Rabu, 17 Agustus 2016

1Bookcase - 6 books ready for downloading


1Bookcase - 6 books ready for downloading

Link to 1Bookcase

Think Python, 2nd Edition

Posted: 16 Aug 2016 01:10 PM PDT

Think Python

If you want to learn how to program, working with Python is an excellent way to start. This hands-on guide takes you through the language a step at a time, beginning with basic programming concepts before moving on to functions, recursion, data structures, and object-oriented design. This second edition and its supporting code have been updated for Python 3.

Through exercises in each chapter, you'll try out programming concepts as you learn them. Think Python is ideal for students at the high school or college level, as well as self-learners, home-schooled students, and professionals who need to learn programming basics. Beginners just getting their feet wet will learn how to start with Python in a browser.

  • Start with the basics, including language syntax and semantics
  • Get a clear definition of each programming concept
  • Learn about values, variables, statements, functions, and data structures in a logical progression
  • Discover how to work with files and databases
  • Understand objects, methods, and object-oriented programming
  • Use debugging techniques to fix syntax, runtime, and semantic errors
  • Explore interface design, data structures, and GUI-based programs through case studies

The post Think Python, 2nd Edition appeared first on 1Bookcase.

Cassandra: The Definitive Guide, 2nd Edition

Posted: 16 Aug 2016 01:07 PM PDT

Cassandra

Imagine what you could do if scalability wasn’t a problem. With this hands-on guide, you'll learn how the Cassandra database management system handles hundreds of terabytes of data while remaining highly available across multiple data centers. This expanded second edition—updated for Cassandra 3.0—provides the technical details and practical examples you need to put this database to work in a production environment.

Authors Jeff Carpenter and Eben Hewitt demonstrate the advantages of Cassandra's non-relational design, with special attention to data modeling. If you're a developer, DBA, or application architect looking to solve a database scaling issue or future-proof your application, this guide helps you harness Cassandra's speed and flexibility.

  • Understand Cassandra's distributed and decentralized structure
  • Use the Cassandra Query Language (CQL) and cqlsh—the CQL shell
  • Create a working data model and compare it with an equivalent relational model
  • Develop sample applications using client drivers for languages including Java, Python, and Node.js
  • Explore cluster topology and learn how nodes exchange data
  • Maintain a high level of performance in your cluster
  • Deploy Cassandra on site, in the Cloud, or with Docker
  • Integrate Cassandra with Spark, Hadoop, Elasticsearch, Solr, and Lucene

The post Cassandra: The Definitive Guide, 2nd Edition appeared first on 1Bookcase.

Network Programmability and Automation

Posted: 16 Aug 2016 01:02 PM PDT

Network Programmability and Automation

Automation is the new skillset that network engineers need to pick up. Much like sysadmins have had to learn how to use new tools like Chef and Puppet, network engineers are learning that they just can’t do things manually anymore. With examples in each chapter, this practical book provides you with baseline skills in network programmability and automation, using a range of technologies including Linux, Python, JSON, and XML. No previous knowledge of software development, programming, automation, or DevOps is required.

  • Understand the basics of Linux as applied to networking
  • Learn how to use text editors and Python to automate networks
  • Apply sound software design principles like continuous integration, DevOps, source control, etc. to optimize networks

The post Network Programmability and Automation appeared first on 1Bookcase.

Secure Coding in C and C++, 2nd Edition

Posted: 16 Aug 2016 12:58 PM PDT

Secure Coding in C and C++, 2nd Edition

Learn the Root Causes of Software Vulnerabilities and How to Avoid Them

Commonly exploited software vulnerabilities are usually caused by avoidable software defects. Having analyzed tens of thousands of vulnerability reports since 1988, CERT has determined that a relatively small number of root causes account for most of the vulnerabilities.

Secure Coding in C and C++, Second Edition, identifies and explains these root causes and shows the steps that can be taken to prevent exploitation. Moreover, this book encourages programmers to adopt security best practices and to develop a security mindset that can help protect software from tomorrow's attacks, not just today's. Drawing on the CERT's reports and conclusions, Robert C. Seacord systematically identifies the program errors most likely to lead to security breaches, shows how they can be exploited, reviews the potential consequences, and presents secure alternatives.

Coverage includes technical detail on how to

  • Improve the overall security of any C or C++ application
  • Thwart buffer overflows, stack-smashing, and return-oriented programming attacks that exploit insecure string manipulation logic
  • Avoid vulnerabilities and security flaws resulting from the incorrect use of dynamic memory management functions
  • Eliminate integer-related problems resulting from signed integer overflows, unsigned integer wrapping, and truncation errors
  • Perform secure I/O, avoiding file system vulnerabilities
  • Correctly use formatted output functions without introducing format-string vulnerabilities
  • Avoid race conditions and other exploitable vulnerabilities while developing concurrent code

The second edition features

  • Updates for C11 and C++11
  • Significant revisions to chapters on strings, dynamic memory management, and integer security
  • A new chapter on concurrency
  • Access to the online secure coding course offered through Carnegie Mellon's Open Learning Initiative (OLI)

Secure Coding in C and C++, Second Edition, presents hundreds of examples of secure code, insecure code, and exploits, implemented for Windows and Linux. If you're responsible for creating secure C or C++ software–or for keeping it safe–no other book offers you this much detailed, expert assistance.

The post Secure Coding in C and C++, 2nd Edition appeared first on 1Bookcase.

Java Performance Companion

Posted: 16 Aug 2016 12:54 PM PDT

Java Performance Companion

Java Performance Companion shows how to systematically and proactively improve Java performance with today's advanced multicore hardware and complex operating system environments.

The authors, who are all leading Java performance and Java HotSpot VM experts, help you improve performance by using modern software engineering practices, avoiding common mistakes, and applying tips and tricks gleaned from years of real-world experience.

Picking up where Charlie Hunt and Binu John's classic Java Performance left off, this book provides unprecedented detail on two powerful Java platform innovations: the Garbage First (G1) garbage collector and the HotSpot VM Serviceability Agent.

Coverage includes

  • Leveraging G1 to overcome limitations in parallel, serial, and CMS garbage collection
  • Understanding each stage of G1 GC collections, both young and old
  • Getting under the hood with G1 and efficiently fine-tuning it for your application
  • Identifying potential optimizations, interpreting experimental results, and taking action
  • Exploring the internals of the HotSpot VM
  • Using HotSpot VM Serviceability Agent to analyze, triage, and resolve diverse HotSpot VM issues
  • Troubleshooting out of memory errors, Java level deadlocks, and HotSpot VM crashes
  • Extending the Serviceability Agent, and using the Plugin for VisualVM
  • Mastering useful HotSpot VM command line options not covered in Java™ Performance

Java Performance Companion can help you squeeze maximum performance and value from Java with JDK 8 or 9–for any application, in any environment.

The post Java Performance Companion appeared first on 1Bookcase.

Reengineering .NET

Posted: 16 Aug 2016 12:52 PM PDT

Reengineering .NET

Reengineer .NET Code to Improve Quality, Update Architecture, Access New Tools, and Accelerate Delivery of New Features

As software ages, it becomes brittle: difficult to understand, fix, manage, use, and improve. Developers working with  many platforms have encountered this problem; now, developers working with Microsoft's .NET are facing it as well.  In Reengineering .NET, leading .NET architect Bradley Irby introduces proven best practices for revitalizing older .NET code and integrating new architectural and development advances into business-critical systems that can't go offline.  Using a step-by-step approach, .NET professionals can make legacy enterprise software more reliable, maintainable,  attractive, and usable—and make it easier to upgrade for years to come.

Through real-world case studies and extensive downloadable sample code, Irby shows how to carefully plan a .NET  reengineering project, understand the true current state of your code, introduce unit testing and other agile methods, refactor to services and controllers, and leverage powerful .NET reengineering tools built into Microsoft Visual Studio 2012.

This book is an indispensable resource for all developers, architects, and project managers responsible for existing .NET code bases and for a wide audience of non-technical managers and CTOs who want to understand the unique  challenges faced by .NET teams involved in application or system reengineering projects.

Coverage includes:

  • Migrating legacy .NET software to more flexible, extensible, and maintainable architectures—without breaking it
  • Reengineering web applications with the MVC pattern, Winforms software with MVP, and WPF/Silverlight  systems with MVVM
  • Asking the right questions to predict refactoring problems before they happen
  • Planning and organizing reengineering projects to apply the right expertise to each task at the right time
  • Using innovative Test Doubling to make unit testing even more effective
  • Applying Dependency Inversion to break tight coupling and promote easier development and testing
  • Leveraging source control, defect tracking, and continuous integration
  • "Cleaning up" legacy solutions to improve them before you even touch business logic
  • Establishing solid development infrastructure to support your reengineering project
  • Refactoring to services—including advanced techniques using Repositories, Domain Models,  and the Command Dispatcher
  • Refactoring to controller/view or ViewModel/View pairs

The post Reengineering .NET appeared first on 1Bookcase.

Tidak ada komentar:

Posting Komentar