- Table View
- List View
Ceph Cookbook - Second Edition
by Karan Singh Michael Hackett Vikhyat UmraoOver 100 effective recipes to help you design, implement, and troubleshoot manage the software-defined and massively scalable Ceph storage system. About This Book • Implement a Ceph cluster successfully and learn to manage it. • Recipe based approach in learning the most efficient software defined storage system • Implement best practices on improving efficiency and security of your storage cluster • Learn to troubleshoot common issues experienced in a Ceph cluster Who This Book Is For This book is targeted at storage and cloud engineers, system administrators, or anyone who is interested in building software defined storage, to power your cloud or virtual infrastructure. If you have basic knowledge of GNU/Linux and storage systems, with no experience of software defined storage solutions and Ceph, but eager to learn then this book is for you What You Will Learn • Understand, install, configure, and manage the Ceph storage system • Get to grips with performance tuning and benchmarking, and learn practical tips to help run Ceph in production • Integrate Ceph with OpenStack Cinder, Glance, and Nova components • Deep dive into Ceph object storage, including S3, Swift, and Keystone integration • Configure a disaster recovery solution with a Ceph Multi-Site V2 gateway setup and RADOS Block Device mirroring • Gain hands-on experience with Ceph Metrics and VSM for cluster monitoring • Familiarize yourself with Ceph operations such as maintenance, monitoring, and troubleshooting • Understand advanced topics including erasure-coding, CRUSH map, cache pool, and general Ceph cluster maintenance In Detail Ceph is a unified distributed storage system designed for reliability and scalability. This technology has been transforming the software-defined storage industry and is evolving rapidly as a leader with its wide range of support for popular cloud platforms such as OpenStack, and CloudStack, and also for virtualized platforms. Ceph is backed by Red Hat and has been developed by community of developers which has gained immense traction in recent years. This book will guide you right from the basics of Ceph , such as creating blocks, object storage, and filesystem access, to advanced concepts such as cloud integration solutions. The book will also cover practical and easy to implement recipes on CephFS, RGW, and RBD with respect to the major stable release of Ceph Jewel. Towards the end of the book, recipes based on troubleshooting and best practices will help you get to grips with managing Ceph storage in a production environment. By the end of this book, you will have practical, hands-on experience of using Ceph efficiently for your storage requirements. Style and approach This step-by-step guide is filled with practical tutorials, making complex scenarios easy to understand.
Cerebral Aneurysm Detection and Analysis: First Challenge, CADA 2020, Held in Conjunction with MICCAI 2020, Lima, Peru, October 8, 2020, Proceedings (Lecture Notes in Computer Science #12643)
by Anja Hennemuth Leonid Goubergrits Matthias Ivantsits Jan-Martin KuhnigkThis book constitutes the First Cerebral Aneurysm Detection Challenge, CADA 2020, which was held in conjunction with the 23rd International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2020, in October 2020. The conference was planned to take place in Lima, Peru, and took place virtually due to the COVID-19 pandemic. The 9 regular papers presented in this volume, together with an overview and one introduction paper, were carefully reviewed and selected for inclusion in the book. The papers were organized in topical sections as follows: cerebral aneurysm detection; cerebral aneurysm segmentation; and cerebral aneurysm rupture risk estimation.
Certifications of Critical Systems – The CECRIS Experience: The Cecris Experience (River Publishers Series In Information Science And Technology Ser.)
by Andrea Bondavalli Francesco BrancatiIn recent years, a considerable amount of effort has been devoted, both in industry and academia, to the development, validation and verification of critical systems, i.e. those systems whose malfunctions or failures reach a critical level both in terms of risks to human life as well as having a large economic impact.Certifications of Critical Systems – The CECRIS Experience documents the main insights on Cost Effective Verification and Validation processes that were gained during work in the European Research Project CECRIS (acronym for Certification of Critical Systems). The objective of the research was to tackle the challenges of certification by focusing on those aspects that turn out to be more difficult/important for current and future critical systems industry: the effective use of methodologies, processes and tools.The CECRIS project took a step forward in the growing field of development, verification and validation and certification of critical systems. It focused on the more difficult/important aspects of critical system development, verification and validation and certification process. Starting from both the scientific and industrial state of the art methodologies for system development and the impact of their usage on the verification and validation and certification of critical systems, the project aimed at developing strategies and techniques supported by automatic or semi-automatic tools and methods for these activities, setting guidelines to support engineers during the planning of the verification and validation phases.
Certified Ethical Hacker (CEH) Foundation Guide
by Sagar Ajay RahalkarPrepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation Guide also takes you through various career paths available upon completion of the CEH course and also prepares you to face job interviews when applying as an ethical hacker.The book explains the concepts with the help of practical real-world scenarios and examples. You'll also work with hands-on exercises at the end of each chapter to get a feel of the subject. Thus this book would be a valuable resource to any individual planning to prepare for the CEH certification course.What You Will LearnGain the basics of hacking (apps, wireless devices, and mobile platforms)Discover useful aspects of databases and operating systems from a hacking perspectiveDevelop sharper programming and networking skills for the examExplore the penetration testing life cycle Bypass security appliances like IDS, IPS, and honeypotsGrasp the key concepts of cryptographyDiscover the career paths available after certificationRevise key interview questions for a certified ethical hackerWho This Book Is ForBeginners in the field of ethical hacking and information security, particularly those who are interested in the CEH course and certification.
Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based Review of Ethical Hacking and Penetration Testing
by Ahmed SheikhKnow the basic principles of ethical hacking. This book is designed to provide you with the knowledge, tactics, and tools needed to prepare for the Certified Ethical Hacker(CEH) exam—a qualification that tests the cybersecurity professional’s baseline knowledge of security threats, risks, and countermeasures through lectures and hands-on labs. You will review the organized certified hacking mechanism along with: stealthy network re-con; passive traffic detection; privilege escalation, vulnerability recognition, remote access, spoofing; impersonation, brute force threats, and cross-site scripting. The book covers policies for penetration testing and requirements for documentation. This book uses a unique “lesson” format with objectives and instruction to succinctly review each major topic, including: footprinting and reconnaissance and scanning networks, system hacking, sniffers and social engineering, session hijacking, Trojans and backdoor viruses and worms, hacking webservers, SQL injection, buffer overflow, evading IDS, firewalls, and honeypots, and much more. What You Will learn Understand the concepts associated with FootprintingPerform active and passive reconnaissanceIdentify enumeration countermeasuresBe familiar with virus types, virus detection methods, and virus countermeasuresKnow the proper order of steps used to conduct a session hijacking attackIdentify defensive strategies against SQL injection attacksAnalyze internal and external network traffic using an intrusion detection system Who This Book Is For Security professionals looking to get this credential, including systems administrators, network administrators, security administrators, junior IT auditors/penetration testers, security specialists, security consultants, security engineers, and more
Certified Ethical Hacker (CEH) v11 312-50 Exam Guide: Keep up to date with ethical hacking trends and hone your skills with hands-on activities
by Christopher Rees Dale MeredithDevelop foundational skills in ethical hacking and penetration testing while getting ready to pass the certification examKey FeaturesLearn how to look at technology from the standpoint of an attackerUnderstand the methods that attackers use to infiltrate networksPrepare to take and pass the exam in one attempt with the help of hands-on examples and mock testsBook DescriptionWith cyber threats continually evolving, understanding the trends and using the tools deployed by attackers to determine vulnerabilities in your system can help secure your applications, networks, and devices. To outmatch attacks, developing an attacker's mindset is a necessary skill, which you can hone with the help of this cybersecurity book.This study guide takes a step-by-step approach to helping you cover all the exam objectives using plenty of examples and hands-on activities. You'll start by gaining insights into the different elements of InfoSec and a thorough understanding of ethical hacking terms and concepts. You'll then learn about various vectors, including network-based vectors, software-based vectors, mobile devices, wireless networks, and IoT devices. The book also explores attacks on emerging technologies such as the cloud, IoT, web apps, and servers and examines prominent tools and techniques used by hackers. Finally, you'll be ready to take mock tests, which will help you test your understanding of all the topics covered in the book.By the end of this book, you'll have obtained the information necessary to take the 312-50 exam and become a CEH v11 certified ethical hacker.What you will learnGet to grips with information security and ethical hackingUndertake footprinting and reconnaissance to gain primary information about a potential targetPerform vulnerability analysis as a means of gaining visibility of known security weaknessesBecome familiar with the tools and techniques used by an attacker to hack into a target systemDiscover how network sniffing works and ways to keep your information secureExplore the social engineering techniques attackers use to compromise systemsWho this book is forThis ethical hacking book is for security professionals, site admins, developers, auditors, security officers, analysts, security consultants, and network engineers. Basic networking knowledge (Network+) and at least two years of experience working within the InfoSec domain are expected.
Certified Function Point Specialist Examination Guide
by David Garmus Janet Russac Royce EdwardsThe Certified Function Point Specialist Examination Guide provides a complete and authoritative review of the rules and guidelines prescribed in the release of version 4.3 of the Function Point Counting Practices Manual (CPM). Providing a fundamental understanding of the IFPUG Functional Size Measurement method, this is the ideal study guide for th
Certified Information Security Manager Exam Prep Guide: Aligned with the latest edition of the CISM Review Manual to help you pass the exam with confidence
by Hemang DoshiPass the Certified Information Security Manager (CISM) exam and implement your organization's security strategy with easeKey FeaturesPass the CISM exam confidently with this step-by-step guideExplore practical solutions that validate your knowledge and expertise in managing enterprise information security teamsEnhance your cybersecurity skills with practice questions and mock testsBook DescriptionWith cyber threats on the rise, IT professionals are now choosing cybersecurity as the next step to boost their career, and holding the relevant certification can prove to be a game-changer in this competitive market. CISM is one of the top-paying and most sought-after certifications by employers.This CISM Certification Guide comprises comprehensive self-study exam content for those who want to achieve CISM certification on the first attempt. This book is a great resource for information security leaders with a pragmatic approach to challenges related to real-world case scenarios. You'll learn about the practical aspects of information security governance and information security risk management. As you advance through the chapters, you'll get to grips with information security program development and management. The book will also help you to gain a clear understanding of the procedural aspects of information security incident management.By the end of this CISM exam book, you'll have covered everything needed to pass the CISM certification exam and have a handy, on-the-job desktop reference guide.What you will learnUnderstand core exam objectives to pass the CISM exam with confidenceCreate and manage your organization's information security policies and procedures with easeBroaden your knowledge of the organization's security strategy designingManage information risk to an acceptable level based on risk appetite in order to meet organizational goals and objectivesFind out how to monitor and control incident management proceduresDiscover how to monitor activity relating to data classification and data accessWho this book is forIf you are an aspiring information security manager, IT auditor, chief information security officer (CISO), or risk management professional who wants to achieve certification in information security, then this book is for you. A minimum of two years' experience in the field of information technology is needed to make the most of this book. Experience in IT audit, information security, or related fields will be helpful.
Certified Information Security Manager Exam Prep Guide: Gain the confidence to pass the CISM exam using test-oriented study material, 2nd Edition
by Hemang DoshiMaster information security fundamentals with comprehensive explanations of concepts.Purchase of the book unlocks access to web-based tools like practice questions, flashcards, and more to take your CISM prep to the next level.Purchase of the print or Kindle book includes a free eBook in PDF format.Key FeaturesUse this comprehensive resource to prepare for ISACA's CISM certificationUnlock free online tools including interactive practice questions, exam tips, and flashcards to effectively prepare for the CISM examUnderstand the theory behind information security program development and managementBook DescriptionCISM is a globally recognized and much sought-after certification in the field of IT security. This second edition of the Certified Information Security Manager Exam Prep Guide is up to date with complete coverage of the exam content through comprehensive and exam-oriented explanations of core concepts. Written in a clear, succinct manner, this book covers all four domains of the CISM Review Manual.With this book, you'll unlock access to a powerful exam-prep platform which includes interactive practice questions, exam tips, and flashcards. The platform perfectly complements the book and even lets you bring your questions directly to the author.This mixed learning approach of exploring key concepts through the book and applying them to answer practice questions online is designed to help build your confidence in acing the CISM certification.By the end of this book, you'll have everything you need to succeed in your information security career and pass the CISM certification exam with this handy, on-the-job desktop reference guide.What you will learnUnderstand core exam objectives to prepare for the CISM exam with confidenceGet to grips with detailed procedural guidelines for effective information security incident managementExecute information security governance in an efficient mannerStrengthen your preparation for the CISM exam using interactive flashcards and practice questionsConceptualize complex topics through diagrams and examplesFind out how to integrate governance, risk management, and compliance functionsWho this book is forIf you're an IT professional, IT security officer, or risk management executive looking to upgrade your career by passing the CISM exam, this book is for you. Basic familiarity with information security concepts is required to make the most of this book.
Certified Kubernetes Administrator (CKA) Exam Guide: Validate your knowledge of Kubernetes and implement it in a real-life production environment
by Brendan Burns Melony Qin Mark Whitby Alessandro VozzaDevelop a deep understanding of Kubernetes and the cloud native ecosystem, and pass the CKA exam with confidence with this end-to-end study guideKey FeaturesGet to grips with the core concepts of Kubernetes API primitivesDeploy, configure, manage, and troubleshoot Kubernetes clustersCement your credibility in the job market by becoming a Certified Kubernetes AdministratorBook DescriptionKubernetes is the most popular container orchestration tool in the industry. The Kubernetes Administrator certification will help you establish your credibility and enable you to efficiently support the business growth of individual organizations with the help of this open source platform. The book begins by introducing you to Kubernetes architecture and the core concepts of Kubernetes. You'll then get to grips with the main Kubernetes API primitives, before diving into cluster installation, configuration, and management. Moving ahead, you'll explore different approaches while maintaining the Kubernetes cluster, perform upgrades for the Kubernetes cluster, as well as backup and restore etcd. As you advance, you'll deploy and manage workloads on Kubernetes and work with storage for Kubernetes stateful workloads with the help of practical scenarios. You'll also delve into managing the security of Kubernetes applications and understand how different components in Kubernetes communicate with each other and with other applications. The concluding chapters will show you how to troubleshoot cluster- and application-level logging and monitoring, cluster components, and applications in Kubernetes. By the end of this Kubernetes book, you'll be fully prepared to pass the CKA exam and gain practical knowledge that can be applied in your day-to-day work.What you will learnUnderstand the fundamentals of Kubernetes and its toolsGet hands-on experience in installing and configuring Kubernetes clustersManage Kubernetes clusters and deployed workloads with easeGet up and running with Kubernetes networking and storageManage the security of applications deployed on KubernetesFind out how to monitor, log, and troubleshoot Kubernetes clusters and apps among othersWho this book is forThis book is for application developers, DevOps engineers, data engineers, and cloud architects who want to pass the CKA exam and certify their Kubernetes Administrator skills in the market. Basic knowledge of Kubernetes is recommended to get the most out of this book.
Certified Kubernetes Administrator (CKA) Study Guide: In-Depth Guidance and Practice
by Benjamin MuschkoThe ability to administer and monitor a Kubernetes cluster is in high demand today. To meet this need, the Cloud Native Computing Foundation developed a certification exam to establish an administrator's credibility and value in the job market to confidently work in a Kubernetes environment.The Certified Kubernetes Administrator (CKA) certification exam is different from the typical multiple-choice format of other professional certifications. Instead, the CKA is a performance-based exam that requires deep knowledge of the tasks under immense time pressure.This study guide walks you through all the topics covered to fully prepare you for the exam. Author Benjamin Muschko also shares his personal experience with preparing for all aspects of the exam.Learn when and how to apply Kubernetes concepts to administer and troubleshoot a production-grade clusterUnderstand the objectives, abilities, and tips and tricks needed to pass the CKA examExplore the ins and outs of the kubectl command-line toolDemonstrate competency to perform the responsibilities of a Kubernetes administratorSolve real-world Kubernetes problems in a hands-on command-line environmentEffectively navigate and solve questions during the CKA exam
Certified Kubernetes Application Developer (CKAD) Study Guide: In-depth Guidance And Practice
by Benjamin MuschkoDevelopers with the ability to operate, troubleshoot, and monitor applications in Kubernetes are in high demand today. To meet this need, the Cloud Native Computing Foundation created a certification exam to establish a developer's credibility and value in the job market to work in a Kubernetes environment.The Certified Kubernetes Application Developer (CKAD) exam is different from the typical multiple-choice format of other certifications. Instead, the CKAD is a performance-based exam that requires deep knowledge of the tasks under immense time pressure.This study guide walks you through all the topics you need to fully prepare for the exam. Author Benjamin Muschko also shares his personal experience with preparing for all aspects of the exam.Learn when and how to apply Kubernetes concepts to manage an applicationUnderstand the objectives, abilities, tips, and tricks needed to pass the CKAD examExplore the ins and outs of the kubectl command-line toolDemonstrate competency for performing the responsibilities of a Kubernetes application developerSolve real-world Kubernetes problems in a hands-on command-line environmentNavigate and solve questions during the CKAD exam
Certified Kubernetes Application Developer (CKAD) Study Guide: In-Depth Guidance and Practice
by Benjamin MuschkoDevelopers with the ability to operate, troubleshoot, and monitor applications in Kubernetes are in high demand today. To meet this need, the Cloud Native Computing Foundation created a certification exam to establish a developer's credibility and value in the job market for work in a Kubernetes environment.The Certified Kubernetes Application Developer (CKAD) exam format is different from the typical multiple-choice format of other certifications. Instead, the CKAD is performance-based and requires deep knowledge under immense time pressure.Updated to reflect revisions to the official curriculum made in September 2022, this revised study guide takes you through all the topics you need to fully prepare for the exam. Author Benjamin Muschko also shares his personal experience and tips.Learn when and how to apply Kubernetes's concepts to manage an applicationUnderstand the objectives, abilities, tips, and tricks needed to pass the CKAD examExplore the ins and outs of the kubectl command-line toolSolve real-world Kubernetes problems in a hands-on command-line environmentNavigate and solve questions during the CKAD examNew topics include: Deployment strategies, the Helm package manager, resources that extend Kubernetes (CRD), building container images, and more
Certified Kubernetes Security Specialist (CKS) Study Guide: In-Depth Guidance and Practice
by Benjamin MuschkoVulnerabilities in software and IT infrastructure pose a major threat to organizations. In response, the Cloud Native Computing Foundation (CNCF) developed the Certified Kubernetes Security Specialist (CKS) certification to verify an administrator's proficiency to protect Kubernetes clusters and the cloud native software they contain. This practical book helps you fully prepare for the certification exam by walking you through all of the topics covered.Different from typical multiple-choice formats used by other certifications, this performance-based exam requires deep knowledge of the tasks it covers under intense time pressure. If you want to pass the CKS exam on the first go, author Benjamin Muschko shares his personal experience to help you learn the objectives, abilities, and tips and tricks you need to pass on the first attempt.Identify, mitigate, and/or minimize threats to cloud native applications and Kubernetes clustersLearn the ins and outs of Kubernetes's security features, and external tools for security detection and mitigation purposesDemonstrate competency to perform the responsibilities of a Kubernetes administrator or application developer with a security viewpointSolve real-world Kubernetes problems in a hands-on, command-line environmentEffectively navigate and solve questions during the CKS exam
Certified OpenStack Administrator Study Guide
by Andrey MarkelovTeaches you how and what to study in order to be best prepared for the Certified OpenStack Administrator exam. This fast-growing technology is creating a market that needs more qualified IT specialists with proven skills. This book covers 100% of the exam requirements for both The OpenStack Foundation and the Mirantis OpenStack Certification Exam.Each theme is taught using practical exercises and instructions for the command line and for the graphical client (Horizon). Each chapter is followed by review questions, complete with answers. Even after you have taken and passed your OpenStack exam, this book will remain a useful reference. What You Will LearnUnderstand the components that make up the cloud.Install and make an OpenStack distribution from Mirantis, Red Hat or another community version.Work with OpenStack Identity Management, Dashboard, CLI, Object Storage, Block Storage, Networking, Telemetry, Orchestration, and Image Services.Learn how to troubleshoot all the main OpenStack services.Understand where to find information for future work with OpenStack.Who This Book Is ForCertified OpenStack Administrator Study Guide is for Cloud and Linux engineers looking for a better understanding of how to work with the modern OpenStack IaaS Cloud, and wants to prove their knowledge by passing a Certified OpenStack Administrator Exam.
Certified OpenStack Administrator Study Guide: Get Everything You Need for the COA Exam (Certification Study Companion Series)
by Andrey MarkelovGain a better understanding of how to work with the modern OpenStack IaaS Cloud platform. This updated book is designed to help you pass the latest “Yoga” version of the Certified OpenStack Administrator (COA) exam from the Open Infrastructure Foundation. OpenStack is a cloud operating system that controls large pools of computer storage and networking resources throughout a datacenter.All exercises have been updated and re-written for the current version of the exam using the modern CLI tool. This book covers 100% of the exam requirements and each topic is taught using practical exercises and instructions for the command line and for the Horizon dashboard. All chapters are followed by review questions and answers. Even after you have taken and passed the COA exam, this book will remain a useful reference to come back to time after time.What You Will LearnUnderstand the components that make up the CloudInstall OpenStack distribution from Red Hat, Canonical or community versionsRun OpenStack in a virtual test environmentUnderstand where to find information for to further work with OpenStackWho This Book Is ForCloud and Linux engineers who want to pass the Certified OpenStack Administrator Exam.
CFEngine 3 Beginner’s Guide
by RajneeshPart of Packt's Beginner's Guide series, this book guides you through setting up Cfengine to maximizing its potential. This book focuses on getting you through all the major learning points in a smooth, logical order. You'll also learn how to avoid some common pitfalls. If you are a System Administrator or Configuration manager with a growing infrastructure and if you are looking for a dependable tool to manage your infrastructure, then this book is for you. If your infrastructure is already big with hundreds and thousands of nodes and you are looking for a secure, versatile and stable configuration management tool, you will still find this book handy. You don't need any prior experience of Cfengine to follow this book.
CFN Lectures on Functional Nanostructures - Volume 2: Nanoelectronics (Lecture Notes in Physics #820)
by Christian Röthig Matthias Vojta Gerd SchönThis series of books contains selected and edited lectures from summer schools organized by the Center for Functional nanostructures (CFN) at the University of Karlsruhe. The mission of the CFN is to carry out research in the following areas: nanophotonics, nanoelectronics, molecular nanostructures and nanostructured materials. The aim of the summer schools is mainly to exchange new ideas and illustrate emerging research methodologies through a series of topical, introductory lectures. This is reflected by both the selection of topics addressed in the present volume, nanoelectronics, as well as the tutorial aspect of the contributions.
CGI Manual of Style
by Robert McdanielAnyone can put a site up on the Web-but what makes people come back again and again? This indispensable reference is your guide to CGI (Common Gateway Interface), the key to tailoring your site to suit your visitors' needs by controlling and analyzing the flow of information on your site. No experience with C or Perl is assumed. Real-world examples are presented in easy-to follow tutorials.
CGI Programming with Perl: Creating Dynamic Web Pages
by Scott Guelich Shishir Gundavaram Gunther BirznieksProgramming on the Web today can involve any of several technologies, but the Common Gateway Interface (CGI) has held its ground as the most mature method--and one of the most powerful ones--of providing dynamic web content. CGI is a generic interface for calling external programs to crunch numbers, query databases, generate customized graphics, or perform any other server-side task. There was a time when CGI was the only game in town for server-side programming; today, although we have ASP, PHP, Java servlets, and ColdFusion (among others), CGI continues to be the most ubiquitous server-side technology on the Web.CGI programs can be written in any programming language, but Perl is by far the most popular language for CGI. Initially developed over a decade ago for text processing, Perl has evolved into a powerful object-oriented language, while retaining its simplicity of use. CGI programmers appreciate Perl's text manipulation features and its CGI.pm module, which gives a well-integrated object-oriented interface to practically all CGI-related tasks. While other languages might be more elegant or more efficient, Perl is still considered the primary language for CGI.CGI Programming with Perl, Second Edition, offers a comprehensive explanation of using CGI to serve dynamic web content. Based on the best-selling CGI Programming on the World Wide Web, this edition has been completely rewritten to demonstrate current techniques available with the CGI.pm module and the latest versions of Perl. The book starts at the beginning, by explaining how CGI works, and then moves swiftly into the subtle details of developing CGI programs.Topics include:Incorporating JavaScript for form validationControlling browser cachingMaking CGI scripts secure in PerlWorking with databasesCreating simple search enginesMaintaining state between multiple sessionsGenerating graphics dynamicallyImproving performance of your CGI scripts
CGI Programming with Perl, 2nd Edition
by Scott Guelich Shishir Gundavaram Gunther BirznieksProgramming on the Web today can involve any of several technologies, but the Common Gateway Interface (CGI) has held its ground as the most mature method--and one of the most powerful ones--of providing dynamic web content. CGI is a generic interface for calling external programs to crunch numbers, query databases, generate customized graphics, or perform any other server-side task. There was a time when CGI was the only game in town for server-side programming; today, although we have ASP, PHP, Java servlets, and ColdFusion (among others), CGI continues to be the most ubiquitous server-side technology on the Web. CGI programs can be written in any programming language, but Perl is by far the most popular language for CGI. Initially developed over a decade ago for text processing, Perl has evolved into a powerful object-oriented language, while retaining its simplicity of use. CGI programmers appreciate Perl's text manipulation features and its CGI.pm module, which gives a well-integrated object-oriented interface to practically all CGI-related tasks. While other languages might be more elegant or more efficient, Perl is still considered the primary language for CGI. CGI Programming with Perl, Second Edition, offers a comprehensive explanation of using CGI to serve dynamic web content. Based on the best-selling CGI Programming on the World Wide Web, this edition has been completely rewritten to demonstrate current techniques available with the CGI.pm module and the latest versions of Perl. The book starts at the beginning, by explaining how CGI works, and then moves swiftly into the subtle details of developing CGI programs. Topics include: Incorporating JavaScript for form validation Controlling browser caching Making CGI scripts secure in Perl Working with databases Creating simple search engines Maintaining state between multiple sessions Generating graphics dynamically Improving performance of your CGI scripts
Chaim L. Pekeris and the Art of Applying Mathematics with WEIZAC, 1955–1963 (SpringerBriefs in History of Science and Technology)
by Leo Corry Raya LeviathanThis book describes the groundbreaking work of Chaim Leib Pekeris and his collaborators. Between 1955 and 1963 they used the first electronic computer built in Israel, the Weizmann Automatic Computer (WEIZAC), to develop powerful numerical methods that helped achieve new and accurate solutions of the Boltzmann equation, calculate energy levels of the helium atom, produce detailed geophysical and seismological models derived from the study of the free oscillations of the earth, and refine models used to predict meteorological phenomena and global oceanic tides. This book provides a unique account of the pioneering work of Chaim L. Pekeris in applied mathematics and explains in detail the background to the rise of the Weizmann Institute as a world-class center of scientific excellence. This hitherto untold story is of great interest to historians of twentieth-century science with special emphasis on the application of computer-assisted numerical methods in various branches of mathematical physics.
The Chain: The Award-Winning Suspense Thriller of the Year
by Adrian McKintyTHE ONLY WAY TO GET YOUR CHILD BACK IS TO KIDNAP ANOTHER CHILD'A blazing, full-tilt thriller that entirely justifies the hype' GUARDIAN'A heart-stopping roller coaster' DAILY MAIL* * * * *YOUR PHONE RINGS.A STRANGER HAS KIDNAPPED YOUR CHILD.TO FREE THEM YOU MUST ABDUCT SOMEONE ELSE'S CHILD.YOUR CHILD WILL BE RELEASED WHEN YOUR VICTIM'S PARENTS KIDNAP ANOTHER CHILD.IF ANY OF THESE THINGS DON'T HAPPEN:YOUR CHILD WILL BE KILLED.VICTIM. SURVIVOR. ABDUCTOR. CRIMINAL.YOU WILL BECOME EACH ONE. YOU ARE NOW PART OF THE CHAIN * * * * *THE MULTI-AWARD-WINNING THRILLERWinner: Theakstons Old Peculier Crime Novel of the YearWinner: Ned Kelly Award for Best International Crime Fiction Winner: International Thriller Writers Awards - Best Hardcover Winner: Macavity Awards - Best International Crime Fiction Winner: Barry Award - Thriller of the Year*****'A heart-stopping roller coaster'DAILY MAIL'The book everyone is talking about'MIRROR'Scary, plausible, gripping.'IAN RANKIN'You'll miss meals, sleep, and your stop on the bus - guaranteed.'VAL McDERMID'I writhed with the pain of withdrawal when I finished it. Deserves to be the popular hit of the year.'DAILY TELEGRAPH'Incredibly propulsive and original. You won't shake it for a long time.'STEPHEN KING'A masterpiece. You will never be able to forget it.'DON WINSLOW'A unique and unforgettable thriller. Breath-taking, breakneck, brilliant.'MARK BILLINGHAM'Striking, memorable, should be savoured.'TANA FRENCH'Explosively brilliant. Genuinely unputdownable. Terribly plausible'OBSERVER'I may not read a better thriller in my lifetime.'STEVE CAVANAGH 'An electrifying thriller - one of the very best of its kind'FIONA CUMMINS'What a fantastic idea and perfectly written. I'm quite jealous.'ANTHONY HOROWITZ'Terrifying. Terrific.'MICK HERRON'THE CHAIN does for parenting what Gone Girl did for marriage. A must-read thriller.'JAMES SWALLOW'Diabolical, unnerving, relentless.'DENNIS LEHANE'Utterly brilliant'ELLY GRIFFITHSA 'THRILLER OF THE YEAR' SELECTION FOR:GUARDIANDAILY TELEGRAPHAMAZONEXPRESSOBSERVERTIME MAGAZINE
Chain Event Graphs (Chapman & Hall/CRC Computer Science & Data Analysis)
by Rodrigo A. Collazo Christiane Goergen Jim Q. SmithWritten by some major contributors to the development of this class of graphical models, Chain Event Graphs introduces a viable and straightforward new tool for statistical inference, model selection and learning techniques. The book extends established technologies used in the study of discrete Bayesian Networks so that they apply in a much more general setting As the first book on Chain Event Graphs, this monograph is expected to become a landmark work on the use of event trees and coloured probability trees in statistics, and to lead to the increased use of such tree models to describe hypotheses about how events might unfold. <P><P>Features: <P><P>introduces a new and exciting discrete graphical model based on an event tree <P><P>focusses on illustrating inferential techniques, making its methodology accessible to a very broad audience and, most importantly, to practitioners <P><P>illustrated by a wide range of examples, encompassing important present and future applications <P><P>includes exercises to test comprehension and can easily be used as a course book <P><P>introduces relevant software packages <P><P> Rodrigo A. Collazo is a methodological and computational statistician based at the Naval Systems Analysis Centre (CASNAV) in Rio de Janeiro, Brazil. Christiane Görgen is a mathematical statistician at the Max Planck Institute for Mathematics in the Sciences, Leipzig, Germany. Jim Q. Smith is a professor of statistics at the University of Warwick, UK. He has published widely in the field of statistics, AI, and decision analysis and has written two other books, most recently Bayesian Decision Analysis: Principles and Practice (Cambridge University Press 2010).
The Challenge of Violent Drug-Trafficking Organizations
by Christopher Paul Agnes Gereben Schaefer Colin P. ClarkeA RAND team conducted a Delphi expert elicitation exercise, the results of which offer an assessment of the contemporary security situation in Mexico through the lens of existing RAND research on urban instability and unrest, historical insurgencies, and defense-sector reform. Assessment scorecards from these projects were used to obtain input from the expert panel and to guide the resulting discussion.