Listing 1 - 6 of 6 |
Sort by
|
Choose an application
Choose an application
Edge computing. --- Electronic data processing --- Cloud computing. --- Distributed processing. --- Web services --- Distributed computer systems in electronic data processing --- Distributed computing --- Distributed processing in electronic data processing --- Computer networks --- Distributed processing
Choose an application
Practice your Git skills using exercises in your own environment. This book introduces concepts in an abstract visual way, and then enforces this learning through exercises - the Git katas. You will start with basic interactions such as commits and branches, and move on to both internals and collaborative workflows. Best practices are introduced and rehearsed throughout with hands-on exercises. Each topic is supplemented with interactive Git exercises that can be solved using any Git client – either the ubiquituous CLI or one of the many graphical clients so you'll learn in the environment you work in. The importance of Git is hard to overstate – it is used by 90% of software engineers worldwide and is the de facto standard for version control. Honing your Git skills is guaranteed to make you a better and more efficient developer. Building software can be stressful, but it doesn’t need to be. Practical Git will give you the Git skills you need, and help keep your Git skills sharp. Add it to your library today. You will: Use Git through scripted exercises and the Git katas Understand Git’s graph model Troubleshoot common and rare scenarios you may face Select and apply the right Git tool for the task Maintain and collaborate on Git repositories Tweak Git to gain the most from this powerful tool.
Computer programming. --- Open source software. --- Web Development. --- Open Source. --- Free software (Open source software) --- Open code software --- Opensource software --- Computer software --- Computers --- Electronic computer programming --- Electronic data processing --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Programming --- Git (Computer file) --- Software engineering. --- Distributed computer systems in electronic data processing --- Distributed computing --- Distributed processing in electronic data processing --- Computer networks --- Computer software engineering --- Engineering
Choose an application
In modern distributed systems, such as the Internet of Things or cloud computing, verifying their correctness is an essential aspect. This requires modeling approaches that reflect the natural characteristics of such systems: the locality of their components, autonomy of their decisions, and their asynchronous communication. However, most of the available verifiers are unrealistic because one or more of these features are not reflected. Accordingly, in this book we present an original formalism: the Integrated Distributed Systems Model (IMDS), which defines a system as two sets (states and messages), and a relation of the "actions" between these sets. The server view and the traveling agent’s view of the system provide communication duality, while general temporal formulas for the IMDS allow automatic verification. The features that the model checks include: partial deadlock and partial termination, communication deadlock and resource deadlock. Automatic verification can support the rapid development of distributed systems. Further, on the basis of the IMDS, the Dedan tool for automatic verification of distributed systems has been developed.
Engineering. --- Artificial intelligence. --- Computational Intelligence. --- Artificial Intelligence. --- Computational intelligence. --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Intelligence, Computational --- Artificial intelligence --- Soft computing --- Distributed computer systems in electronic data processing --- Distributed computing --- Distributed processing in electronic data processing --- Computer networks --- Distributed processing.
Choose an application
This book teaches you how to evaluate a distributed system from the perspective of immutable objects. You will understand the problems in existing designs, know how to make small modifications to correct those problems, and learn to apply the principles of immutable architecture to your tools. Most software components focus on the state of objects. They store the current state of a row in a relational database. They track changes to state over time, making several basic assumptions: there is a single latest version of each object, the state of an object changes sequentially, and a system of record exists. This is a challenge when it comes to building distributed systems. Whether dealing with autonomous microservices or disconnected mobile apps, many of the problems we try to solve come down to synchronizing an ever-changing state between isolated components. Distributed systems would be a lot easier to build if objects could not change. After reading The Art of Immutable Architecture, you will come away with an understanding of the benefits of using immutable objects in your own distributed systems. You will learn a set of rules for identifying and exchanging immutable objects, and see a collection of useful theorems that emerges and ensures that the distributed systems we build are eventually consistent. Using patterns, you will find where the truth converges, see how changes are associative, rather than sequential, and come to feel comfortable understanding that there is no longer a single source of truth. Practical hands-on examples reinforce how to build software using the described patterns, techniques, and tools. By the end, you will possess the language and resources needed to analyze and construct distributed systems with confidence. The assumptions of the past were sufficient for building single-user, single-computer systems. But as we expand to multiple devices, shared experiences, and cloud computing, they work against us. It is time for a new set of assumptions. Start with immutable objects, and build better distributed systems. What You Will Learn: Evaluate a distributed system from the perspective of immutable objects Recognize the problems in existing designs, and make small modifications to correct them Start a new system from scratch, applying patterns Apply the principles of immutable architecture to your tools, including SQL databases, message queues, and the network protocols that you already use Discover new tools that natively apply these principles This book is for software architects and senior developers. It contains examples in SQL and languages such as JavaScript and C#. Past experience with distributed computing, data modeling, or business analysis is helpful. Michael L. Perry has built upon the works of mathematicians such as Bertrand Meyer, Leslie Lamport, and Donald Knuth to develop a mathematical system for software development. He has captured this system in a set of open source projects. Michael often presents on math and software at events and online. You can find out more at qedcode.com. .
Software engineering. --- Computer programming. --- Software Engineering. --- Programming Techniques. --- Computers --- Electronic computer programming --- Electronic data processing --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Computer software engineering --- Engineering --- Programming --- Database design. --- Databases. --- Distributed processing. --- Data banks --- Data bases --- Databanks --- Database systems --- Computer files --- Electronic information resources --- Data base design --- System design --- Distributed computer systems in electronic data processing --- Distributed computing --- Distributed processing in electronic data processing --- Computer networks
Choose an application
"Now that there's software in everything, how can you make anything secure? Understand how to engineer dependable systems with this newly updated classic. In Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition Cambridge University professor Ross Anderson updates his classic textbook and teaches readers how to design, implement, and test systems to withstand both error and attack. This book became a best-seller in 2001 and helped establish the discipline of security engineering. By the second edition in 2008, underground dark markets had let the bad guys specialize and scale up; attacks were increasingly on users rather than on technology. The book repeated its success by showing how security engineers can focus on usability. Now the third edition brings it up to date for 2020. As people now go online from phones more than laptops, most servers are in the cloud, online advertising drives the Internet and social networks have taken over much human interaction, many patterns of crime and abuse are the same, but the methods have evolved. Ross Anderson explores what security engineering means in 2020, including: How the basic elements of cryptography, protocols, and access control translate to the new world of phones, cloud services, social media and the Internet of Things ; Who the attackers are - from nation states and business competitors through criminal gangs to stalkers and playground bullies ; What they do - from phishing and carding through SIM swapping and software exploits to DDoS and fake news ; Security psychology, from privacy through ease-of-use to deception ; The economics of security and dependability - why companies build vulnerable systems and governments look the other way ; How dozens of industries went online - well or badly ; How to manage security and safety engineering in a world of agile development - from reliability engineering to DevSecOps. The third edition of Security Engineering ends with a grand challenge: sustainable security. As we build ever more software and connectivity into safety-critical durable goods like cars and medical devices, how do we design systems we can maintain and defend for decades? Or will everything in the world need monthly software upgrades, and become unsafe once they stop?" [Publisher's website]
Computer security --- Electronic data processing --- Computer Security --- Compromising of Data --- Computer Hackers --- Computer Worms --- Cyber Security --- Cybersecurity --- Data Encryption --- Information Protection --- Computer Viruses --- Data Protection --- Data Security --- Computer Hacker --- Computer Virus --- Computer Worm --- Data Compromising --- Data Encryptions --- Encryption, Data --- Encryptions, Data --- Hacker, Computer --- Hackers, Computer --- Protection, Data --- Protection, Information --- Security, Computer --- Security, Cyber --- Security, Data --- Virus, Computer --- Viruses, Computer --- Worm, Computer --- Worms, Computer --- Distributed computer systems in electronic data processing --- Distributed computing --- Distributed processing in electronic data processing --- Computer networks --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Distributed processing --- Protection --- Security measures --- Computer security. --- Systèmes informatiques --- Chiffrement (informatique). --- Distributed processing. --- Mesures de sûreté.
Listing 1 - 6 of 6 |
Sort by
|