Found 664 books
Rational Cybersecurity for Business

Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will know how to prioritize your security program, and motivate and retain your team. Misalign

How To Code in React.js

This open book is an introduction to React that works from the foundations upward. Each chapter takes you a little deeper into the React ecosystem, building on your previous knowledge. Along the way, you'll learn how to maintain internal state, pass information between parts of an application, and explore different options for styling your application. Whether you are completely new to R

Devops with OpenShift

For many organizations, a big part of DevOps' appeal is software automation using infrastructure-as-code techniques. This book presents developers, architects, and infra-ops engineers with a more practical option. You'll learn how a container-centric approach from OpenShift, Red Hat's cloud-based PaaS, can help your team deliver quality software through a self-service view of IT infrastr

OpenShift for Developers, 2nd Edition

Ready to build cloud native applications? Get a hands-on introduction to daily life as a developer crafting code on OpenShift, the open source container application platform from Red Hat. Creating and packaging your apps for deployment on modern distributed systems can be daunting. Too often, adding infrastructure value can complicate development. With this practical guide, you'll learn

The Official Raspberry Pi Camera Guide, 2nd Edition

Add the power of HDR photography, Full HD video, and AI image recognition to your Raspberry Pi projects with Camera Modules. Give intelligence and depth to your creations, making your projects smarter and more responsive. Plus, the new Al Kit supercharges your Raspberry Pi Camera Module with image recognition, enabling it to act and react to the world around it. This book is your step-by

Modern Java EE Design Patterns

With the ascent of DevOps, microservices, containers, and cloud-based development platforms, the gap between state-of-the-art solutions and the technology that enterprises typically support has greatly increased. But as Markus Eisele explains in this O'Reilly report, some enterprises are now looking to bridge that gap by building microservice-based architectures on top of Java EE. Can it

Cloud Management with App Controller

Microsoft System Center 2012 R2 App Controller is uniquely positioned as both an enabler and a self-service vehicle for connecting clouds and implementing the hybrid computing model. In Microsoft's cloud computing solutions, both System Center and Windows Azure play critical roles. System Center can be used to transform enterprise IT from a device-based infrastructure and deployment stra

Slow Electronics with Reservoir Computing

This open access book discusses "slow electronics", the study of devices processing signals with low frequencies. Computers have the remarkable ability to process data at high speeds, but they encounter difficulties when handling signals with low frequencies of less than ~100Hz. They unexpectedly require a substantial amount of energy. This poses a challenge for such as biomedical wearab

Web Application Firewalls

Firewalls have traditionally focused on network traffic, but with the advent of cloud computing and DevOps, security and operations professionals need a more sophisticated solution to track session state and application layer activity. In this ebook, cyber security consultant Chad Russell covers the current application threat landscape for modern deployment architectures, and explains th

Kubernetes Security

Kubernetes has fundamentally changed the way DevOps teams create, manage, and operate container-based applications, but as with any production process, you can never provide enough security. This practical ebook walks you through Kubernetes security features - including when to use what - and shows you how to augment those features with container image best practices and secure network c