Utvidet returrett til 31. januar 2025

Bøker utgitt av O'Reilly Media

Filter
Filter
Sorter etterSorter Populære
  • av Louis Rosenfeld
    553,-

    To guide you through this broad ecosystem, this popular guide provides essential concepts, methods, and techniques for digital design that have withstood the test of time. UX designers, product managers, developers, and anyone involved in digital design will learn how to create semantic structures that will help people engage with your message.

  • av Carin Meier
    351,-

    If youre an experienced programmer who has not worked with Clojure before, this guide is the perfect thorough but gentle introduction for you. Author Carin Meier not only provides a practical overview of this JVM language and its functional programming concepts, but also includes a complete hands-on training course to help you learn Clojure in a structured way.The first half of the book takes you through Clojures unique design and lets you try your hand at two Clojure projects, including a web app. The holistic course in second half provides you with critical tools and resources, including ways to plug into the Clojure community.Understand the basic structure of a Clojure expressionLearn how to shape and control code in a functional wayDiscover how Clojure handles real-world state and concurrencyTake advantage of Java classes and learn how Clojure handles polymorphismManage and use libraries in a Clojure projectUse the core.async library for asynchronous and concurrent communicationExplore the power of macros in Clojure programmingLearn how to think in Clojure by following the books seven-week training course

  • - Architecting in the Cloud with Azure Data Lake, HDInsight, and Spark
    av Zoiner Tejada
    388,-

    Microsoft Azure has over 20 platform-as-a-service (PaaS) offerings that can act in support of a big data analytics solution. So which one is right for your project? This practical book helps you understand the breadth of Azure services by organizing them into a reference framework you can use when crafting your own big data analytics solution.Youll not only be able to determine which service best fits the job, but also learn how to implement a complete solution that scales, provides human fault tolerance, and supports future needs.Understand the fundamental patterns of the data lake and lambda architectureRecognize the canonical steps in the analytics data pipeline and learn how to use Azure Data Factory to orchestrate themImplement data lakes and lambda architectures, using Azure Data Lake Store, Data Lake Analytics, HDInsight (including Spark), Stream Analytics, SQL Data Warehouse, and Event HubsUnderstand where Azure Machine Learning fits into your analytics pipelineGain experience using these services on real-world data that has real-world problems, with scenarios ranging from aviation to Internet of Things (IoT)

  • av Shelley Powers
    333,-

    Updated for the latest Node Long Term Support (LTS) and Node Current (6.0) releases, this hands-on edition helps you master Node's core fundamentals and gain experience with several built-in and contributed modules.

  • - Best Practices
    av Jonathan Leblanc & Tim Messerschmidt
    434,-

    Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who dont understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, youll learn how and why everyone working on a system needs to ensure that users and data are protected.Authors Jonathan LeBlanc and Tim Messerschmidt provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure interface for data and identitywithout compromising usability. Youll learn how to plug holes in existing systems, protect against viable attack vectors, and work in environments that sometimes are naturally insecure.Understand the state of web and application security todayDesign security password encryption, and combat password attack vectorsCreate digital fingerprints to identify users through browser, device, and paired device detectionBuild secure data transmission systems through OAuth and OpenID ConnectUse alternate methods of identification for a second factor of authenticationHarden your web applications against attackCreate a secure data transmission system using SSL/TLS, and synchronous and asynchronous cryptography

  • av Duncan Winn
    430,-

    This practical guide demonstrates how this open source, cloud-native application platform not only significantly reduces the develop-to-deploy cycle time, but also raises the value line for application operators by changing the way applications and supporting services are deployed and run.

  • - Patterns for Scalable Infrastructure and Applications in a Dynamic Environment
    av Justin Garrison & Kris Nóva
    349,-

    Cloud native infrastructure is more than servers, network, and storage in the cloudit is as much about operational hygiene as it is about elasticity and scalability. In this book, youll learn practices, patterns, and requirements for creating infrastructure that meets your needs, capable of managing the full life cycle of cloud native applications.Justin Garrison and Kris Nova reveal hard-earned lessons on architecting infrastructure from companies such as Google, Amazon, and Netflix. They draw inspiration from projects adopted by the Cloud Native Computing Foundation (CNCF), and provide examples of patterns seen in existing tools such as Kubernetes.With this book, you will:Understand why cloud native infrastructure is necessary to effectively run cloud native applicationsUse guidelines to decide whenand ifyour business should adopt cloud native practicesLearn patterns for deploying and managing infrastructure and applicationsDesign tests to prove that your infrastructure works as intended, even in a variety of edge casesLearn how to secure infrastructure with policy as code

  • - Solutions and Examples for bash Users
    av Carl Albing
    619,-

    This cookbook provides more than 300 practical recipes for using bash, the popular Unix shell that enables you to harness and customize the power of any Unix or Linux system. Ideal for new and experienced users alike-including proficient Windows users and sysadmins-this updated second edition helps you solve a wide range of problems.

  • - Help Any Team Build a Better Experience
    av Austin Govella
    486,-

    You can launch a new app or website in days by piecing together frameworks and hosting on AWS. Implementation is no longer the problem. But that speed to market just makes it tougher to confirm that your team is actually building the right product.Ideal for agile teams and lean organizations, this guide includes 11 practical tools to help you collaborate on strategy, user research, and UX. Hundreds of real-world tips help you facilitate productive meetings and create good collaboration habits. Designers, developers, and product owners will learn how to build better products much faster than before.Topics include:Foundations for collaboration and facilitation: Learn how to work better together with your team, stakeholders, and clientsProject strategy: Help teams align with shared goals and visionUser research and personas: Identify and understand your users and share that vision with the broader organizationJourney maps: Build better touchpoints that improve conversion and retentionInterfaces and prototypes: Rightsize sketches and wireframes so you can test and iterate quickly

  • av Mike Senese
    114,-

    Make: Volume 56 shows you how to make electricity using everyday mud, extract DNA with a 3D-printed centrifuge, and isolate fruit DNA in your cocktails. Plus learn about one group hacking medical devices for real time diabetes data and another that's trying to open source life-saving insulin.

  • - The What, Where, When, and How of Large-Scale Data Processing
    av Tyler Akidau, Slava Chernyak & Reuven Lax
    656,-

    Streaming data is a big deal in big data these days. As more and more businesses seek to tame the massive unbounded data sets that pervade our world, streaming systems have finally reached a level of maturity sufficient for mainstream adoption. With this practical guide, data engineers, data scientists, and developers will learn how to work with streaming data in a conceptual and platform-agnostic way.Expanded from Tyler Akidaus popular blog posts "e;Streaming 101"e; and "e;Streaming 102"e;, this book takes you from an introductory level to a nuanced understanding of the what, where, when, and how of processing real-time data streams. Youll also dive deep into watermarks and exactly-once processing with co-authors Slava Chernyak and Reuven Lax.Youll explore:How streaming and batch data processing patterns compareThe core principles and concepts behind robust out-of-order data processingHow watermarks track progress and completeness in infinite datasetsHow exactly-once data processing techniques ensure correctnessHow the concepts of streams and tables form the foundations of both batch and streaming data processingThe practical motivations behind a powerful persistent state mechanism, driven by a real-world exampleHow time-varying relations provide a link between stream processing and the world of SQL and relational algebra

  • - Fundamentals, Implementation, and Operation of Streaming Applications
    av Fabian Hueske & Vasiliki Kalavri
    859,-

    Get started with Apache Flink, the open source framework that powers some of the worlds largest stream processing applications. With this practical book, youll explore the fundamental concepts of parallel stream processing and discover how this technology differs from traditional batch data processing.Longtime Apache Flink committers Fabian Hueske and Vasia Kalavri show you how to implement scalable streaming applications with Flinks DataStream API and continuously run and maintain these applications in operational environments. Stream processing is ideal for many use cases, including low-latency ETL, streaming analytics, and real-time dashboards as well as fraud detection, anomaly detection, and alerting. You can process continuous data of any kind, including user interactions, financial transactions, and IoT data, as soon as you generate them.Learn concepts and challenges of distributed stateful stream processingExplore Flinks system architecture, including its event-time processing mode and fault-tolerance modelUnderstand the fundamentals and building blocks of the DataStream API, including its time-based and statefuloperatorsRead data from and write data to external systems with exactly-once consistencyDeploy and configure Flink clustersOperate continuously running streaming applications

  • - Coding and Making with the BBC's Open Development Board
    av Wolfram Donat
    174,-

    This book will teach you how to really harness the power of the micro:bit. You'll learn about sensors, Bluetooth communications, and embedded operating systems, and along the way you'll develop an understanding of the next big thing in computers: the Internet of Things.

  • - Bringing the Power of Native to the Browser
    av Tal Ater
    421,-

    Move over native apps. New progressive web apps have capabilities that will soon make you obsolete. With this hands-on guide, web developers and business execs will learn howand whyto develop web apps that take advantage of features that have so far been exclusive to native apps. Features that include fast load times, push notifications, offline access, homescreen shortcuts, and an entirely app-like experience.By leveraging the latest browser APIs, progressive web apps combine all of the benefits of native apps, while avoiding their issues. Throughout the book, author Tal Ater shows you how to improve a simple website for the fictional Gotham Imperial Hotel into a modern progressive web app. Plus:Understand how service workers work, and use them to create sites that launch in an instant, regardless of the users internet connectionCreate full-screen web apps that launch from the phone's homescreen just like native appsRe-engage users with push notifications, even days after they have left your siteEmbrace offline-first and build web apps that gracefully handle loss of connectivityExplore new UX opportunities and challenges presented by progressive web apps

  • - Patterns and Practices for Developing Maintainable Applications
    av Paul Bakker & Sander Mak
    351,-

    The upcoming Java 9 module system will affect existing applications and offer new ways of creating modular and maintainable applications. With this hands-on book, Java developers will learn not only about the joys of modularity, but also about the patterns needed to create truly modular and reliable applications. Authors Sander Mak and Paul Bakker teach you the concepts behind the Java 9 module system, along with the new tools it offers. Youll also learn how to modularize existing code and how to build new Java applications in a modular way.Understand Java 9 module system conceptsMaster the patterns and practices for building truly modular applicationsMigrate existing applications and libraries to Java 9 modulesUse JDK 9 tools for modular development and migration

  • - Defending Against Digital Extortion
    av Allan Liska & Timothy Gallo
    351,-

    The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, youll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network.Security experts Allan Liska and Timothy Gallo explain how the success of these attacks has spawned not only several variants of ransomware, but also a litany of ever-changing ways theyre delivered to targets. Youll learn pragmatic methods for responding quickly to a ransomware attack, as well as how to protect yourself from becoming infected in the first place.Learn how ransomware enters your system and encrypts your filesUnderstand why ransomware use has grown, especially in recent yearsExamine the organizations behind ransomware and the victims they targetLearn how wannabe hackers use Ransomware as a Service (RaaS) to launch campaignsUnderstand how ransom is paidand the pros and cons of payingUse methods to protect your organizations workstations and servers

  • - Digital Design for Beginners with Mojo and Lucid HDL
    av Justin Rajewski
    435,-

    Learn how to design digital circuits with FPGAs (field-programmable gate arrays), the devices that reconfigure themselves to become the very hardware circuits you set out to program. With this practical guide, author Justin Rajewski shows you hands-on how to create FPGA projects, whether youre a programmer, engineer, product designer, or maker. Youll quickly go from the basics to designing your own processor.Designing digital circuits used to be a long and costly endeavor that only big companies could pursue. FPGAs make the process much easier, and now theyre affordable enough even for hobbyists. If youre familiar with electricity and basic electrical components, this book starts simply and progresses through increasingly complex projects.Set up your environment by installing Xilinx ISE and the authors Mojo IDELearn how hardware designs are broken into modules, comparable to functions in a software programCreate digital hardware designs and learn the basics on how theyll be implemented by the FPGABuild your projects with Lucid, a beginner-friendly hardware description language, based on Verilog, with syntax similar to C/C++ and Java

  • - Trusting the Devices That Surround US
    av Sean Smith
    359,-

    By 2020, the Internet of Things (IoT) will consist of millions of computational devices intimately connected to real-world aspects of human life. This insightful book demonstrates that if we build the IoT the way we built the current internet and other information technology initiatives, we're headed for trouble.

  • av Simon St. Laurent
    210,-

    Smooth, powerful, and small, Elixir is an excellent language for learning functional programming, and with this hands-on introduction, you'll discover just how powerful Elixir can be.

  • - Patterns and Paradigms for Scalable, Reliable Services
    av Brendan Burns
    415 - 528,-

    Without established design patterns to guide them, developers have had to build distributed systems from scratch, and most of these systems are very unique indeed. Today, the increasing use of containers has paved the way for core distributed system patterns and reusable containerized components. This practical guide presents a collection of repeatable, generic patterns to help make the development of reliable distributed systems far more approachable and efficient.Author Brendan BurnsDirector of Engineering at Microsoft Azuredemonstrates how you can adapt existing software design patterns for designing and building reliable distributed applications. Systems engineers and application developers will learn how these long-established patterns provide a common language and framework for dramatically increasing the quality of your system.Understand how patterns and reusable components enable the rapid development of reliable distributed systemsUse the side-car, adapter, and ambassador patterns to split your application into a group of containers on a single machineExplore loosely coupled multi-node distributed patterns for replication, scaling, and communication between the componentsLearn distributed system patterns for large-scale batch data processing covering work-queues, event-based processing, and coordinated workflows

  • - Protecting Systems with Data and Algorithms
    av David Freeman & Clarence Chio
    551,-

    Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself! With this practical guide, youll explore ways to apply machine learning to security issues such as intrusion detection, malware classification, and network analysis.Machine learning and security specialists Clarence Chio and David Freeman provide a framework for discussing the marriage of these two fields, as well as a toolkit of machine-learning algorithms that you can apply to an array of security problems. This book is ideal for security engineers and data scientists alike.Learn how machine learning has contributed to the success of modern spam filtersQuickly detect anomalies, including breaches, fraud, and impending system failureConduct malware analysis by extracting useful information from computer binariesUncover attackers within the network by finding patterns inside datasetsExamine how attackers exploit consumer-facing websites and app functionalityTranslate your machine learning algorithms from the lab to productionUnderstand the threat attackers pose to machine learning solutions

  • - Building Situational Awareness
    av Michael Collins
    499,-

    In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You'll understand how your network is used, and what actions are necessary to protect and improve it

  • av Bonnie Eisenman
    492,-

    Get a practical introduction to React Native, the JavaScript framework for writing and deploying fully featured mobile apps that render natively. The second edition of this hands-on guide shows you how to build applications that target iOS, Android, and other mobile platforms instead of browsers.

  • - Data Mining Facebook, Twitter, LinkedIn, Instagram, GitHub, and More
    av Matthew A. Russell & Mikhail Klassen
    579,-

    Mine the rich data tucked away in popular social websites such as Twitter, Facebook, LinkedIn, and Instagram. With the third edition of this popular guide, data scientists, analysts, and programmers will learn how to glean insights from social mediaincluding whos connecting with whom, what theyre talking about, and where theyre locatedusing Python code examples, Jupyter notebooks, or Docker containers.In part one, each standalone chapter focuses on one aspect of the social landscape, including each of the major social sites, as well as web pages, blogs and feeds, mailboxes, GitHub, and a newly added chapter covering Instagram. Part two provides a cookbook with two dozen bite-size recipes for solving particular issues with Twitter.Get a straightforward synopsis of the social web landscapeUse Docker to easily run each chapters example code, packaged as a Jupyter notebookAdapt and contribute to the codes open source GitHub repositoryLearn how to employ best-in-class Python 3 tools to slice and dice the data you collectApply advanced mining techniques such as TFIDF, cosine similarity, collocation analysis, clique detection, and image recognitionBuild beautiful data visualizations with Python and JavaScript toolkits

  • - Keeping the Easy, Hard, and Impossible Within Reach
    av brian d foy
    514,-

    If youre ready to get started with Perl 6, this is the book you want, whether youre a programmer, system administrator, or web hacker. Perl 6 is a new languagea modern reinvention of Perl suitable for almost any task, from short fixes to complete web applications. This hands-on tutorial gets you started.Author brian d foy (Mastering Perl) provides a sophisticated introduction to this new programming language. Each chapter in this guide contains exercises to help you practice what you learn as you learn it. Other books may teach you to program in Perl 6, but this book will turn you into a Perl 6 programmer.Learn how to work with:Numbers, strings, blocks, and positionalsFiles and directories and input/outputAssociatives, subroutines, classes, and rolesJunctions and setsRegular expressions and built-in grammarsConcurrency features: Promises, supplies, and channelsControlling external programs and other advanced features

  • av Geraldine van der Auwera
    939,-

    Data in the genomics field is booming. With this practical book, researchers will learn how to work with genomics algorithms using open source tools including the Genome Analysis Toolkit (GATK), Docker, WDL, and Terra.

  • - A Practical Guide to Technology for Equity and Fixed Income Analysts
    av Justin Pauley
    610,-

    Investors recognize that technology is a powerful tool for obtaining and interpreting financial data that could give them the one thing everyone on Wall Street wants: an edge. Yet, many dont realize that you dont need to be a programmer to access behind-the-scenes financial information from Bloomberg, IHS Markit, or other systems found at most banks and investment firms.This practical guide teaches analysts a useful subset of Excel skills that will enable them to access and interpret financial informationwithout any prior programming experience. This book will show analysts, step-by-step, how to quickly produce professional reports that combine their views with Bloomberg or Markit data including historical financials, comparative analysis, and relative value. For portfolio managers, this book demonstrates how to create professional summary reports that contain a high-level view of a portfolios performance, growth, risk-adjusted return, and composition. If you are a programmer, this book also contains a parallel path that covers the same topics using C#.Topics include:Access additional data that isnt visible on Bloomberg screensCreate tables containing corporate data that makes it possible to compare multiple companies, bonds, or loans side-by- sideBuild one-page analytic (Tear Sheet) reports for individual companies that incorporates important financials, custom notes, relative value comparison of the company to its peers, and price trends with research analyst targetsBuild two-page portfolio summary report that contains a high-level view of the portfolios performance, growth, risk-adjusted return, and compositionExplore daily prices and facility information for most of the tradable corporate bond and loan marketDetermine the relationship between two securities (or index) using correlation and regressionCompare each securitys performance to a cohort made of up of securities with similar risk and return characteristicsMeasure portfolio risk-adjusted return by calculating variance, standard deviation, and Sharpe ratioUse Markit data to identify meaningful trends in prices, new issue spreads, and refinancings

  • av K Ceceri
    215,-

    Creating new instruments is much more than an art form. When you want to make a note sound higher or lower, you have to change the sound waves coming out of the instrument. That's science! When you explore the way different materials produce different sounds, that's engineering.

  • av Matthew Borgatti
    215,-

    This book introduces soft-robotics concepts to students, inventors, and makers with easy-to-understand explanations and hands-on DIY projects.

  • - Embedded Programming with Microcontrollers and Python
    av Nicholas H. Tollervey
    421,-

    Its an exciting time to get involved with MicroPython, the re-implementation of Python 3 for microcontrollers and embedded systems. This practical guide delivers the knowledge you need to roll up your sleeves and create exceptional embedded projects with this lean and efficient programming language. If youre familiar with Python as a programmer, educator, or maker, youre ready to learnand have fun along the way.Author Nicholas Tollervey takes you on a journey from first steps to advanced projects. Youll explore the types of devices that run MicroPython, and examine how the language uses and interacts with hardware to process input, connect to the outside world, communicate wirelessly, make sounds and music, and drive robotics projects.Work with MicroPython on four typical devices: PyBoard, the micro:bit, Adafruits Circuit Playground Express, and ESP8266/ESP32 boardsExplore a framework that helps you generate, evaluate, and evolve embedded projects that solve real problemsDive into practical MicroPython examples: visual feedback, input and sensing, GPIO, networking, sound and music, and roboticsLearn how idiomatic MicroPython helps you express a lot with the minimum of resourcesTake the next step by getting involved with the Python community

Gjør som tusenvis av andre bokelskere

Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.