Found 36 books
Cloud Design Patterns

Cloud applications have a unique set of characteristics. They run on commodity hardware, provide services to untrusted users, and deal with unpredictable workloads. These factors impose a range of problems that you, as a designer or developer, need to resolve. Your applications must be resilient so that they can recover from failures, secure to protect services from malicious attacks, an

SLO Adoption and Usage in Site Reliability Engineering

To realize the full benefits of SRE, organizations need well-thoughtout reliability targets known as service level objectives (SLOs) that are measured by service level indicators (SLIs), a quantitative measure of an aspect of the service. As detailed in the following section, the measurable goals set forth in an organization's SLOs eliminate the conflicts inherent in change management an

97 Things Every SRE Should Know

Site reliability engineering (SRE) is more relevant than ever. Knowing how to keep systems reliable has become a critical skill. With this practical book, newcomers and old hats alike will explore a broad range of conversations happening in SRE. You'll get actionable advice on several topics, including how to adopt SRE, why SLOs matter, when you need to upgrade your incident response, an

Aria Automation For Dummies

In today's rapidly evolving digital landscape, staying ahead requires organizations to embark on infrastructure modernization initiatives. However, this effort is not without challenges. Managing diverse technologies, overcoming human resistance to change, and ensuring profitability can pose demanding obstacles for any successful IT strategy. Organizations also need to adjust their busin

Configuration Manager Field Experience

Part of a series of specialized guides on System Center - this book shares real-world expertise for using Configuration Manager capabilities to deliver more effective IT services. Series editor Mitch Tulloch and a team of System Center experts provide concise technical guidance as they step you through key deployment and management scenarios. The purpose of this book is to provide System

Java 3D Programming

Java 3D Programming steps programmers through the important design and implementation phases of developing a successful Java 3D application. The book provides invaluable guidance on whether to use Java 3D, user interface design, geometry creation, scene manipulation and final optimizations. The book does not attempt to exhaustively cover the API or replicate the official documentation bu

The Security Development Lifecycle (SDL)

Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs - the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team guide you through each stage of the SDL

Haskell: The Craft of Functional Programming, 3rd Edition

This book offers a comprehensive introduction to functional programming using Haskell, a powerful and modern functional language. It covers core concepts, practical applications, and advanced techniques, emphasizing clarity, correctness, and real-world relevance. The 3rd edition of one of the leading textbooks for beginning functional programmers is thoroughly revised throughout. Revisio

Building Real-World Cloud Apps with Windows Azure

This book walks you through a patterns-based approach to building real-world cloud solutions. The patterns apply to the development process as well as to architecture and coding practices. Developers who are curious about developing for the cloud, considering a move to the cloud, or are new to cloud development will find here a concise overview of the most important concepts and practice

Managing Risk and Information Security, 2nd Edition

Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author's experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience. Managing Risk and Information Security provides tho