- 77 книг
Hacking too much time
77 книг
Hacking too much time
FastAPI is a young yet solid framework that takes advantage of newer Python features in a clean design. As its name implies, FastAPI is indeed fast, rivaling similar frame...
Once you've mastered the basics of Python, how do you skill up to the top 1%? How do you focus your learning time on topics that yield the most benefit for production engi...
If programming is magic, then web scraping is surely a form of wizardry. By writing a simple automated program, you can query web servers, request data, and parse it to ex...
This is the fourth edition of “Distributed Systems.” We have stayed close to the setup of the third edition, including examples of (part of) existing distributed systems c...
Who This Book Is For
This book is for anyone who wants to leverage ML to solve real-world problems. ML in this book refers to both deep learning and classical algorithm...
What is eBPF? With this revolutionary technology, you can write custom code that dynamically changes the way the kernel behaves. It's an extraordinary platform for buildin...
To facilitate scalability and resilience, many organizations now run applications in cloud native environments using containers and orchestration. But how do you know if t...
NoSQL Distilled: A Brief Guide to the Emerging World of Polyglot Persistence
Pramod J. Sadalage, Martin Fowler
0
(0)The need to handle increasingly larger data volumes is one factor driving the adoption of a new class of nonrelational “NoSQL” databases. Advocates of NoSQL databases clai...
Rust in Action introduces the Rust programming language by exploring numerous systems programming concepts and techniques. You'll be learning Rust by delving into how comp...
For several consecutive years, Rust has been voted "most loved programming language" in Stack Overflow's annual developer survey. This open source systems programming lang...
For developers who’ve mastered the basics, this book is the next step on your way to professional-level programming in Rust. It covers everything you need to build and mai...
Disasters happen. Be prepared. Here’s how.
As a leading security engineer, Michal Zalewski has spent his career methodically anticipating and planning for cyberattacks....
Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things
Fotios Chantzis, Ioannis Stais, Paulino Calderon, Evangelos Deirmentzoglou, Beau Woods
0
(0)Written by all-star security experts, Practical IoT Hacking is a quick-start conceptual guide to testing and exploiting IoT systems and devices.
Drawing from the real-l...
Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats
Alex Matrosov, Eugene Rodionov, Sergey Bratus
0
(0)Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine’s boot process or UEFI firmware.
With the ai...
Building Secure & Reliable Systems
Heather Adkins, Бетси Бейер, Paul Blankinship, Ana Oprea, Piotr Lewandowski, Adam Stubblefield
4
(1)Why We Wrote This Book
We wanted to write a book that focuses on integrating security and reliability directly into the software and system lifecycle, both to highlight...
HTTP/2 in Action is a complete guide to HTTP/2, one of the core protocols of the web. Because HTTP/2 has been designed to be easy to transition to, including keeping it ba...
Getting your models into production is the fundamental challenge of machine learning. MLOps offers a set of proven principles aimed at solving this problem in a reliable a...
Concrete Mathematics: A Foundation for Computer Science
Рональд Л. Грэхем, Дональд Кнут, Орен Паташник
4,6
(18)This book introduces the mathematics that supports advanced computer programming and the analysis of algorithms. The primary aim of its well-known authors is to provide a ...
Structure and Interpretation of Computer Programs
Харольд Абельсон, Джеральд Джей Сассман, Джули Сассман
4,6
(35)Structure and Interpretation of Computer Programs has had a dramatic impact on computer science curricula over the past decade. This long-awaited revision contains changes...
I am not a recruiter. I am a software engineer. And as such, I know what it's like to be asked to whip up brilliant algorithms on the spot and then write flawless code on ...






















