Found 645 books
SQL Server Source Control Basics

Few software developers would build an application without using source control, but its adoption for databases has been slower. Yet without source control to maintain the scripts necessary to create our database objects, load lookup data, and take other actions, we cannot guarantee a reliable and repeatable database deployment process, let alone coordinate database upgrades with changes

Applied AI for Enterprise Java Development

As a Java enterprise developer or architect, you know that embracing AI isn't just optional - it's critical to keeping your competitive edge. The question is, how can you skillfully incorporate these groundbreaking AI technologies into your applications without getting mired in complexity? Enter this clear-cut, no-nonsense guide to integrating generative AI into your Java enterprise ecos

Making Sense of Stream Processing

How can event streams help make your application more scalable, reliable, and maintainable? In this report, O'Reilly author Martin Kleppmann shows you how stream processing can make your data storage and processing systems more flexible and less complex. Structuring data as a stream of events isn't new, but with the advent of open source projects such as Apache Kafka and Apache Samza, st

NGINX Cookbook, Part 2

This is the 2nd of three installments of NGINX Cookbook. This book is about NGINX the web server, reverse proxy, load balancer, and HTTP cache. This installment focuses on security aspects and features of NGINX and NGINX Plus, the licensed version of the NGINX server. Throughout this installment the reader will learn the basics of controlling access and limiting abuse and misuse of their

Blueprints

Blueprints is a concise yet comprehensive coverage of Object-Oriented Analysis and Design concepts, suitable for a second programming course in Computer Science. It introduces and teaches application development in a command-line environment, and assumes basic expertise with the Java programming language.

Introducing Istio Service Mesh for Microservices, 2nd Edition

Microservices fundamentally change the way you design enterprise software. By adding network dependencies to your application logic, you invite in a host of potential hazards that grow proportionally with the number of connections you make. With the updated edition of this practical ebook, application architects and development team leads will learn how to use the Istio service mesh to c

Leading Biotech Data Teams

With hundreds of startups founded each year, the relatively new field of data-focused biotech - or TechBio - is growing rapidly. But without enough experienced practitioners to go around, most organizations hire data scientists with minimal biotech experience and lab scientists who've taken a crash course in data science. This arrangement is problematic. The way lab scientists and data s

VMware Backup For Dummies, 2nd Edition

Server virtualization is one of the most disruptive innovations of the past twenty years. It is a foundational technology in cloud computing and has been widely deployed by businesses of all sizes in both on-premises data centers and in the public cloud. Today, virtual machines (VMs) host practically any workload from mission-critical enterprise applications to dev/test environments supp

Hybrid Cloud Backup For Dummies

Every modern technology-driven organization understands data is one of its most valuable assets. It's no surprise, then, that the protection of that data has become an increasing concern. This concern is made much more complex, though, because organizations no longer store all their data in a single location. With the advent of modern cloud - virtualized, on-premises, hybrid, full cloud,

Practical Cryptography for Developers

A modern practical book about cryptography for developers with code examples, covering core concepts like: hashes (like SHA-3 and BLAKE2), MAC codes (like HMAC and GMAC), key derivation functions (like Scrypt, Argon2), key agreement protocols (like DHKE, ECDH), symmetric ciphers (like AES and ChaCha20, cipher block modes, authenticated encryption, AEAD, AES-GCM, ChaCha20-Poly1305), asymm