Expert SQL Server Transactions and Locking

Expert SQL Server Transactions and Locking

Master SQL Server’s Concurrency Model so you can implement high-throughput systems that deliver transactional consistency to your application customers. This book explains how to troubleshoot and address blocking problems and deadlocks, and write code and design database schemas to minimize concurrency issues in the systems you develop. SQL…

IP Multicast, Volume II

IP Multicast, Volume II

Design, operate, and troubleshoot advanced Cisco IP multicast in enterprise, data center, and service provider networks IP Multicast, Volume II thoroughly covers advanced IP multicast designs and protocols specific to Cisco routers and switches. It offers a pragmatic discussion of common features, deployment models, and field practices for…

Liferay Portal 6 Enterprise Intranets

Liferay Portal 6 Enterprise Intranets

This book is a practical guide with a very user-friendly approach. The author has taken a virtual enterprise as an example and has used the features of Liferay to build a corporate intranet for that enterprise. This book is for system administrators or experienced users (not necessarily programmers)…

Privileged Attack Vectors

Privileged Attack Vectors

See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in…

Monetizing Machine Learning

Monetizing Machine Learning

Take your Python machine learning ideas and create serverless web applications accessible by anyone with an Internet connection. Some of the most popular serverless cloud providers are covered in this book―Amazon, Microsoft, Google, and PythonAnywhere. You will work through a series of common Python data science problems in…

Puppet Best Practices

Puppet Best Practices

If you maintain or plan to build Puppet infrastructure, this practical guide will take you a critical step further with best practices for managing the task successfully. Authors Chris Barbour and Jo Rhett present best-in-class design patterns for deploying Puppet environments and discuss the impact of each. The…

Getting Started with React

Getting Started with React

ReactJS, popularly known as the V (view) of the MVC architecture, was developed by the Facebook and Instagram developers. It follows a unidirectional data flow, virtual DOM, and DOM difference that are generously leveraged in order to increase the performance of the UI. Getting Started with React will…

Securing DevOps

Securing DevOps

Security teams need to adopt the techniques of DevOps and switch their focus from defending only the infrastructure to protecting the entire organization by improving it continuously. Securing DevOps explores how the techniques of DevOps and Security should be applied together to make cloud services safer. By the end…

Seeking SRE

Seeking SRE

Organizations—big and small—have started to realize just how crucial system and application reliability is to their business. At the same time, they’ve also learned just how difficult it is to maintain that reliability while iterating at the speed demanded by the marketplace. Site Reliability Engineering (SRE) is a…