AI Books


JavaScript: The First 20 Years

JavaScript

How a sidekick scripting language for Java, created at Netscape in a ten-day hack, ships first as a de facto Web standard and eventually becomes the world's most widely used programming language. This paper tells the story of the creation, design, evolution, and standardization of the JavaScript language over the period of 1995-2015. But the story

Cyber Security Awareness For Dummies

Over the past decade, the cyber security landscape has changed dramatically. According to Cybersecurity Ventures, by 2021, the global cost of cybercrime is expected to reach $6 trillion, making it more profitable than the entire global illegal drugs trade. Organisations of every size and in every industry have become potential targets for cybercrim

Resilient Web Design

Jeremy Keith begins by noting that the title Resilient Web Design might suggest a handbook for building robust websites, but clarifies that it is not a handbook - it is more like a history book. The text observes that in the world of web design, attention is mostly focused on the present. When designers look beyond the moment, it is usually to imag

What Is eBPF?

SRE Linux

In just the past few years, the extended Berkeley Packet Filter (eBPF) has gone from relative obscurity to one of the hottest technology areas in modern infrastructure computing. With this report, Liz Rice dives into eBPF and explains how this framework enables networking, security, and observability tooling for modern compute environments. SREs, o

RF Filter Technology For Dummies, 2nd Edition

The implementation of 5G and wireless applications is accelerating worldwide, along with the drive to deliver high data rates and high data capacity. This creates new challenges for wireless technology in many radio frequency (RF) device applications, because these trends increase the probability of interference. To mitigate that interference, RF f

Web Application Firewalls

Firewalls have traditionally focused on network traffic, but with the advent of cloud computing and DevOps, security and operations professionals need a more sophisticated solution to track session state and application layer activity. In this ebook, cyber security consultant Chad Russell covers the current application threat landscape for modern d

Microservices: Reference Architecture

Nginx Microservices

The move to microservices is described as a seismic shift in web application development and delivery. The authors at NGINX explain that, because they believe this shift is crucial to their customers' success, they have launched a dedicated program to develop NGINX software features and development practices in support of microservices. They also r

Microservices: From Design to Deployment

Microservices

Microservices are currently getting a lot of attention: articles, blogs, discussions on social media, and conference presentations. They are rapidly heading towards the peak of inflated expectations on the Gartner Hype cycle At the same time, there are skeptics in the software community who dismiss microservices as nothing new. Naysayers claim that

Experiment with the Sense HAT, 2nd Edition

Raspberry Pi IoT

Space exploration is fascinating and inspiring for children and adults alike. With the tiny Raspberry Pi computer helping to change the world little by little, it was only a matter of time before it went into space to help out there as well. The Raspberry Pi Sense HAT aids two Raspberry Pi computers on board the International Space Station in their

Intel Trusted Execution Technology for Server Platforms

Intel

Intel Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as w