Kirjahaku
Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.
1000 tulosta hakusanalla Dmitri Mereschkowski
Explore the modern market of data analytics platforms and the benefits of using Snowflake computing, the data warehouse built for the cloud. With the rise of cloud technologies, organizations prefer to deploy their analytics using cloud providers such as Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform. Cloud vendors are offering modern data platforms for building cloud analytics solutions to collect data and consolidate into single storage solutions that provide insights for business users. The core of any analytics framework is the data warehouse, and previously customers did not have many choices of platform to use. Snowflake was built specifically for the cloud and it is a true game changer for the analytics market. This book will help onboard you to Snowflake, present best practices to deploy, and use the Snowflake data warehouse. In addition, it covers modern analytics architecture and use cases. It provides use cases of integration with leading analytics software such as Matillion ETL, Tableau, and Databricks. Finally, it covers migration scenarios for on-premise legacy data warehouses. What You Will Learn Know the key functionalities of SnowflakeSet up security and access with clusterBulk load data into Snowflake using the COPY commandMigrate from a legacy data warehouse to Snowflakeintegrate the Snowflake data platform with modern business intelligence (BI) and data integration tools Who This Book Is For Those working with data warehouse and business intelligence (BI) technologies, and existing and potential Snowflake users
Foundations of ARM64 Linux Debugging, Disassembling, and Reversing
Dmitry Vostokov
APRESS
2023
nidottu
Gain a solid understanding of how Linux C and C++ compilers generate binary code. This book explains the reversing and binary analysis of ARM64 architecture now used by major Linux cloud providers and covers topics ranging from writing programs in assembly language, live debugging, and static binary analysis of compiled C and C++ code. It is ideal for those working with embedded devices, including mobile phones and tablets. Using the latest version of Red Hat, you'll look closely at the foundations of diagnostics of core memory dumps, live and postmortem debugging of Linux applications, services, and systems. You'll also work with the GDB debugger and use it for disassembly and reversing. This book uses practical step-by-step exercises of increasing complexity with explanations and many diagrams, including some necessary background topics. In addition, you will be able to analyze such code confidently, understand stack memory usage, and reconstruct original C/C++ code. And as you'll see, memory forensics, malware, and vulnerability analysis, require an understanding of ARM64 assembly language and how C and C++ compilers generate code, including memory layout and pointers. This book provides the background knowledge and practical foundations you’ll need to understand internal Linux program structure and behavior. Foundations of ARM64 Linux Debugging, Disassembling, and Reversing is the perfect companion to Foundations of Linux Debugging, Disassembling, and Reversing for readers interested in the cloud or cybersecurity. What You'll LearnReview the basics of ARM64 assembly languageExamine the essential GDB debugger commands for debugging and binary analysis Study C and C++ compiler code generation with and without compiler optimizations Look at binary code disassembly and reversing patternsSee how pointers in C and C++ are implemented and usedWho This Book Is ForSoftware support and escalation engineers, cloud security engineers, site reliability engineers, DevSecOps, platform engineers, software testers, Linux C/C++ software engineers and security researchers without ARM64 assembly language background, and beginners learning Linux software reverse engineering techniques.
Review topics ranging from Intel x64 assembly language instructions and writing programs in assembly language, to pointers, live debugging, and static binary analysis of compiled C and C++ code. This book is ideal for Linux desktop and cloud developers. Using the latest version of Debian, you’ll focus on the foundations of the diagnostics of core memory dumps, live and postmortem debugging of Linux applications, services, and systems, memory forensics, malware, and vulnerability analysis. This requires an understanding of x64 Intel assembly language and how C and C++ compilers generate code, including memory layout and pointers. This book provides the background knowledge and practical foundations you’ll need in order to master internal Linux program structure and behavior. It consists of practical step-by-step exercises of increasing complexity with explanations and ample diagrams. You’ll also work with the GDB debugger and use it for disassembly and reversing. By the end of the book, you will have a solid understanding of how Linux C and C++ compilers generate binary code. In addition, you will be able to analyze such code confidently, understand stack memory usage, and reconstruct original C/C++ code. Foundations of Linux Debugging, Disassembling, and Reversing is the perfect companion to Foundations of ARM64 Linux Debugging, Disassembling, and Reversing for readers interested in the cloud or cybersecurity.What You'll LearnReview the basics of x64 assembly languageExamine the essential GDB debugger commands for debugging and binary analysis Study C and C++ compiler code generation with and without compiler optimizations Look at binary code disassembly and reversing patternsSee how pointers in C and C++ are implemented and usedWho This Book Is ForSoftware support and escalation engineers, cloud security engineers, site reliability engineers, DevSecOps, platform engineers, software testers, Linux C/C++ software engineers and security researchers without Intel x64 assembly language background, beginners learning Linux software reverse engineering techniques, and engineers coming from non-Linux environments.
Learn how to build cloud-native microservices with Helidon - an open-source Java framework from Oracle. This book will show you how to take full advantage of the cloud by optimizing applications with fast start times, low memory consumption, and a small disk footprint. The open-source Helidon framework provides all that, and more. It’s based on Java 17, giving you full access to new code features. This book reveals how Helidon also supports modern enterprise Java standards such as MicroProfile. Plus, you'll see how Helidon lets you use GraalVM to build lightning-fast native executables, and its unique reactive layer allows you to develop efficient low-level APIs.Each chapter in the book teaches a new Helidon concept through practical examples based on real-life use-cases. You’ll learn how to add observability and security to your microservices, how to work with databases, and call other services. You'll also look at all MicroProfile 5.0 platform specifications aswell as some stand-alone specs such as Messaging and Long Running Actions. Best of all, everything covered in this book makes it a great study guide for the upcoming Oracle Helidon certification - the perfect way to prove your new skills to a prospective employer!What You'll LearnPackage microservices using JLink and GraalVMDeploy microservices to Kubernetes Review MicroProfile 5.0 specifications in detailUnderstand the basics of Helidon Reactive APIsWho This Book Is ForDevelopers and architects who want to start developing cloud-native applications; developers who already use different Java framework and want to learn about Helidon; those interested in developing portable applications using MicroProfile and Jakarta EE
This book is for those who wish to understand how Python debugging is and can be used to develop robust and reliable AI, machine learning, and cloud computing software. It will teach you a novel pattern-oriented approach to diagnose and debug abnormal software structure and behavior. The book begins with an introduction to the pattern-oriented software diagnostics and debugging process that, before performing Python debugging, diagnoses problems in various software artifacts such as memory dumps, traces, and logs. Next, you’ll learn to use various debugging patterns through Python case studies that model abnormal software behavior. You’ll also be exposed to Python debugging techniques specific to cloud native and machine learning environments and explore how recent advances in AI/ML can help in Python debugging. Over the course of the book, case studies will show you how to resolve issues around environmental problems, crashes, hangs, resource spikes, leaks, and performancedegradation. This includes tracing, logging, and analyzing memory dumps using native WinDbg and GDB debuggers. Upon completing this book, you will have the knowledge and tools needed to employ Python debugging in the development of AI, machine learning, and cloud computing applications. What You Will Learn Employ a pattern-oriented approach to Python debugging that starts with diagnostics of common software problemsUse tips and tricks to get the most out of popular IDEs, notebooks, and command-line Python debuggingUnderstand Python internals for interfacing with operating systems and external modulesPerform Python memory dump analysis, tracing, and logging Who This Book Is For Software developers, AI/ML engineers, researchers, data engineers, as well as MLOps and DevOps professionals.
This book will help you analyze traces and logs from different software environments and communicate analysis results using a pattern language that covers everything from a small debugging log to a distributed trace with billions of messages from hundreds of computers, thousands of software components, threads, and processes. The book begins with the basic terminology of operating systems and programming, the foundation for understanding trace and log analysis. It then talks about patterns that help describe problems from a user’s view and patterns for errors and failures. Then, the book covers a range of trace patterns that group messages, and explores how logs depict software activities. It even examines specific message patterns and how they connect in a single trace. Moving forward, you’ll review patterns for multiple traces and logs and how to evaluate them. In this way, you can use similar methods to find problems across a wide variety of software. The book also provides guidance for analyzing issues on systems such as Windows, macOS, Linux, Android, iOS, and other types of computers, including those in networks and the Internet of Things, regardless of their system differences. Upon completing this book, you will be able to navigate the complexities of trace and log analysis and apply uniform diagnostics and anomaly detection pattern language across diverse software environments to help you troubleshoot, debug, and fix issues. What You Will Learn Understand pattern language for trace and log analysisGain a pattern-oriented methodology for trace and log analysis applicable to various domains, including cybersecurityMaster the fundamentals of operating systems and programming related to trace and log analysisUnderstand observed behavior in traces and logs, which aids incident response, diagnostics, root cause analysis, troubleshooting, and debugging Who This Book Is For Software technical support engineers, system and network administrators, software developers, testers, DevOps and DevSecOps, digital forensics and malware analysts, security incident response engineers, data analysts, and data mining practitioners.
Biogeochemical Methods of Prospecting / Biogeokhimicheskii Metod Poiskov Rudnykh Mestorozhdenii / ??????????????? ????? ??????? ?????? ?????????????
Dmitrii Malyuga
Springer-Verlag New York Inc.
2013
nidottu
Structured Peer-to-Peer Systems
Dmitry Korzun; Andrei Gurtov
Springer-Verlag New York Inc.
2014
nidottu
The field of structured P2P systems has seen fast growth upon the introduction of Distributed Hash Tables (DHTs) in the early 2000s. The first proposals, including Chord, Pastry, Tapestry, were gradually improved to cope with scalability, locality and security issues. By utilizing the processing and bandwidth resources of end users, the P2P approach enables high performance of data distribution which is hard to achieve with traditional client-server architectures. The P2P computing community is also being actively utilized for software updates to the Internet, P2PSIP VoIP, video-on-demand, and distributed backups. The recent introduction of the identifier-locator split proposal for future Internet architectures poses another important application for DHTs, namely mapping between host permanent identity and changing IP address. The growing complexity and scale of modern P2P systems requires the introduction of hierarchy and intelligence in routing of requests. Structured Peer-to-Peer Systems covers fundamental issues in organization, optimization, and tradeoffs of present large-scale structured P2P systems, as well as, provides principles, analytical models, and simulation methods applicable in designing future systems. Part I presents the state-of-the-art of structured P2P systems, popular DHT topologies and protocols, and the design challenges for efficient P2P network topology organization, routing, scalability, and security. Part II shows that local strategies with limited knowledge per peer provide the highest scalability level subject to reasonable performance and security constraints. Although the strategies are local, their efficiency is due to elements of hierarchical organization, which appear in many DHT designs that traditionally are considered as flat ones. Part III describes methods to gradually enhance the local view limit when a peer is capable to operate with larger knowledge, still partial, about the entire system.These methods were formed in the evolution of hierarchical organization from flat DHT networks to hierarchical DHT architectures, look-ahead routing, and topology-aware ranking. Part IV highlights some known P2P-based experimental systems and commercial applications in the modern Internet. The discussion clarifies the importance of P2P technology for building present and future Internet systems.
The celebrated Parisi solution of the Sherrington-Kirkpatrick model for spin glasses is one of the most important achievements in the field of disordered systems. Over the last three decades, through the efforts of theoretical physicists and mathematicians, the essential aspects of the Parisi solution were clarified and proved mathematically. The core ideas of the theory that emerged are the subject of this book, including the recent solution of the Parisi ultrametricity conjecture and a conceptually simple proof of the Parisi formula for the free energy. The treatment is self-contained and should be accessible to graduate students with a background in probability theory, with no prior knowledge of spin glasses. The methods involved in the analysis of the Sherrington-Kirkpatrick model also serve as a good illustration of such classical topics in probability as the Gaussian interpolation and concentration of measure, Poisson processes, and representation results for exchangeable arrays.
Yield Management in Hotels
Dmitry A. Kozlov
Createspace Independent Publishing Platform
2013
nidottu
Stability of Linear Delay Differential Equations
Dimitri Breda; Stefano Maset; Rossana Vermiglio
Springer-Verlag New York Inc.
2014
nidottu
This book presents the authors' recent work on the numerical methods for the stability analysis of linear autonomous and periodic delay differential equations, which consist in applying pseudospectral techniques to discretize either the solution operator or the infinitesimal generator and in using the eigenvalues of the resulting matrices to approximate the exact spectra. The purpose of the book is to provide a complete and self-contained treatment, which includes the basic underlying mathematics and numerics, examples from population dynamics and engineering applications, and Matlab programs implementing the proposed numerical methods. A number of proofs is given to furnish a solid foundation, but the emphasis is on the (unifying) idea of the pseudospectral technique for the stability analysis of DDEs. It is aimed at advanced students and researchers in applied mathematics, in dynamical systems and in various fields of science and engineering, concerned with delay systems. A relevant feature of the book is that it also provides the Matlab codes to encourage the readers to experience the practical aspects. They could use the codes to test the theory and to analyze the performances of the methods on the given examples. Moreover, they could easily modify them to tackle the numerical stability analysis of their own delay models.
Pixel Power Coloring Book is a conveniently packaged, 'on-the-go' colouring book that contains 28 trendy pixelated designs. This nifty selection of amazing art activities can be transported anywhere, making it ideal for use on the train or bus, at lunchtime or even on a rainy weekend!Packed with hours of portable pixelated coloring fun that will help you relax and unwind, Pixel Power features retro-cool designs for super heroes, game characters and much more. Simply dig out your coloured pencils, crayons, gel pens, felt-tips and marker pens to make the 8-bit era of blocky video games come to life.This compact colouring book includes a fully-coloured example for each quirky design, along with a mix-and-match gallery of bonus design elements to add to the fun. It also features a complete Pixel Alphabet, so that you can personalize the pages with your own words and phrases!
Quantum Effects in Tribology
Dmitry Nikolaevich Lyubimov; Kirill Nikolaevich Dolgopolov
Productivity Press
2017
sidottu
Quantum Effects in Tribology is devoted to the study of quantum foundations of materials friction interaction and evolutionary formation of tribosystem’s operating parameters. At the start of the book, large consideration is given to the analysis of the existing diversity of friction, wear, and lubrication models and their relationship with each other, as well as to the quantum nature of the measurement process and the wave function reduction caused by the act of measurement. Consideration of measurement as a process of defining the output parameters of tribosystem is carried out with the apparatus of second quantization and conceptions associated with non-local quantum effects. Such an approach makes it possible not only to take another look to the evolution of tribosystems but discover previously unknown regularities of friction. The book is intended for professionals working in the field of tribology, but will be also useful for graduate students specializing in the theory of friction and quantum physics.
Templar's Greek Recipes: cook Greek like Dim can cook Greek
Dimitri Flynn
Createspace Independent Publishing Platform
2014
nidottu
Greek family recipes handed down several generations kitchen tested and simple preparation even a beginner can take step by step to make delicious healthy Greek dishes for friends and relatives
The ISI Gambit surrounds the events of the Malaysian jetliner that disappeared over the Indian Ocean..The scenario of this book is that it was a hijacking by terrorist who fly the plane to Pakistan with the help of Pakistani secret police after killing all passengers aboard. The CHAOS team joins the action and resolves the situation by killing the perps and blowing up the jetliner.
Smoke of Satan concludes the New Knights Templar saga begun over 100 years ago. The Templar try to help the Papacy out of a severe scandal and attempt to rescue the Bark of Peter from liberal element determined to eliminate many tradition held for over 2000 years