Found 668 books
A Graduate Course in Applied Cryptography

Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making it relatively easy to incorporate strong

The Path to GitOps

GitOps delivers on the vision promised to a DevOps culture, and while the practice isn't new, organizations are starting to realize how valuable it is to deliver products in a fast, highly automated, and secure way - without compromising the quality of their code. This book outlines the tools, workflows, and structures that teams need to have in place to enable a complete GitOps workflow

Getting GitOps

Cloud environments such as Kubernetes and OpenShift benefit from processes different from the ones developers traditionally used for standalone applications. Automation becomes a necessity in large environments and fast-changing configurations of hosts. Getting GitOps is a practical guide through the jungle of modern development with Kubernetes, with a focus on application distribution v

Building a Virtualized Network Solution

Network Virtualization "provides virtual networks to virtual machines similar to how server virtualization provides virtual machines to the operating system. Network Virtualization decouples virtual networks from the physical network infrastructure and removes the constraints and limitations of VLANs and hierarchical IP address assignment from virtual machine provisioning. This flexibili

Data Protection for the Hybrid Cloud

If you are responsible for architecting and designing the backup strategy for your organization, especially if you're looking for ways to incorporate cloud backup into your business continuity scenarios, this book is for you. With the increasing trends in virtualization as well as the move to the pubic cloud, IT organizations are headed toward a world where data and applications run in o

Think Complexity, 2nd Edition

Complexity science uses computation to explore the physical and social sciences. In Think Complexity, you'll use graphs, cellular automata, and agent-based models to study topics in physics, biology, and economics. Whether you're an intermediate-level Python programmer or a student of computational modeling, you'll delve into examples of complex systems through a series of worked example

Think Java, 2nd Edition

Currently used at many colleges, universities, and high schools, this hands-on introduction to computer science is ideal for people with little or no programming experience. The goal of this concise book is not just to teach you Java, but to help you think like a computer scientist. You'll learn how to program - a useful skill by itself - but you'll also discover how to use programming a

Biopython: Tutorial and Cookbook

Biopython is a collection of freely available Python modules for computational molecular biology. Python is an object oriented, interpreted, flexible language that is widely used for scientific computing. Python is easy to learn, has a very clear syntax and can easily be extended with modules written in C, C++ or FORTRAN. Since its inception in 2000, Biopython has been continuously devel

Intermediate Statistics with R

Introductory statistics courses prepare students to think statistically but cover relatively few statistical methods. Building on the basic statistical thinking emphasized in an introductory course, a second course in statistics at the undergraduate level can explore a large number of statistical methods. This text covers more advanced graphical summaries, One-Way ANOVA with pair-wise co

Graph Algorithms

Learn how graph algorithms can help you leverage relationships within your data to develop intelligent solutions and enhance your machine learning models. With this practical guide, developers and data scientists will discover how graph analytics deliver value, whether they're used for building dynamic network models or forecasting real-world behavior. Mark Needham and Amy Hodler from Ne