The world of enterprise routing with Juniper Networks devices is getting very
exciting—new technologies, products, and network developments are making the enterprise
network environment one of the most dynamic places to be. However, we, the
authors, hope to focus that energy by providing you with a detailed and practical...
This book is for anyone using or considering Puppet as a systems automation tool.
Readers of this book should be familiar with Linux systems administration and basic
Ruby. I’ll cover the basics of using Puppet manifests for configuration management and
techniques for executing and managing those configurations with...
The first edition of this book, which was published in 1995, contained thirteen
chapters. My objective was to produce a general textbook that treated all the
essential core areas of cryptography, as well as a selection of more advanced
topics. In writing the book, I tried to design it to be flexible enough to permit
a wide variety of...
The telegraph, telephone, radio, and especially the computer
have put everyone on the globe within earshot— at the price of our
privacy. It may feel like we're performing an intimate act when,
sequestered in our rooms and cubicles, we casually use our cell
phones and computers to transmit our thoughts, confidences,...
This book is the second of two volumes addressing the design challenges associated with new generations of semiconductor technology. The various chapters are compiled from tutorials presented at workshops in recent years by prominent authors from all over the world. Technology, productivity and quality are the main aspects under consideration...
This book is written for a wide variety of readers: the expert and the beginner in a design office; the project leader of a design team; the city engineer or chief engineer of a water or sewerage authority (or their subordinates) who may review plans and specifications; and manufacturers’ representatives who should know how their...
This book deals with the problem of optimal allocation of effort to detect a
target. A Bayesian approach is taken in which it is assumed that there is a
prior distribution for the target's location which is known to the searcher as
well as a function which relates the conditional probability of detecting...
Congratulations! You’re on Mars Base Alpha, the first human outpost on the red planet. Don’t relax, though. It’s not all roses and unicorns up here. Mars isn’t called "The Bringer of War" for nothing! You’ve just been rained on by a meteor shower and it’s up to you—you!—to put your...
This book is an intermediate-level introduction to Xcode 4, Apple’s integrated
development environment. It assumes you have some development experience
and are familiar with the Cocoa API. It won’t teach you how to write code or much
at all about Cocoa. There are other books for that. This one is strictly focused on...
The difference between a bad programmer and a good programmer is understanding.
That is, bad programmers don’t understand what they are doing, and good programmers
do. Believe it or not, it really is that simple.
This book exists to help all programmers understand software development on a very...
Recent events worldwide have again highlighted the need for
effective emergency measures for hazards connected with the
process industries and the large scale storage of dangerous
substances. The Commission of the European Communities, DG
XI, in collaboration with the JRC Ispra Establishment, has
therefore organised the...