Found 668 books
An Introduction to Cloud Databases

Cloud deployments have not only changed the way companies run mission critical databases; they've also transformed the roles of many people in production. With this practical report, database and system administrators, IT managers, and DevOps engineers will learn the ins and outs of running databases in the cloud. You'll explore the types of databases available, the difference between st

What Is eBPF?

In just the past few years, the extended Berkeley Packet Filter (eBPF) has gone from relative obscurity to one of the hottest technology areas in modern infrastructure computing. With this report, Liz Rice dives into eBPF and explains how this framework enables networking, security, and observability tooling for modern compute environments. SREs, ops engineers, and engineering team leads

Creating a Data-Driven Enterprise in Media

The data-driven revolution is finally hitting the media and entertainment industry. For decades, broadcast television and print media relied on traditional delivery channels for solvency and growth, but those channels fragmented as cable, streaming, and digital devices stole the show. In this ebook, you'll learn about the trends, challenges, and opportunities facing players in this indus

Machine Learning at Enterprise Scale

Enterprises in traditional and emerging industries alike are increasingly turning to machine learning (ML) to maximize the value of their business data. But many of these teams are likely to experience significant hurdles and setbacks throughout the journey. In this practical ebook, data scientists and machine learning engineers explore six common challenges that teams face every day whe

Internet of Things For Dummies, 2nd Edition

The Internet of Things (IoT) is creating a new world - a quantifiable and measurable world - in which people can better manage their lives, cities can better manage their infrastructure, and companies can better manage their businesses. This new smart connected world will offer fundamental changes to consumers and to society, and it will profoundly transform entire industries. The rise o

RF Filter Technology For Dummies, 2nd Edition

The implementation of 5G and wireless applications is accelerating worldwide, along with the drive to deliver high data rates and high data capacity. This creates new challenges for wireless technology in many radio frequency (RF) device applications, because these trends increase the probability of interference. To mitigate that interference, RF filter technology is a must. Bulk acousti

Information Theory for Data Science

Information theory deals with mathematical laws that govern the flow, representation and transmission of information, just as the field of physics concerns laws that govern the behavior of the physical universe. The foundation was made in the context of communication while characterizing the fundamental limits of communication and offering codes (sometimes called algorithms) to achieve t

High Performance Privacy Preserving AI

Artificial intelligence (AI) depends on data. In sensitive domains - such as healthcare, security, finance, and many more - there is therefore tension between unleashing the power of AI and maintaining the confidentiality and security of the relevant data. This book - intended for researchers in academia and R&D engineers in industry - explains how advances in three areas - AI, privacy-p

Web Application Firewalls

Firewalls have traditionally focused on network traffic, but with the advent of cloud computing and DevOps, security and operations professionals need a more sophisticated solution to track session state and application layer activity. In this ebook, cyber security consultant Chad Russell covers the current application threat landscape for modern deployment architectures, and explains th

Kubernetes Security

Kubernetes has fundamentally changed the way DevOps teams create, manage, and operate container-based applications, but as with any production process, you can never provide enough security. This practical ebook walks you through Kubernetes security features - including when to use what - and shows you how to augment those features with container image best practices and secure network c