Repo Virtual

Repo Virtual

Author: Corey J. White

Publisher: Macmillan + ORM

Published: 2020-04-21

Total Pages: 325

ISBN-13: 1250218713

DOWNLOAD EBOOK

Corey J. White's debut novel Repo Virtual blurs the lines between the real and virtual in an action-packed cyberpunk heist story. An Amazon and Kobo Best Book of April and winner of the Aurealis Award for best science fiction novel! The city of Neo Songdo is a Russian doll of realities — augmented and virtual spaces anchored in the weight of the real. The smart city is designed to be read by machine vision while people see only the augmented facade of the corporate ideal. At night the stars are obscured by an intergalactic virtual war being waged by millions of players, while on the streets below people are forced to beg, steal, and hustle to survive. Enter Julius Dax, online repoman and real-life thief. He's been hired for a special job: stealing an unknown object from a reclusive tech billionaire. But when he finds out he's stolen the first sentient AI, his payday gets a lot more complicated. At the Publisher's request, this title is being sold without Digital Rights Management Software (DRM) applied.


Repo Virtual Sneak Peek

Repo Virtual Sneak Peek

Author: Corey J. White

Publisher: Tor.com

Published: 2020-02-04

Total Pages: 114

ISBN-13: 1250774373

DOWNLOAD EBOOK

Can't wait for the cyberpunk heist of the century? Check out this free sneak peek of Corey J. White's Repo Virtual. Dive into the first eight chapters and meet the crew that's about to change the world. The city of Neo Songdo is a Russian doll of realities — augmented and virtual spaces anchored in the weight of the real. The smart city is designed to be read by machine vision while people see only the augmented facade of the corporate ideal. At night the stars are obscured by an intergalactic virtual war being waged by millions of players, while on the streets below people are forced to beg, steal, and hustle to survive. Enter Julius Dax, online repoman and real-life thief. He's been hired for a special job: stealing an unknown object from a reclusive tech billionaire. But when he finds out he's stolen the first sentient AI, his payday gets a lot more complicated. At the Publisher's request, this title is being sold without Digital Rights Management Software (DRM) applied.


Power Systems Enterprise Servers with PowerVM Virtualization and RAS

Power Systems Enterprise Servers with PowerVM Virtualization and RAS

Author: Dino Quintero

Publisher: IBM Redbooks

Published: 2013-03-06

Total Pages: 424

ISBN-13: 0738436267

DOWNLOAD EBOOK

This IBM® Redbooks® publication illustrates implementation, testing, and helpful scenarios with IBM Power® Systems 780 and 795 using the comprehensive set of the Power virtualization features. We focus on the Power Systems functional improvements, in particular, highlighting the reliability, availability, and serviceability (RAS) features of the enterprise servers. This document highlights IBM Power Systems Enterprise Server features, such as system scalability, virtualization features, and logical partitioning among others. This book provides a documented deployment model for Power 780 and Power 795 within a virtualized environment, which allows clients to plan a foundation for exploiting and using the latest features of the IBM Power Systems Enterprise Servers. The target audience for this book includes technical professionals (IT consultants, technical support staff, IT Architects, and IT Specialists) responsible for providing IBM Power Systems solutions and support.


Secure Continuous Delivery on Google Cloud

Secure Continuous Delivery on Google Cloud

Author: Giovanni Galloro

Publisher: Packt Publishing Ltd

Published: 2024-04-12

Total Pages: 304

ISBN-13: 1805127640

DOWNLOAD EBOOK

Build an end-to-end continuous delivery pipeline on Google Cloud and secure your software supply chain using GCP tools and services including Cloud Code, Cloud Workstations, Cloud Build, Artifact Registry, and Cloud Deploy Key Features Gain hands-on experience building an end-to-end software delivery pipeline using Google Cloud services Deploy your applications on GKE, Cloud Run, and across hybrid and multi-cloud environments Secure pipelines with artifact scanning, dependency vulnerability checks, signed provenance, and admission control Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionContinuous delivery, a cornerstone of modern software engineering, facilitates quick and secure software delivery using a robust toolkit encompassing automated builds, testing, source code management, artifact storage, and deployment. Whether you integrate tools from different providers or use a set of managed services from a single cloud provider, the goal is to streamline setup, integration, and management. This book focuses on continuous delivery on Google Cloud. Starting with an introduction to continuous delivery and secure software supply chain concepts, this book uses hands-on exercises to demonstrate how to continuously test your application with Skaffold and Cloud Code, leverage AI-assisted code generation with Cloud Code and Cloud Workstations, and automate your continuous integration with Cloud Build. You’ll see how to store and scan your software artifacts on Artifact Registry, orchestrate deployments with Cloud Deploy, and release your software on GKE and Cloud Run, configured to admit only trusted code. Using an example application, you’ll implement tools for creating an end-to-end delivery pipeline using Google Cloud services. By the end of this book, you’ll be able to build a secure software delivery pipeline from development to production using Google Cloud managed services and best practices.What you will learn Create an end-to-end continuous delivery pipeline using Cloud Build, Artifact Registry, and Cloud Deploy Develop, build, and deploy container-based applications with Skaffold and Cloud Code Experiment with AI-assisted code generation in Cloud Code Automate continuous integration with Cloud Build triggers Automate deployment on GKE and Cloud Run through Cloud Deploy Enhance pipeline security with Artifact Analysis, Binary Authorization, and SLSA Apply best practices, including logging and monitoring Who this book is for This book is for DevOps, Platform, and Cloud Engineers tasked with managing application deployment and creating continuous delivery pipelines who want to automate workflows in a fully managed, scalable, and secure platform. Software developers involved in application delivery and interested in harnessing Google Cloud tools to optimize development flow status and feedback loop will also find this book useful. Prior knowledge of Google Cloud fundamentals (including Cloud APIs and IAM), software delivery, containerization, and Kubernetes will enhance the reading experience.


Killing Gravity

Killing Gravity

Author: Corey J. White

Publisher: Macmillan + ORM

Published: 2017-05-09

Total Pages: 112

ISBN-13: 0765395088

DOWNLOAD EBOOK

Mars Xi can kill you with her mind, but she'll need more than psychic powers to save her in Killing Gravity, the thrilling science fiction space adventure debut by Corey J. White. Before she escaped in a bloody coup, MEPHISTO transformed Mariam Xi into a deadly voidwitch. Their training left her with terrifying capabilities, a fierce sense of independence, a deficit of trust, and an experimental pet named Seven. She’s spent her life on the run, but the boogeymen from her past are catching up with her. An encounter with a bounty hunter has left her hanging helpless in a dying spaceship, dependent on the mercy of strangers. Penned in on all sides, Mariam chases rumors to find the one who sold her out. To discover the truth and defeat her pursuers, she’ll have to stare into the abyss and find the secrets of her past, her future, and her terrifying potential. The Voidwitch Saga Book 1: Killing Gravity Book 2: Void Black Shadow At the Publisher's request, this title is being sold without Digital Rights Management Software (DRM) applied.


Unreal Engine 4 Virtual Reality Projects

Unreal Engine 4 Virtual Reality Projects

Author: Kevin Mack

Publisher: Packt Publishing Ltd

Published: 2019-04-30

Total Pages: 622

ISBN-13: 1789133882

DOWNLOAD EBOOK

The key problem with VR development is understanding how to set up a project and running it on your desktop or mobile VR device. With this book, you will not only learn the specifics of virtual reality development in Unreal but also build immersive and fun VR projects that can be experienced on your VR devices.


Version Control with Subversion

Version Control with Subversion

Author: C. Michael Pilato

Publisher: "O'Reilly Media, Inc."

Published: 2008-09-23

Total Pages: 434

ISBN-13: 1449379354

DOWNLOAD EBOOK

Written by members of the development team that maintains Subversion, this is the official guide and reference manual for the popular open source revision control technology. The new edition covers Subversion 1.5 with a complete introduction and guided tour of its capabilities, along with best practice recommendations. Version Control with Subversion is useful for people from a wide variety of backgrounds, from those with no previous version control experience to experienced system administrators. Subversion is the perfect tool to track individual changes when several people collaborate on documentation or, particularly, software development projects. As a more powerful and flexible successor to the CVS revision control system, Subversion makes life so much simpler, allowing each team member to work separately and then merge source code changes into a single repository that keeps a record of each separate version. Inside the updated edition Version Control with Subversion, you'll find: An introduction to Subversion and basic concepts behind version control A guided tour of the capabilities and structure of Subversion 1.5 Guidelines for installing and configuring Subversion to manage programming, documentation, or any other team-based project Detailed coverage of complex topics such as branching and repository administration Advanced features such as properties, externals, and access control A guide to best practices Complete Subversion reference and troubleshooting guide If you've never used version control, you'll find everything you need to get started. And if you're a seasoned CVS pro, this book will help you make a painless leap into Subversion.


Void Black Shadow

Void Black Shadow

Author: Corey J. White

Publisher: Macmillan + ORM

Published: 2018-03-27

Total Pages: 140

ISBN-13: 0765396920

DOWNLOAD EBOOK

Corey J. White's space opera Voidwitch Series continues: Mars Xi returns in Void Black Shadow, sequel to Killing Gravity. Mars Xi is a living weapon, a genetically-manipulated psychic supersoldier with a body count in the thousands, and all she wanted was to be left alone. People who get involved with her get hurt, whether by MEPHISTO, by her psychic backlash, or by her acid tongue. It's not smart to get involved with Mars, but that doesn't stop some people from trying. The last time MEPHISTO came for Mars they took one of her friends with them. That was a mistake. A force hasn't been invented that can stop a voidwitch on a rampage, and Mars won't rest until she's settled her debts. At the Publisher's request, this title is being sold without Digital Rights Management Software (DRM) applied.


Mercurial: The Definitive Guide

Mercurial: The Definitive Guide

Author: Bryan O'Sullivan

Publisher: "O'Reilly Media, Inc."

Published: 2009-06-16

Total Pages: 284

ISBN-13: 0596555474

DOWNLOAD EBOOK

This instructive book takes you step by step through ways to track, merge, and manage both open source and commercial software projects with Mercurial, using Windows, Mac OS X, Linux, Solaris, and other systems. Mercurial is the easiest system to learn when it comes to distributed revision control. And it's a very flexible tool that's ideal whether you're a lone programmer working on a small project, or part of a huge team dealing with thousands of files. Mercurial permits a countless variety of development and collaboration methods, and this book offers several concrete suggestions to get you started. This guide will help you: Learn the basics of working with a repository, changesets, and revisions Merge changes from separate repositories Set up Mercurial to work with files on a daily basis, including which ones to track Get examples and tools for setting up various workflow models Manage a project that's making progress on multiple fronts at once Find and fix mistakes by isolating problem sources Use hooks to perform actions automatically in response to repository events Customize the output of Mercurial Mercurial: The Definitive Guide maintains a strong focus on simplicity to help you learn Mercurial quickly and thoroughly.


Mastering Linux Security and Hardening

Mastering Linux Security and Hardening

Author: Donald A. Tevault

Publisher: Packt Publishing Ltd

Published: 2018-01-11

Total Pages: 367

ISBN-13: 1788625064

DOWNLOAD EBOOK

A comprehensive guide to mastering the art of preventing your Linux system from getting compromised. Key Features Leverage this guide to confidently deliver a system that reduces the risk of being hacked Perform a number of advanced Linux security techniques such as network service detection, user authentication, controlling special permissions, encrypting file systems, and much more Master the art of securing a Linux environment with this end-to-end practical guide Book DescriptionThis book has extensive coverage of techniques that will help prevent attackers from breaching your system, by building a much more secure Linux environment. You will learn various security techniques such as SSH hardening, network service detection, setting up firewalls, encrypting file systems, protecting user accounts, authentication processes, and so on. Moving forward, you will also develop hands-on skills with advanced Linux permissions, access control, special modes, and more. Lastly, this book will also cover best practices and troubleshooting techniques to get your work done efficiently. By the end of this book, you will be confident in delivering a system that will be much harder to compromise.What you will learn Use various techniques to prevent intruders from accessing sensitive data Prevent intruders from planting malware, and detect whether malware has been planted Prevent insiders from accessing data that they aren’t authorized to access Do quick checks to see whether a computer is running network services that it doesn’t need to run Learn security techniques that are common to all Linux distros, and some that are distro-specific Who this book is for If you are a systems administrator or a network engineer interested in making your Linux environment more secure, then this book is for you. Security consultants wanting to enhance their Linux security skills will also benefit from this book. Prior knowledge of Linux is mandatory.