Your cart is empty
An extensively revised and expanded third edition of the successful textbook on analysis and visualization of social networks integrating theory, applications, and professional software for performing network analysis (Pajek). The main structural concepts and their applications in social research are introduced with exercises. Pajek software and datasets are available, so readers can learn network analysis through application and case studies. In the end readers will have the knowledge, skills, and tools to apply social network analysis across different disciplines. A fundamental redesign of the menu structure and the capability to analyze much larger networks required a new edition. This edition presents several new operations including community detection, generalized main paths searches, new network indices, advanced visualization approaches, and instructions for installing Pajek under MacOSX. This third edition is up-to-date with Pajek version 5 and it introduces PajekXXL for very large networks and Pajek3XL for huge networks.
Most companies work hard to avoid costly failures, but in complex systems a better approach is to embrace and learn from them. Through chaos engineering, you can proactively hunt for evidence of system weaknesses before they trigger a crisis. This practical book shows software developers and system administrators how to plan and run successful chaos engineering experiments. System weaknesses go beyond your infrastructure, platforms, and applications to include policies, practices, playbooks, and people. Author Russ Miles explains why, when, and how to test systems, processes, and team responses using simulated failures on Game Days. You'll also learn how to work toward continuous chaos through automation with features you can share across your team and organization. Learn to think like a chaos engineer Build a hypothesis backlog to determine what could go wrong in your system Develop your hypotheses into chaos engineering experiment Game Days Write, run, and learn from automated chaos experiments using the open source Chaos Toolkit Turn chaos experiments into tests to confirm that you've overcome the weaknesses you discovered Observe and control your automated chaos experiments while they are running
This rigorous introduction to network science presents random graphs as models for real-world networks. Such networks have distinctive empirical properties and a wealth of new models have emerged to capture them. Classroom tested for over ten years, this text places recent advances in a unified framework to enable systematic study. Designed for a master's-level course, where students may only have a basic background in probability, the text covers such important preliminaries as convergence of random variables, probabilistic bounds, coupling, martingales, and branching processes. Building on this base - and motivated by many examples of real-world networks, including the Internet, collaboration networks, and the World Wide Web - it focuses on several important models for complex networks and investigates key properties, such as the connectivity of nodes. Numerous exercises allow students to develop intuition and experience in working with the models.
This book focuses on the theory and application of interdependent networks. The contributors consider the influential networks including power and energy networks, transportation networks, and social networks. The first part of the book provides the next generation sustainability framework as well as a comprehensive introduction of smart cities with special emphasis on energy, communication, data analytics and transportation. The second part offers solutions to performance and security challenges of developing interdependent networks in terms of networked control systems, scalable computation platforms, and dynamic social networks. The third part examines the role of electric vehicles in the future of sustainable interdependent networks. The fourth and last part of this volume addresses the promises of control and management techniques for the future power grids.
The way developers design, build, and run software has changed significantly with the evolution of microservices and containers. These modern architectures use new principles that require a different set of practices than most developers, tech leads, and architects are accustomed to. With this focused guide, Bilgin Ibryam and Roland Huss from Red Hat provide common reusable elements, patterns, principles, and practices for designing and implementing cloud native applications on Kubernetes. Each recipe includes a description of the problem and a proposed solution with Kubernetes specifics. Many patterns are also backed by concrete code examples. This book is ideal for developers already familiar with basic Kubernetes concepts who want to learn common cloud native patterns. You'll learn about the following pattern categories: Foundational patterns cover the core principles and practices for building container-based cloud native applications Behavioral patterns add finer grained concepts for managing various types of container and platform interactions Structural patterns help you organize containers within a Pod, the atom of the Kubernetes platform Configuration patterns provide insight into how application configuration can be handled in Kubernetes Advanced patterns include a collection of advanced concepts like extending the platform itself
An Atlas Of Edge-Reversal Dynamics is the first in-depth account of the graph dynamics system SER (Scheduling by Edge Reversal), a powerful distributed mechanism for scheduling agents in a computer system. The study of SER draws on strong motivation from several areas of application, and reveals very clearly the emergence of complex dynamic behavior from very simple transition rules. As such, SER provides the opportunity for the study of complex graph dynamics that can be applied to computer science, optimization, artificial intelligence, networks of automata, and other complex systems. In Part 1: Edge-Reversal Dynamics, the author discusses the main applications and properties of SER, provides data from statistics and correlations computed over several graph classes, and gives an overview of the algorithmic aspects of the construction of the catalogue, thus summarizing the methodology and findings of the cataloguing effort. Part 2: The Atlas, comprises the atlas proper-a catalogue of graphical representations of all basins of attraction generated by the SER mechanism for all graphs in selected classes. An Atlas Of Edge-Reversal Dynamics is a unique and detailed treatment of SER. Along with the catalogue, discussions of SER in the contexts of resource-sharing and automaton networks and a comprehensive set of references make this an important resource for researchers and graduate students in graph theory, discrete mathematics, and complex systems.
In 2016, Google's Site Reliability Engineering book ignited an industry discussion on what it means to run production services today-and why reliability considerations are fundamental to service design. Now, Google engineers who worked on that bestseller introduce The Site Reliability Workbook, a hands-on companion that uses concrete examples to show you how to put SRE principles and practices to work in your environment. This new workbook not only combines practical examples from Google's experiences, but also provides case studies from Google's Cloud Platform customers who underwent this journey. Evernote, The Home Depot, The New York Times, and other companies outline hard-won experiences of what worked for them and what didn't. Dive into this workbook and learn how to flesh out your own SRE practice, no matter what size your company is. You'll learn: How to run reliable services in environments you don't completely control-like cloud Practical applications of how to create, monitor, and run your services via Service Level Objectives How to convert existing ops teams to SRE-including how to dig out of operational overload Methods for starting SRE from either greenfield or brownfield
"CompTIA A+ 220-801 and 220-802 Authorized Practice Questions Exam Cram," Fifth Edition complements any A+ study plan with 700 practice test questions in the book and on the CD-all supported by complete explanations of every answer. This package's highly realistic questions cover every area of knowledge for both new A+ exams: 220-801 and 220-802. Limited Time Offer: Buy "CompTIA A+ 220-801 and 220-802 Authorized Practice Questions Exam Cram "and receive a 10% off discount code for the CompTIA A+ 220-801 and 220-802 exams. To receive your 10% off discount code: Register your product at pearsonITcertification.com/registerFollow the instructions Go to your Account page and click on "Access Bonus Content" Master Your Knowledge of the A+ Exam Features 700 questions, organized to reflect the newest objectives for the A+ exams, so you can easily assess your knowledge of every topic.Each question includes a detailed answer explanation.Provides complete coverage of all objectives for the 220-801 and 220-802 A+ exams. CD Features 700 Practice Questions 700 questions from this book are included on the CD, giving you yet another effective tool to assess your readiness for the A+ exam.Test engine features multiple test modes, questions that simulate actual A+ exams, and detailed answer explanations, among other features.David L. Prowse is an author, a computer network specialist, and a technical trainer. Over the past several years he has authored several titles for Pearson Education, including the well-received CompTIA A+ Exam Cram and CompTIA Security+ Cert Guide. As a consultant, he installs and secures the latest in computer and networking technology. Over the past decade he has also taught CompTIA A+, Network+, and Security+ certification courses, both in the classroom and via the Internet. He runs the website www.davidlprowse.com, where he gladly answers questions from students and readers.
One of the most difficult, yet important, questions regarding projects is "What advantages will this project create for the investors and key stakeholders?" Projects and programs should be treated as investments. This means that the focus of projects shifts from delivering within the triple constraints (time-cost-quality) towards some of the more fundamental questions: What is the purpose of this investment? What are the specific advantages expected? Are these benefits worth the investment? Implementing Project and Program Benefit Management is written for executives and practitioners within the portfolio, program, and project environment. It guides them through the important work that must be addressed as the investment progresses towards the realization of benefits. The processes discussed cover the strategic elements of benefits realization as well as the more detailed requirements, which are the domain of the program delivery teams and the operational users. Using real cases to explain complex situations, operational teams and wider groups of stakeholders, including communities affected by infrastructure projects, will be able to engage in the conversation with the sponsors and delivery teams. Covering an area of program and project management that is rapidly becoming more widely valued, this book blends theory with practical experience to present a clear process flow to managing the benefits life cycle. Best practices are defined, and pitfalls and traps are identified to enable practitioners to apply rigor and structure to this crucial discipline.
You did it. You successfully transformed your application into a microservices architecture. But now that you're running services across different environments-public to public, private to public, virtual machine to container-your cloud native software is beginning to encounter reliability issues. How do you stay on top of this ever-increasing complexity? With the Istio service mesh, you'll be able to manage traffic, control access, monitor, report, get telemetry data, manage quota, trace, and more with resilience across your microservice. In this book, Lee Calcote and Zack Butcher explain why your services need a service mesh and demonstrate step-by-step how Istio fits into the life cycle of a distributed application. You'll learn about the tools and APIs for enabling and managing many of the features found in Istio. Explore the observability challenges Istio addresses Use request routing, traffic shifting, fault injection, and other features essential to running a solid service mesh Generate and collect telemetry information Try different deployment patterns, including A/B, blue/green, and canary Get examples of how to develop and deploy real-world applications with Istio support
How does one go about organizing something as complicated as a strategic-missile or space-exploration program? Stephen B. Johnson here explores the answer--systems management--in a groundbreaking study that involves Air Force planners, scientists, technical specialists, and, eventually, bureaucrats. Taking a comparative approach, Johnson focuses on the theory, or intellectual history, of "systems engineering" as such, its origins in the Air Force's Cold War ICBM efforts, and its migration to not only NASA but the European Space Agency.
Exploring the history and politics of aerospace development and weapons procurement, Johnson examines how scientists and engineers created the systems management process to coordinate large-scale technology development, and how managers and military officers gained control of that process. "Those funding the race demanded results," Johnson explains. "In response, development organizations created what few expected and what even fewer wanted--a bureaucracy for innovation. To begin to understand this apparent contradiction in terms, we must first understand the exacting nature of space technologies and the concerns of those who create them."
Graphite has become one of the most powerful monitoring tools available today, due to its ease of use, rapid graph prototyping abilities, and a friendly rendering API. With this practical guide, system administrators and engineers will learn how to use this open source tool to track operational data you need to monitor your systems, as well as application-level metrics for profiling your services. Author Jason Dixon, member of the Graphite project, provides a thorough introduction of Graphite from the basics to the skills and tools you need for troubleshooting and scaling out its software components. If you want to learn more about monitoring systems, services, or applications, this is the book you need. Get an introduction to monitoring, including important concepts and terminology Examine the features and functionality of key Graphite components, including Carbon and Whisper Learn the typical user workflow necessary to create a basic line chart Build complex charts with chained functions and multiple axes that interact directly with the rendering API Understand how to use the native Graphite dashboard, as well as the more popular third-party dashboards Master the art of scaling and troubleshooting high-performance or highly available Graphite clusters
Networks are everywhere, from the internet, to social networks, and the genetic networks that determine our biological existence. Illustrated throughout in full colour, this pioneering textbook, spanning a wide range of topics from physics to computer science, engineering, economics and the social sciences, introduces network science to an interdisciplinary audience. From the origins of the six degrees of separation to explaining why networks are robust to random failures, the author explores how viruses like Ebola and H1N1 spread, and why it is that our friends have more friends than we do. Using numerous real-world examples, this innovatively designed text includes clear delineation between undergraduate and graduate level material. The mathematical formulas and derivations are included within Advanced Topics sections, enabling use at a range of levels. Extensive online resources, including films and software for network analysis, make this a multifaceted companion for anyone with an interest in network science.
Written by two CIOs with a wealth of leadership experience in healthcare, this book provides prescriptive guidance for the new practitioner drafting a first-time health IT plan and offers fresh, tactical approaches for the advanced practitioner looking to augment their planning process. You'll find overall concepts of planning as well as or
A valuable tool for establishing and maintaining system reliability, overall equipment effectiveness (OEE) has proven to be very effective in reducing unscheduled downtime for companies around the world. So much so that OEE is quickly becoming a requirement for improving quality and substantiating capacity in leading organizations, as well as a required area of study for the ISO/TS 16949. Breaking down the methodology from a historical perspective, The OEE Primer: Understanding Overall Equipment Effectiveness, Reliability, and Maintainability explores the overall effectiveness of machines and unveils novel methods that focus on design improvement including hazard analysis, rate of change of failure (ROCOF) analysis, failure rate finite element analysis (FEA), and theory of inventive problem solving (TRIZ). It covers loss of effectiveness, new machinery, electrical maintenance issues, Weibull distribution, measurement techniques, and mechanical and electrical reliability. The book also: Discusses Reliability and Maintainability (RandM), not as tools to be used in specific tasks, rather as a discipline Covers the application of OEE as an overall improvement tool Assesses existing and new equipment from classical, reliability, and maintainability perspectives Includes a bonus CD with more than 100 pages of appendices and additional resources featuring statistical tables, outlines, case studies, guidelines, and standards Introducing the classical approach to improvement, this book provides an understanding of exactly what OEE is and how it can be best applied to address capacity issues. Highlighting mechanical and electrical opportunities throughout, the text includes many tables, forms, and examples that clearly illustrate and enhance the material presented.
This open access book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers? In separate chapters the book takes readers through the state of the art in fields of computer science that can shed light on these questions. In a concluding chapter it discusses realistic ways forward. In discussions on cyber security, there is a tacit assumption that the manufacturer of equipment will collaborate with the user of the equipment to stop third-party wrongdoers. The Snowden files and recent deliberations on the use of Chinese equipment in the critical infrastructures of western countries have changed this. The discourse in both cases revolves around what malevolent manufacturers can do to harm their own customers, and the importance of the matter is on par with questions of national security. This book is of great interest to ICT and security professionals who need a clear understanding of the two questions posed in the subtitle, and to decision-makers in industry, national bodies and nation states.
This thesis focuses on the problem of optimizing the quality of network multimedia services. This problem spans multiple domains, from subjective perception of multimedia quality to computer networks management. The work done in this thesis approaches the problem at different levels, developing methods for modeling the subjective perception of quality based on objectively measurable parameters of the multimedia coding process as well as the transport over computer networks. The modeling of subjective perception is motivated by work done in psychophysics, while using Machine Learning techniques to map network conditions to the human perception of video services. Furthermore, the work develops models for efficient control of multimedia systems operating in dynamic networked environments with the goal of delivering optimized Quality of Experience. Overall this thesis delivers a set of methods for monitoring and optimizing the quality of multimedia services that adapt to the dynamic environment of computer networks in which they operate.
This textbook presents a detailed introduction to the essentials of networking and communications technologies. Revised and updated, this new edition retains the step-by-step approach of the original, organised to help those without a strong knowledge of the subject matter. Features: provides chapter-ending summaries and review questions, an Appendix on TCP/IP packet formats and an expanded Glossary; supplies supplementary material at the associated Springer website, including teaching slides, solutions to the end-of-chapter questions and supplementary exercises with solutions; presents a greater emphasis on mobile computing and network security, and extended coverage of IPv6 (NEW); discusses networking models and standards, local area and wide area networks, network protocols, TCP/IP-based networks, network management and wireless communications; examines grid and cloud computing, microblogging, mobile ad hoc networks, near-field communication, Power over Ethernet and the Ground Positioning System (NEW).
Get up to speed with Prometheus, the metrics-based monitoring system used by tens of thousands of organizations in production. This practical guide provides application developers, sysadmins, and DevOps practitioners with a hands-on introduction to the most important aspects of Prometheus, including infrastructure and application monitoring, dashboarding and alerting, direct code instrumentation, and metric collection from third-party systems with exporters. This open source system has gained popularity over the past few years for good reason. With its simple yet powerful data model and query language, Prometheus does one thing, and it does it well. Author and Prometheus developer Brian Brazil guides you through Prometheus setup, the Node exporter, and the Alertmanager, then demonstrates how to use them for application and infrastructure monitoring. Know where and how much to apply instrumentation to your application code Identify metrics with labels using unique key-value pairs Get an introduction to Grafana, a popular tool for building dashboards Learn how to use the Node Exporter to monitor your infrastructure Use service discovery to provide different views of your machines and services Use Prometheus with Kubernetes and examine exporters you can use with containers Convert data from other monitoring systems into the Prometheus format
This book teaches the basics of Oracle GoldenGate, which is a product that is used to simplify the process of Oracle Database Replication. GoldenGate can be used for reporting, failover, high availability, live reporting, data warehousing, and BigData ETL process, as well as connecting to multiple other data sources outside of Oracle Database such as SQL Server, MySQL, Teradata, PostgreSQL, and many others. The purpose of GoldenGate and its popularity is its ability to make the highly complex architecture of database replication into a much more simplistic task. This book teaches the reader how to use Oracle GoldenGate, from installation to troubleshooting.
A quick and reliable way to build proven databases for core business functions
This book presents a biographical history of the field of systems thinking, by examining the life and work of thirty of its major thinkers. It discusses each thinker's key contributions, the way this contribution was expressed in practice and the relationship between their life and ideas. This discussion is supported by an extract from the thinker's own writing, to give a flavour of their work and to give readers a sense of which thinkers are most relevant to their own interests.
The Systems Development Handbook provides practical guidance for the r ange of new applications problems, featuring contributions from many i ndustry experts. The book provides step-by-step charts, tables, schema tics, and a comprehensive index for easy access to topics and areas of related interest. Topics include cooperative processing; the transiti on to object-oriented development; rapid application development tools and graphical user interfaces (GUIs); database architecture in distri buted computing; development tools and techniques, including design, m easurement, and production; and more.
The ITIL 2011 Editions have been updated for clarity, consistency, correctness and completeness. ITIL Service Strategy provides a view of ITIL that aligns business and IT so that each brings out the best in the other. It ensures that every stage of the service lifecycle stays focused on the business case and relates to all the companion process elements that follow. Subsequent titles will link deliverables to meeting the business goals, requirements and service management principles described in this publication. Key features: The updated ITIL publications share a similar standard structure (including generic content in Chapters 1, 2 and 6), to improve consistency and aid navigation. Some content has been reorganized to improve flow and readability, and ensure alignment across the suite - including clarification around interfaces, and inputs and outputs across the service lifecycle. Terminology has been clarified and made consistent across the publications and the ITIL glossary.
An accessible primer, Electronic Health Record: A Systems Analysis of the Medications Domain introduces the tools and methodology of Structured Systems Analysis as well as the nuances of the Medications domain. The first part of the book provides a top-down decomposition along two main paths: data in motion-workflows, processes, activities, and tasks in parallel to the analysis of data at rest-database structures, conceptual, logical models, and entities relationship diagrams. Structured systems analysis methodology and tools are applied to: electronic prescription, computerized physician order entry, drug dispensation, medication administration, and clinical decision support. Assuming no previous clinical and/or informatics knowledge, the book supplies a comprehensive view of the EHR/EMR with dedicated chapters on: user interface considerations, reporting requirements, and standards and vocabularies for meaningful use. Containing clear language and more than 170 figures and 100 review questions with answers-this book is a great companion for Healthcare IT professionals and an ideal resource for clinical informatics students. Praise for the book: ... a common sense guide to this new world of informatics ... should prove invaluable to the clinician making his/her way past the commercial hype into the realm of true understanding of the systems of medical informatics. ... strongly recommended ... . -William F. Bria MD, CMIO Shriners Hospitals for Children, President of the Board, Association of Medical Directors of Information Systems Finally, here's a textbook that the market and the industry have been looking for. The author has captured the details of the information flows involved in the EHR while processing an order or prescription from inception to completion. -Joseph T. Finn, RPh, MBA ... a thoughtful and well-constructed manual to understanding and incorporating the complex and many-sided aspects of medication concepts ... a clear and accessible entry to this challenging topic. -Don Martin, Managing Consultant ... encompasses high-value, high-volume therapeutic transactions of indescribable complexity that touch nearly every licensed professional in a hospital ... I'm hoping the vendors of my own hospital's systems take its recommendations to heart. -Mr. HIStalk, Healthcare IT Blogger .... a very useful guide ... provides the necessary detail that is often missing in many books... very useful in health informatics education at universities and courses within community colleges. -Jane M. Brokel, PhD, RN ... a welcome and valuable addition to the toolkit for IT professionals and clinicians participating in the design or implementation of EHR systems. -Christine Greifzu, RN-BC, MBA, MSIS
You may like...
Outsourcing to India - The Offshore…
Mark Kobayashi-Hillary Paperback
Laboratory Information Management…
Christine Paszko, Elizabeth Turner Paperback R2,955 Discovery Miles 29 550
Terraform: Up & Running - Writing…
Yevgeniy Brikman Paperback
Culturally Tuning Change Management
Risto Gladden Hardcover R1,821 Discovery Miles 18 210
Algorithms and Models for Network Data…
Francois Fouss, Marco Saerens, … Hardcover
Cloud Native DevOps with Kubernetes…
John Arundel, Justin Domingus Paperback
BTEC Level 3 National IT Student Book 1
Karen Anderson, Alan Jarvis, … Paperback (1)
R974 Discovery Miles 9 740
Automation through Chef Opscode - A…
Navin Sabharwal, Manak Wadhwa Paperback
Usability Evaluation Handbook for…
Linda Harrington, Craig Harrington Paperback R2,049 Discovery Miles 20 490
Yearly Home Maintenance Check List…
Patricia Larson Paperback