today, with hundreds of new Big Data systems, machine learning packages, and BI tools, selecting the right combination of technologies is an even greater challenge. This book will help you do that. With the help of this guide, you will be able to bridge the gap between the theoretical world of technology and the practical reality of building corporate Big Data and data science platforms. You will get hands-on exposure to Hadoop and Spark, build machine learning dashboards using R and R Shiny, create web-based apps using NoSQL databases such as MongoDB, and even learn how to write R code for neural networks. By the end of the book, you will have a very clear and concrete understanding of what Big Data analytics means, how it drives revenues for organizations, and how you can develop your own Big Data analytics solution using the different tools and methods articulated in this book. What you will learn Get a 360-degree view of the world of Big Data, data science, and machine learningGo through a broad range of technical and business Big Data analytics topics that caters to the interests of technical experts as well as corporate IT executivesGet hands-on experience with industry-standard Big Data and machine learning tools such as Hadoop, Spark, MongoDB, kdb+, and RCreate production-grade machine learning BI dashboards using R and R Shiny with step-by-step instructionsLearn how to combine open-source Big Data, machine learning, an BI tools to create low-cost business analytics applicationsUnderstand corporate strategies for successful Big Data and data science projectsGo beyond general-purpose analytics to develop cutting-edge Big Data applications using emerging technologiesWho this book is for: The book is intended for existing and aspiring Big Data professionals who wish to become the go-to person in their organization when it comes to Big Data architecture, analytics, and governance. While no prior knowledge of Big Data or related technologies is assumed, it will be helpful to have some programming experience. More Information
-
Cybercrime and Cloud Forensics - Applications for Investigation Processes
Cybercrime and Cloud Forensics /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Cybercrime and Cloud Forensics Applications for Investigation Processes by Keyun Ruan Publisher Information Science Reference Published Date 2013 Page Count 378 Categories Computers / Internet / Web Services & APIs, Law / Criminal Law / General, Law / Forensic Science, Law / Computer & Internet, Social Science / Criminology, True Crime / Cybercrime Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1466626623 While cloud computing continues to transform developments in information technology services, these advancements have contributed to a rise in cyber attacks; producing an urgent need to extend the applications of investigation processes. Cybercrime and Cloud Forensics: Applications for Investigation Processes presents a collection of research and case studies of applications for investigation processes in cloud computing environments. This reference source brings together the perspectives of cloud customers, security architects, and law enforcement agencies in the developing area of cloud forensics. More Information
-
The Chrome Book (Third Edition) - The Essential Guide to Cloud Computing with Google Chrome and the Chromebook
The Chrome Book (Third Edition) /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } The Chrome Book (Third Edition) The Essential Guide to Cloud Computing with Google Chrome and the Chromebook by C. Rome Publisher CreateSpace Independent Publishing Platform Published Date 2013-03 Page Count 148 Categories Computers / Internet / Web Browsers Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1482616610 Note that while this edition is good value, a newer fourth edition is now detailed at www.thechromebook.info Welcome to the brave new world of cloud computing, a slightly different world where all of your apps and data files are stored on the world wide web and can be accessed from any internet-connected device at any time from anywhere (but only by you and those you trust). Welcome to the world of the Chromebook, where you interact with your computer pretty much as you always did (using a proper keyboard and web browser) before tablets came along to make you do things differently. Welcome to the much expanded third edition of The Chrome Book: the Essential Guide to Cloud Computing with Google Chrome and the Chromebook, the book that covers these topics: 1 - The Case for Cloud Computing with Chrome 2 - The Chromebook Computers 3 - Opening and Operating the Chromebook 4 - Google Drive 5 - Google Docs 6 - Gmail, Contacts and Calendar 7 - Google Apps (in brief) 8 - Web Apps and the Chrome Web Store 9 - The Chrome Web Browser 10 - Your Google Account 11 - Cloud Computing Conundrums 12 - Cloud Computing Case Study 13 - My (and Your) Head in The Clouds If you're thinking of joining the cloud computing revolution, if you're thinking of purchasing a Chromebook computer or you just bought one, get the most out of cloud computing with Google Chrome and the Chromebook by reading the third edition of "The Chrome Book". This edition is bang up-to-date at the time of the Chromebook Pixel launch, and there is a companion web site at http://chrome.lotontech.com More Information
-
Hadoop MapReduce Cookbook
Hadoop MapReduce Cookbook /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Hadoop MapReduce Cookbook by Srinath Perera, Thilina Gunarathne Publisher Packt Pub. Published Date 2013 Page Count 300 Categories Computers / Database Administration & Management, Computers / Data Science / Data Analytics, Computers / System Administration / Storage & Retrieval, Computers / Distributed Systems / General, Computers / Programming / Open Source, Computers / Distributed Systems / Client-Server Computing, Mathematics / Probability & Statistics / Multivariate Analysis Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1849517282 Individual self-contained code recipes. Solve specific problems using individual recipes, or work through the book to develop your capabilities. If you are a big data enthusiast and striving to use Hadoop to solve your problems, this book is for you. Aimed at Java programmers with some knowledge of Hadoop MapReduce, this is also a comprehensive reference for developers and system admins who want to get up to speed using Hadoop. More Information
-
To the Cloud - Big Data in a Turbulent World
To the Cloud /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } To the Cloud Big Data in a Turbulent World by Vincent Mosco Publisher Paradigm Publishers Published Date 2014 Page Count 273 Categories Computers / Distributed Systems / General, Computers / Internet / General, Computers / Internet / Online Safety & Privacy, Computers / Social Aspects, Political Science / General, Social Science / Sociology / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1612056156 In the wake of revelations about National Security Agency activities-many of which occur "in the cloud"-this book offers both enlightenment and a critical view. Cloud computing and big data are arguably the most significant forces in information technology today. In clear prose, To the Cloud explores where the cloud originated, what it means, and how important it is for business, government, and citizens. It describes the intense competition among cloud companies like Amazon and Google, the spread of the cloud to government agencies like the controversial NSA, and the astounding growth of entire cloud cities in China. From advertising to trade shows, the cloud and big data are furiously marketed to the world, even as dark clouds loom over environmental, privacy, and employment issues that arise from the cloud. Is the cloud the long-promised information utility that will solve many of the world's economic and social problems? Or is it just marketing hype? To the Cloud provides the first thorough analysis of the potential and the problems of a technology that may very well disrupt the world. More Information
-
Linux and UNIX Security Portable Reference
Linux and UNIX Security Portable Reference /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Linux and UNIX Security Portable Reference by Nitesh Dhanjani Publisher McGraw-Hill/Osborne Published Date 2003 Page Count 198 Categories Computers / Networking / General, Computers / Security / Network Security, Computers / Operating Systems / UNIX, Computers / Operating Systems / Linux, Computers / Security / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0072227869 Ideal for busy Linux and UNIX administrators and programmers who have either not had time to read the entire "Hacking Exposed, " or who would like a consolidated reference with "just the facts." This "Cliff's Notes"-style reference is suited to the security-conscious IT professional concerned with increased reliance on Internet information exchange. More Information
-
Linux Clustering - Building and Maintaining Linux Clusters
Linux Clustering /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Linux Clustering Building and Maintaining Linux Clusters by Charles Bookman Publisher New Riders Published Date 2003 Page Count 265 Categories Computers / General, Computers / Networking / General, Computers / Operating Systems / General, Computers / Operating Systems / UNIX, Computers / Operating Systems / Linux Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1578702747 Linux Clustering: Building and Maintaining Linux Clusters provides Linux users with information about building their own Linux cluster from the ground up. It gives best practices, helpful hints, and guidelines about building one server or hundreds of servers at a level that administrators at any experience level can understand. From installation of the air conditioning and power in the data center, to alternative file systems to the final production run, this book provides you with everything that you need to know. Linux Clustering: Building and Maintaining Linux Clusters walks you through the initial design and selection of the best possible types of clusters, as well as covering monitoring tools and providing for disaster recovery. Not only does this book provide information on parallel and Beowulf type clusters, Charles Bookman goes into depth on high availability clusters, load balancing, and provides advice for writing your own distributing applications as well. Incorporating best practices and cutting-edge approaches, Bookman provides step-by-step and tried-and-true methods of bringing up a Linux cluster to production level. More Information
-
Linux Phrasebook
Linux Phrasebook /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Linux Phrasebook by Scott Granneman Publisher Addison-Wesley Published Date 2016 Page Count 496 Categories Computers / Operating Systems / Linux, Computers / Software Development & Engineering / Quality Assurance & Testing Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0321833880 Get more done faster at the Linux command line! This best-selling Linux Phrasebook has been thoroughly updated in the second edition to reflect the newest distributions, incorporate feedback from hundreds of active Linux users, and cover today's newest tools and techniques -- including an entirely new chapter on text file manipulation. Linux Phrasebook, Second Edition offers a concise, handy reference to the Linux commands that, like a language phrasebook, can be used on the spot on moment's notice. Don't waste a minute on non-essentials: this straight-to-the-point reference delivers specific information and tested commands designed to work with any modern Linux distribution. Portable enough to take anywhere, it starts with a quick introduction to essential command line concepts, and then delivers all the modern Linux command examples, variations, and parameters you need to: View, manipulate, archive, and compress files Control file ownership and permissions Find anything on your systems Efficiently use the Linux shell Monitor system resources Install software Test, fix, and work with networks Linux Phrasebook, Second Edition is the perfect quick command line reference for millions of Linux users and administrators at all levels of experience: people who want to get reliable information they can use right now -- with no distractions and no diversions! Contents at a Glance Part I: Getting Started Chapter 1 Things to Know About Your Command Line Everything Is a File Maximum Filename Lengths Names Are Case-Sensitive Special Characters to Avoid in Names Wildcards and What They Mean Special Files That Affect Your Command Line If There's Too Much Stuff on Screen, Reset Chapter 2 Navigating Your File System List Files and Folders List the Contents of Other Folders List Folder Contents Using Wildcards View a List of Files in Subfolders View a List of Contents in a Single Column View Contents As a Comma-Separated List View Hidden Files and Folders Visually Display a File's Type Display Contents in Color List Permissions, Ownership, and More Reverse the Order Contents Are Listed Sort Contents by Date and Time Sort Contents by Size Express File Sizes in Terms of K, M, and G Display the Path of Your Current Directory Change to a Different Directory Change to Your Home Directory Change to Your Previous Directory Chapter 3 Creation and Destruction Change a File to the Current Time Change a File to Any Desired Time Create a New, Empty File Create a New Directory Create a New Directory and Any Necessary Subdirectories Copy Files Copy Files Using Wildcards Copy Files Verbosely Stop Yourself from Copying over Important Files Copy Directories Copy Files As Perfect Backups in Another Directory Move Files and Folders Rename Files and Folders Understand How Linux Stores Files Create a Link Pointing to Another File or Directory Delete Files Remove Several Files at Once with Wildcards Prevent Yourself from Deleting Key Files Delete an Empty Directory Remove Files and Directories That Aren't Empty Deleting Troublesome Files Chapter 4 Learning About Commands Find Out About Commands with man Quickly Find Out What a Command Does Based on Its Name Search for a Command Based on What It Does Read a Command's Specific Man Page Learn About Commands with info Navigate Within info Locate the Paths for a Command's Executable, Source Files, and Man Pages Find Out Which Version of a Command Will Run Discover How a Command Will Be Interpreted Chapter 5 Building Blocks Run Several Commands Sequentially Run Commands Only If the Previous Ones Succeed Run a Command Only If the Previous One Fails Plug the Output of a Command into Another Command Understand Input/Output Streams Use the Output of One Command As Input for Another Redirect a Command's Output to a File Prevent Overwriting Files When Using Redirection Append a Command's Output to a File Use a File As Input for a Command Combine Input and Output Redirection Send Output to a File and to stdout at the Same Time Part II: Working with Files Chapter 6 Viewing (Mostly Text) Files Figure Out a File's Type View Files on stdout Concatenate Files to stdout Concatenate Files to Another File Concatenate Files and Number the Lines View Text Files a Screen at a Time Search Within Your Pager Edit Files Viewed with a Pager View the First 10 Lines of a File View the First 10 Lines of Several Files View the First Several Lines of a File or Files View the First Several Bytes, Kilobytes, or Megabytes of a File View the Last 10 Lines of a File View the Last 10 Lines of Several Files View the Last Several Lines of a File or Files View the Constantly Updated Last Lines of a File or Files Chapter 7 Manipulating Text Files with Filters Count the Number of Words, Lines, and Characters in a File Number Lines in a File Select an Entire Column of Data in a Delimited File Sort the Contents of a File Sort the Contents of a File Numerically Remove Duplicate Lines in a File Substitute Selected Characters with Others Replace Repeated Characters with a Single Instance Delete Matching Characters Transform Text in a File Print Specific Fields in a File Chapter 8 Ownerships and Permissions Become Another User Become Another User, with His Environment Variables Become root Become root, with Its Environment Variables Change the Group Owning Files and Directories Recursively Change the Group Owning a Directory Change the Owner of Files and Directories Change the Owner and Group of Files and Directories Understand the Basics of Permissions Change Permissions on Files and Directories Using Alphabetic Notation Change Permissions on Files and Directories Using Numeric Permissions Change Permissions Recursively Set and Then Clear suid Set and Then Clear sgid Set and Then Clear the Sticky Bit Chapter 9 Archiving and Compression Archive and Compress Files Using zip Get the Best Compression Possible with zip Archive and Compress Files of a Specified Type in Directories and Subdirectories Password-Protect Compressed Zip Archives Unzip Files Test Files That Will Be Unzipped Archive and Compress Files Using gzip Archive and Compress Files Recursively Using gzip Uncompress Files Compressed with gzip Test Files That Will Be Unzipped with gunzip Archive and Compress Files Using bzip2 Uncompress Files Compressed with bzip2 Test Files That Will Be Unzipped with bunzip2 Archive Files with tar Archive and Compress Files with tar and gzip Test Files That Will Be Untarred and Uncompressed Untar and Uncompress Files Part III: Finding Files, Words, and More Chapter 10 Finding Files, Directories, Words, and Phrases Search a Database of Filenames Search a Database of Filenames Without Worrying About Case Update the Database Used by locate Searching Inside Text Files for Patterns The Basics of Searching Inside Text Files for Patterns Search Recursively for Text in Files Search for Words and Highlight the Results Search for Text in Files, Ignoring Case Search for Whole Words in Files Show Line Numbers Where Words Appear in Files Search the Output of Other Commands for Specific Words See Context for Words Appearing in Files Show Lines Where Words Do Not Appear in Files List Files Containing Searched-for Words List the Number of Occurrences of Words in Files Search for Words Inside Search Results Chapter 11 The find Command Find Files by Name Find Files by Ownership Find Files by File Size Find Files by File Type Find Files by Time Show Results If the Expressions Are True (AND) Show Results If Either Expression Is True (OR) Show Results If the Expression Is Not True (NOT) Execute a Command on Found Files Execute a Command on Found Files More Efficiently Execute a Command on Found Files Containing Spaces Part IV: Your Environment Chapter 12 Your Shell View Your Command-Line History Run the Last Command Again Run a Previous Command Using Numbers Run a Previous Command Using a String Search for a Previous Command and Run It Display All Command Aliases View a Specific Command Alias Create a New Temporary Alias Create a New Permanent Alias Remove an Alias Create a New Temporary Function Create a New Permanent Function Display All Functions Remove a Function When to Use an Alias and When to Use a Function Chapter 13 Monitoring System Resources Discover How Long Your Computer Has Been Running View All Currently Running Processes View a Process Tree View Processes Owned by a Particular User End a Running Process View a Dynamically Updated List of Running Processes List Open Files List a User's Open Files List Users for a Particular File List Processes for a Particular Program Display Information About System RAM Show File System Disk Usage Report File Space Used by a Directory Report Just the Total Space Used for a Directory Chapter 14 Installing Software Install Software Packages (RPM) Remove Software Packages (RPM) Install Software Packages and Dependencies (RPM) Remove Software Packages and Dependencies (RPM) Upgrade Software Packages and Dependencies (RPM) Find Packages Available for Download (RPM) Install Software Packages (DEB) Remove Software Packages (DEB) Install Software Packages and Dependencies (DEB) Remove Software Packages and Dependencies (DEB) Upgrade Software Packages and Dependencies (DEB) Find Packages Available for Download (DEB) Clean Up Unneeded Installation Packages (DEB) Troubleshoot Problems with APT (DEB) Part V: Networking Chapter 15 Connectivity View the Status of Your Network Interfaces Verify That a Computer Is Running and Accepting Requests Trace the Route Packets Take Between Two Hosts Query DNS Records Configure a Network Interface View the Status of Your Wireless Network Interfaces Configure a Wireless Network Interface Grab a New Address Using DHCP Make a Network Connection Active Bring a Network Connection Down Display Your IP Routing Table Change Your IP Routing Table Troubleshooting Network Problems Chapter 16 Working on the Network Securely Log In to Another Compute Securely Log In to Another Machine Without a Password Securely Transfer Files Between Machines Securely Copy Files Between Hosts Securely Transfer and Back Up Files Download Files Non-interactively Download Websites Non-interactively Download Sequential Files and Internet Resources More Information
-
Introduction to Linux (Second Edition)
Introduction to Linux (Second Edition) /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Introduction to Linux (Second Edition) by Machtelt Garrels Publisher Fultus Corporation Published Date 2007 Page Count 300 Categories Computers / Operating Systems / Linux Language EN Average Rating 4.5 (based on 2 ratings) Maturity Rating No Mature Content Detected ISBN 1596821124 Whether you're just starting out with Linux or looking to hone your existing skills, this book will provide you with the knowledge you need. More Information
-
Beginning SUSE Linux
Beginning SUSE Linux /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Beginning SUSE Linux by Keir Thomas Publisher Apress Published Date 2006-11-08 Page Count 704 Categories Computers / Information Technology, Computers / Operating Systems / Linux, Computers / Software Development & Engineering / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1590596749 Written by award-winning author Keir Thomas, Beginning SUSE Linux, Second Edition is the comprehensive guide to openSUSE Linux 10.1, the community-created version of SUSE Linux. The book starts with an introduction to the world of Linux and the open source community, and this is followed by an illustrated step-by-step guide to openSUSE installation and hardware configuration. A special edition of openSUSE 10.1 is provided on the DVD-ROM that comes with the book. This version includes several additional items of proprietary software, as well as all the devel software packages, making for a comprehensive package. The book shows how to wield total control over your newly installed operating system. It will guide you through system customization opportunities and common tasks like listening to audio CDs and MP3s, watching movies, and performing office- and Internet-related tasks. A large part of the book is dedicated to advanced command-line techniques necessary to maintain your system and become a true Linux master! This second edition of the best-selling first edition has been boosted by 200 pages to over 700 in total, and has been completely revised and updated. Beginning SUSE Linux, Second Edition is the only print title to cover openSUSE 10.1. More Information
-
Mastering Bash
Mastering Bash /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Mastering Bash by Giorgio Zarrelli Publisher Packt Publishing Published Date 2017-06-21 Page Count 502 Categories Computers / Operating Systems / UNIX, Computers / Operating Systems / Linux, Computers / Languages / General, Computers / System Administration / Linux & UNIX Administration Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1784396877 Your one stop guide to making the most out of Bash programming About This Book - From roots to leaves, learn how to program in Bash and automate daily tasks, pouring some spice in your scripts - Daemonize a script and make a real service of it, ensuring it's available at any time to process user-fed data or commands - This book provides functional examples that show you practical applications of commands Who This Book Is For If you're a power user or system administrator involved in writing Bash scripts to automate tasks, then this book is for you. This book is also ideal for advanced users who are engaged in complex daily tasks. What You Will Learn - Understand Bash right from the basics and progress to an advanced level - Customise your environment and automate system routine tasks - Write structured scripts and create a command-line interface for your scripts - Understand arrays, menus, and functions - Securely execute remote commands using ssh - Write Nagios plugins to automate your infrastructure checks - Interact with web services, and a Slack notification script - Find out how to execute subshells and take advantage of parallelism - Explore inter-process communication and write your own daemon In Detail System administration is an everyday effort that involves a lot of tedious tasks, and devious pits. Knowing your environment is the key to unleashing the most powerful solution that will make your life easy as an administrator, and show you the path to new heights. Bash is your Swiss army knife to set up your working or home environment as you want, when you want. This book will enable you to customize your system step by step, making your own real, virtual, home out of it. The journey will take you swiftly through the basis of the shell programming in Bash to more interesting and challenging tasks. You will be introduced to one of the most famous open source monitoring systems-Nagios, and write complex programs with it in any languages. You'll see how to perform checks on your sites and applications. Moving on, you'll discover how to write your own daemons so you can create your services and take advantage of inter-process communication to let your scripts talk to each other. So, despite these being everyday tasks, you'll have a lot of fun on the way. By the end of the book, you will have gained advanced knowledge of Bash that will help you automate routine tasks and manage your systems. Style and approach This book presents step-by-step instructions and expert advice on working with Bash and writing scripts. Starting from the basics, this book serves as a reference manual where you can find handy solutions and advice to make your scripts flexible and powerful. More Information
-
Beginning the Linux Command Line
Beginning the Linux Command Line /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Beginning the Linux Command Line by Sander van Vugt Publisher Apress Published Date 2009-04-27 Page Count 392 Categories Computers / Software Development & Engineering / General, Computers / System Administration / Linux & UNIX Administration Language EN Average Rating 4 (based on 2 ratings) Maturity Rating No Mature Content Detected ISBN 1430218894 This book is for anyone who wants to master Linux from the command line. When writing it, I had in mind system administrators, software developers, and enthusiastic users who want to get things going from the Linux command line. For beginning users, this may be a daunting task, as Linux commands often have many options documented only in pages that are not that easy to understand. This book is distribution agnostic. That is, while writing it, I’ve checked all items against Ubuntu, Red Hat, and SUSE. Since most distributions are quite similar to one of these three, this book should help you with other distributions as well. There is only one item in the book that is not distribution agnostic: the Appendix, which explains how to install OpenSUSE. I’ve chosen to cover installation of just one distribution, because if you don’t have any Linux installed yet, you probably don’t care what you install. If you do care what distribution to work with, you probably have it installed already. More Information
-
Mastering Zabbix - Second Edition
Mastering Zabbix - Second Edition /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Mastering Zabbix - Second Edition by Andrea Dalle Vacche Publisher Packt Publishing Published Date 2015 Page Count 412 Categories BUSINESS & ECONOMICS / Management, BUSINESS & ECONOMICS / Management Science, BUSINESS & ECONOMICS / Industrial Management, BUSINESS & ECONOMICS / Organizational Behavior, Computers / Business & Productivity Software / General, Computers / Networking / General, Computers / System Administration / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1785289268 Learn how to monitor your large IT environments using Zabbix with this one-stop, comprehensive guide to the Zabbix worldAbout This Book* Create a tailor-made monitoring solution based on your specific needs* Learn advanced techniques of Zabbix to monitor networks, performances, and other critical features in large environments* Integrate, customize, and extend your monitoring solutions with external components and softwareWho This Book Is ForThis book is intended for system administrators and IT architects who need to better integrate their Zabbix installation with their surrounding environment. A basic, working knowledge of Zabbix and Linux is assumed so that the book can focus on how to use every component to its full advantage. It will also be helpful to be familiar with programming concepts and languages but if not, all the content in the book is thorough and well documented.What You Will Learn* Efficiently collect data from a large variety of monitoring objects* Organize your data in graphs, charts, maps, and slide shows* Build intelligent triggers and alarms to monitor your network proactively* Write your own custom probes and monitoring scripts to extend Zabbix* Configure Zabbix and its database to be high available and fault-tolerant* Automate repetitive procedures using Zabbix's API* Integrate Zabbix with external systems* Understand the protocol and how to interact with it by writing your own custom agentIn DetailNowadays monitoring systems play a crucial role in any IT environment. They are extensively used to not only measure your system's performance, but also to forecast capacity issues. This is where Zabbix, one of the most popular monitoring solutions for networks and applications, comes into the picture. With an efficient monitoring system in place you'll be able to foresee when your infrastructure runs under capacity and react accordingly. Due to the critical role a monitoring system plays, it is fundamental to implement it in the best way from its initial setup. This avoids misleading, confusing, or, even worse, false alarms which can disrupt an efficient and healthy IT department.This new edition will provide you with all the knowledge you need to make strategic and practical decisions about the Zabbix monitoring system. The setup you'll do with this book will fit your environment and monitoring needs like a glove. You will be guided through the initial steps of choosing the correct size and configuration for your system, to what to monitor and how to implement your own custom monitoring component. Exporting and integrating your data with other systems is also covered.By the end of this book, you will have a tailor-made and well configured monitoring system and will understand with absolute clarity how crucial it is to your IT environment.Style and approachThis book is an easy to follow, step-by-step guide to monitoring network and performance in large environments with Zabbix. It is designed for real-world Zabbix administrators, and is comprised of a perfect mix of theoretical explanations and practical applications, making it your perfect companion. More Information
-
Hadoop - The Definitive Guide
Hadoop /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Hadoop The Definitive Guide by Tom E. White Publisher "O'Reilly Media, Inc." Published Date 2015 Page Count 756 Categories COMPUTERS / System Administration / Storage & Retrieval Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1491901713 Get ready to unlock the power of your data. With the fourth edition of this comprehensive guide, you'll learn how to build and maintain reliable, scalable, distributed systems with Apache Hadoop. This book is ideal for programmers looking to analyze datasets of any size, and for administrators who want to set up and run Hadoop clusters. Using Hadoop 2 exclusively, author Tom White presents new chapters on YARN and several Hadoop-related projects such as Parquet, Flume, Crunch, and Spark. You'll learn about recent changes to Hadoop, and explore new case studies on Hadoop's role in healthcare systems and genomics data processing. Learn fundamental components such as MapReduce, HDFS, and YARNExplore MapReduce in depth, including steps for developing applications with itSet up and maintain a Hadoop cluster running HDFS and MapReduce on YARNLearn two data formats: Avro for data serialization and Parquet for nested dataUse data ingestion tools such as Flume (for streaming data) and Sqoop (for bulk data transfer)Understand how high-level data processing tools like Pig, Hive, Crunch, and Spark work with HadoopLearn the HBase distributed database and the ZooKeeper distributed configuration service. More Information
-
Cloud Computing and Big Data
Cloud Computing and Big Data /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Cloud Computing and Big Data by Charlie Catlett, Wolfgang Gentzsch, Lucio Grandinetti, Gerhard Robert Joubert, José Luis Vasquez-Poletti Publisher IOS Press Published Date 2013 Page Count 249 Categories COMPUTERS / Computer Literacy, Computers / Computer Science, Computers / Data Science / Data Analytics, COMPUTERS / Information Technology, Computers / Interactive & Multimedia, COMPUTERS / Machine Theory, COMPUTERS / Reference, Computers / Internet / General, COMPUTERS / Hardware / General, Computers / Distributed Systems / Cloud Computing Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1614993211 Cloud computing offers many advantages to researchers and engineers who need access to high performance computing facilities for solving particular compute-intensive and/or large-scale problems, but whose overall high performance computing (HPC) needs do not justify the acquisition and operation of dedicated HPC facilities. There are, however, a number of fundamental problems which must be addressed, such as the limitations imposed by accessibility, security and communication speed, before these advantages can be exploited to the full.This book presents 14 contributions selected from the International Research Workshop on Advanced High Performance Computing Systems, held in Cetraro, Italy, in June 2012. The papers are arranged in three chapters. Chapter 1 includes five papers on cloud infrastructures, while Chapter 2 discusses cloud applications. The third chapter in the book deals with big data, which is nothing new - large scientific organizations have been collecting large amounts of data for decades - but what is new is that the focus has now broadened to include sectors such as business analytics, financial analyses, Internet service providers, oil and gas, medicine, automotive and a host of others.This book will be of interest to all those whose work involves them with aspects of cloud computing and big data applications. More Information
-
Prey
Prey /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Prey by Michael Crichton Publisher Harper Collins Published Date 2003-11-11 Page Count 544 Categories Drama / American / General, Fiction / Action & Adventure, Fiction / Fantasy / Contemporary, Fiction / Fantasy / Romance, Fiction / Fantasy / Action & Adventure, Fiction / Horror, Fiction / Romance / General, Fiction / Science Fiction / Action & Adventure, Fiction / Science Fiction / Hard Science Fiction, Fiction / Thrillers / Suspense, Fiction / Thrillers / General, Fiction / Medical, Fiction / Thrillers / Technological, Fiction / Disaster Language EN Average Rating 3 (based on 1 ratings) Maturity Rating No Mature Content Detected ISBN 0061015725 In the Nevada desert, an experiment has gone horriblywrong. A cloud of nanoparticles -- micro-robots -- has escaped from the laboratory. This cloud is self-sustaining and self-reproducing. It is intelligent and learns from experience. For all practical purposes, it is alive. It has been programmed as a predator. It is evolvingswiftly, becoming more deadly with each passing hour. Every attempt to destroy it has failed. And we are the prey. More Information
-
Isabelle/HOL - A Proof Assistant for Higher-Order Logic
Isabelle/HOL /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Isabelle/HOL A Proof Assistant for Higher-Order Logic by Tobias Nipkow, Lawrence C. Paulson, Markus Wenzel Publisher Springer Published Date 2003-07-31 Page Count 226 Categories Mathematics / Logic, Philosophy / Logic, Computers / Computer Science, Computers / Artificial Intelligence / General, Computers / Programming / General, Computers / Languages / General, Mathematics / Discrete Mathematics, Computers / Information Technology Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 3540459499 This volume is a self-contained introduction to interactive proof in high- order logic (HOL), using the proof assistant Isabelle 2002. Compared with existing Isabelle documentation, it provides a direct route into higher-order logic, which most people prefer these days. It bypasses ?rst-order logic and minimizes discussion of meta-theory. It is written for potential users rather than for our colleagues in the research world. Another departure from previous documentation is that we describe Markus Wenzel’s proof script notation instead of ML tactic scripts. The l- ter make it easier to introduce new tactics on the ?y, but hardly anybody does that. Wenzel’s dedicated syntax is elegant, replacing for example eight simpli?cation tactics with a single method, namely simp, with associated - tions. The book has three parts. – The ?rst part, Elementary Techniques, shows how to model functional programs in higher-order logic. Early examples involve lists and the natural numbers. Most proofs are two steps long, consisting of induction on a chosen variable followed by the auto tactic. But even this elementary part covers such advanced topics as nested and mutual recursion. – The second part, Logic and Sets, presents a collection of lower-level tactics that you can use to apply rules selectively. It also describes I- belle/HOL’s treatment of sets, functions, and relations and explains how to de?ne sets inductively. One of the examples concerns the theory of model checking, and another is drawn from a classic textbook on formal languages. More Information
-
The Search for a Theory of Cognition - Early Mechanisms and New Ideas
The Search for a Theory of Cognition /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } The Search for a Theory of Cognition Early Mechanisms and New Ideas by Stefano Franchi, Francesco Bianchini Publisher Rodopi Published Date 2011 Page Count 408 Categories Computers / Artificial Intelligence / General, Philosophy / General, Science / Life Sciences / General, Science / Cognitive Science Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 9789401207157 The book brings into relief the variety of approaches and disciplines that have informed the quest for a theory of cognition. The center of interest are the historical, geographical, and theoretical peripheries of classic AI's mainstream research program. The twelve chapters bring back into focus the variety of strategies and theoretical questions that researchers explored while working toward a scientific theory of cognition and pre-cognition. The volume is organized in four parts, each one including three essays. The first one deals with cybernetics, the approach that may be considered as the most important periphery of classic AI research. The second part focuses on the geographical periphery of AI research. It examines how the theories and techniques developed on AI's home ground were translated into countries with different cultures and traditions: Italy, France, and the Soviet Union. The third part focuses on AI's periphery understood in the cultural and historical meaning of the term. It contains essays that locate some of the central concepts of AI, like representation and computability, within a broader philosophical (Descartes, Aristotle, Leibniz) and technical background (programming theory and practice). The fourth and final part of the volume is focused directly on the limitation of Turing's classic computability theory and its possible alternatives, some of which were studied in the early years of AI's research (e.g. Ashby's re-entrant information model), while others have been intensely studied in recent times (quantum automata). More Information
-
Algorithms for Fuzzy Clustering - Methods in c-Means Clustering with Applications
Algorithms for Fuzzy Clustering /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Algorithms for Fuzzy Clustering Methods in c-Means Clustering with Applications by Sadaaki Miyamoto, Hidetomo Ichihashi, Katsuhiro Honda Publisher Springer Published Date 2008-04-10 Page Count 247 Categories Computers / Programming / General, Technology & Engineering / Engineering (General), Computers / Artificial Intelligence / General, Computers / Information Technology, Mathematics / Applied Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 3540787372 Recently many researchers are working on cluster analysis as a main tool for exploratory data analysis and data mining. A notable feature is that specialists in di?erent ?elds of sciences are considering the tool of data clustering to be useful. A major reason is that clustering algorithms and software are ?exible in thesensethatdi?erentmathematicalframeworksareemployedinthealgorithms and a user can select a suitable method according to his application. Moreover clusteringalgorithmshavedi?erentoutputsrangingfromtheolddendrogramsof agglomerativeclustering to more recent self-organizingmaps. Thus, a researcher or user can choose an appropriate output suited to his purpose,which is another ?exibility of the methods of clustering. An old and still most popular method is the K-means which use K cluster centers. A group of data is gathered around a cluster center and thus forms a cluster. The main subject of this book is the fuzzy c-means proposed by Dunn and Bezdek and their variations including recent studies. A main reasonwhy we concentrate on fuzzy c-means is that most methodology and application studies infuzzy clusteringusefuzzy c-means,andfuzzy c-meansshouldbe consideredto beamajortechniqueofclusteringingeneral,regardlesswhetheroneisinterested in fuzzy methods or not. Moreover recent advances in clustering techniques are rapid and we requirea new textbook that includes recent algorithms.We should also note that several books have recently been published but the contents do not include some methods studied herein. More Information