Repositori UKDW

Journal Informatika

Journal Eksis Sistem Informasi

Jurnal Gema

Jurnal Wacana

Jurnal Ekonomi Manajemen
Daftar 10 Koleksi E-Book Terbaru [Free eBook] The Little Book of Semaphores

The Little Book of Semaphores

The Little Book of Semaphores is a free textbook that introduces the principles of synchronization for concurrent programming. In most computer science curricula, synchronization is a module in an Operating Systems class. OS textbooks present a standard set of problems with a standard set of solutions, but most students don't get a good understanding of the material or the ability to solve similar problems. The approach of this book is to identify patterns that are useful for a variety of synchronization problems and then show how they can be assembled into solutions. After each problem, the book offers a hint before showing a solution, giving students a better chance of discovering solutions on their own. The book covers the classical problems, including "Readers-writers," "Producer-consumer", and "Dining Philosophers." In addition, it collects a number of not-so-classical problems, some written by the author and some by other teachers and ...

(Posted on: Mon, 25 Jan 2021 06:47:11 +0300)
[Free eBook] Windows 10 IT Pro Essentials: Top 10 Tools

Windows 10 IT Pro Essentials: Top 10 Tools

Dive in to Windows 10 with award-winning journalist and Windows Expert Ed Bott in this highly curated free eBook covering the top apps, accessories, and utilities included in the box with Windows 10. The sheer volume of Windows programs and accessories says a lot about the power and complexity of Windows - a fact that every IT pro knows from firsthand experience. There's a tool for nearly every task, and a large part of the process of becoming a Windows expert is knowing how to find the appropriate one when you need it. This book contains descriptions and hands-on advice to help IT Pros work faster and smarter. Some of these tools are for everybody - end users and experts alike - whereas some are strictly for professionals. A few are so specialized that you'll only need them once in a blue moon. Collectively, though, they make up a toolbox that can save you (and your company) time and money. ...

(Posted on: Mon, 25 Jan 2021 06:47:11 +0300)
[Free eBook] RubyFu

RubyFu

This book is a great collection of ideas, tricks, and skills that could be useful for Hackers. It's a unique extraction reference, summarizes a lot of research and experience in order to achieve your w00t in the shortest and smartest way. Rubyfu is where you'll find plug-n-hack code. Rubyfu is a book to use not only to read, it's where ruby goes evil. Who should read this book? Ideally, Hackers! Those who have enough experience to hack our world and have at least basics in the Ruby programming language. Use the irb/pry interactive interpreter to run the code, or run it as a script. ...

(Posted on: Mon, 25 Jan 2021 06:47:11 +0300)
[Free eBook] The Unix Workbench

The Unix Workbench

Learning the command line can be a difficult and intimidating task, but this book is designed to be your lighthouse in the modern computational storm. Unix is a 40 year old operating system that powers the internet, your phone, and the latest scientific research. This book aims to be a gateway to the world of computer programming, providing you with a set of tools that will allow you to scale your ideas. Even if you have no prior programming experience The Unix Workbench can help you build a solid foundation which you can use to build the next great business, discover a new innovation, or choreograph a ovation-inducing ballet. This book begins by helping you get access to Unix, followed by an introduction to how you can use the command line to navigate your computer just like you normally would with your mouse and keyboard. We will then discuss more advanced topics including how to do complex searches with regular expressions, how to configure your programming environmen ...

(Posted on: Mon, 25 Jan 2021 06:47:11 +0300)
[Free eBook] Certified Programming with Dependent Types

Certified Programming with Dependent Types

The technology of mechanized program verification can play a supporting role in many kinds of research projects in computer science, and related tools for formal proof-checking are seeing increasing adoption in mathematics and engineering. This book provides an introduction to the Coq software for writing and checking mathematical proofs. It takes a practical engineering focus throughout, emphasizing techniques that will help users to build, understand, and maintain large Coq developments and minimize the cost of code change over time. Two topics, rarely discussed elsewhere, are covered in detail: effective dependently typed programming (making productive use of a feature at the heart of the Coq system) and construction of domain-specific proof tactics. Almost every subject covered is also relevant to interactive computer theorem proving in general, not just program verification, demonstrated through examples of verified programs applied in many different sorts of formal ...

(Posted on: Mon, 25 Jan 2021 06:47:11 +0300)
Learn PostgreSQL

Learn PostgreSQL

PostgreSQL is one of the fastest-growing open source object-relational database management systems (DBMS) in the world. As well as being easy to use, it's scalable and highly efficient. In this book, you'll explore PostgreSQL 12 and 13 and learn how to build database solutions using it. Complete with hands-on tutorials, this guide will teach you how to achieve the right database design required for a reliable environment. You'll learn how to install and configure a PostgreSQL server and even manage users and connections. The book then progresses to key concepts of relational databases, before taking you through the Data Definition Language (DDL) and commonly used DDL commands. To build on your skills, you'll understand how to interact with the live cluster, create database objects, and use tools to connect to the live cluster. You'll then get to grips with creating tables, building indexes, and designing your database schema. Later, you'll explore the Data Manipulation L ...

(Posted on: Mon, 25 Jan 2021 06:47:11 +0300)
Mastering Splunk 8

Mastering Splunk 8

Splunk is the most widely used engine for working with machine-generated data. This expert-level guide will help you to leverage advanced use cases to drive business growth using operational intelligence and business analytics features. You'll start with an introduction to the new features in Splunk 8 and cover step-by-step exercises that will help you to understand each feature in depth. Next, you'll explore key tasks such as workload management, performance and alerting, Splunk Enterprise Security, and advanced indexing. You'll also learn how to create categorical charts and run analytical operations on metrics within the Splunk Analytics workspace, before understanding how to deliver insights across your organization even when faced with limited or complex data using advanced data analytics. The book will also show you how to monitor and maintain Splunk environments using advanced dashboards. Later, you'll create custom data visualizations and update dashboards using ...

(Posted on: Mon, 25 Jan 2021 06:47:11 +0300)
SELinux System Administration, 3rd Edition

SELinux System Administration, 3rd Edition

Linux is a dominant player in many organizations and in the cloud. Securing the Linux environment is extremely important for any organization, and Security-Enhanced Linux (SELinux) acts as an additional layer to Linux system security. SELinux System Administration covers basic SELinux concepts and shows you how to enhance Linux system protection measures. You will get to grips with SELinux and understand how it is integrated. As you progress, you'll get hands-on experience of tuning and configuring SELinux and integrating it into day-to-day administration tasks such as user management, network management, and application maintenance. Platforms such as Kubernetes, system services like systemd, and virtualization solutions like libvirt and Xen, all of which offer SELinux-specific controls, will be explained effectively so that you understand how to apply and configure SELinux within these applications. If applications do not exert the expected behavior, you'll learn how to ...

(Posted on: Mon, 25 Jan 2021 06:47:11 +0300)
AWS Penetration Testing

AWS Penetration Testing

Cloud security has always been treated as the highest priority by AWS while designing a robust cloud infrastructure. AWS has now extended its support to allow users and security experts to perform penetration tests on its environment. This has not only revealed a number of loopholes and brought vulnerable points in their existing system to the fore, but has also opened up opportunities for organizations to build a secure cloud environment. This book teaches you how to perform penetration tests in a controlled AWS environment. You'll begin by performing security assessments of major AWS resources such as Amazon EC2 instances, Amazon S3, Amazon API Gateway, and AWS Lambda. Throughout the course of this book, you'll also learn about specific tests such as exploiting applications, compromising Identity and Access Management (IAM) keys, testing permissions flaws, and discovering weak policies. Moving on, you'll discover how to establish private-cloud access through backdoor L ...

(Posted on: Mon, 25 Jan 2021 06:47:11 +0300)
The Economics of Data, Analytics, and Digital Transformation

The Economics of Data, Analytics, and Digital Transformation

In today's digital era, every organization has data, but just possessing enormous amounts of data is not a sufficient market discriminator. The Economics of Data, Analytics, and Digital Transformation aims to provide actionable insights into the real market discriminators, including an organization's data-fueled analytics products that inspire innovation, deliver insights, help make practical decisions, generate value, and produce mission success for the enterprise. The book begins by first building your mindset to be value-driven and introducing the Big Data Business Model Maturity Index, its maturity index phases, and how to navigate the index. You will explore value engineering, where you will learn how to identify key business initiatives, stakeholders, advanced analytics, data sources, and instrumentation strategies that are essential to data science success. The book will help you accelerate and optimize your company's operations through AI and machine learning. ...

(Posted on: Mon, 25 Jan 2021 06:47:11 +0300)

Lihat Selengkapnya
Hit counter: website statistics
Diperbarui tgl: 25-01-2021
Hak Cipta © Perpustakaan Universitas Kristen Duta Wacana 2021.