Python Evolved: Next-Gen Scripting


Book Description

"Python Evolved: Next-Gen Scripting" offers a forward-looking perspective on Python scripting, exploring cutting-edge techniques and paradigms that push the boundaries of traditional scripting approaches. With a focus on emerging trends and technologies, this book introduces readers to advanced Python concepts, including functional programming, asynchronous programming, and reactive programming. Through practical examples and hands-on exercises, readers will learn how to harness Python's evolving ecosystem to tackle complex scripting tasks with efficiency and elegance. Whether you're a seasoned Python developer or a newcomer looking to explore the future of scripting, this book provides a roadmap to mastering the next generation of Python programming.




Next-Generation Web Frameworks in Python


Book Description

With its flexibility, readability, and maturecode libraries, Python is a naturalchoice for developing agile and maintainableweb applications. Severalframeworks have emerged in the last fewyears that share ideas with Ruby on Railsand leverage the expressive nature of Python.This Short Cut will tell you whatyou need to know about the hottest fullstackframeworks: Django, Pylons, andTurboGears. Their philosophies, relativestrengths, and development status aredescribed in detail. What you won't find out is, "Which oneshould I use?" The short answer is thatall of them can be used to build web applications-the challenge for the readeris to find the one that fits his or herproject or coding style best.




Powerful Python


Book Description

Once you've mastered the basics of Python, how do you skill up to the top 1%? How do you focus your learning time on topics that yield the most benefit for production engineering and data teams—without getting distracted by info of little real-world use? This book answers these questions and more. Based on author Aaron Maxwell's software engineering career in Silicon Valley, this unique book focuses on the Python first principles that act to accelerate everything else: the 5% of programming knowledge that makes the remaining 95% fall like dominos. It's also this knowledge that helps you become an exceptional Python programmer, fast. Learn how to think like a Pythonista: explore advanced Pythonic thinking Create lists, dicts, and other data structures using a high-level, readable, and maintainable syntax Explore higher-order function abstractions that form the basis of Python libraries Examine Python's metaprogramming tool for priceless patterns of code reuse Master Python's error model and learn how to leverage it in your own code Learn the more potent and advanced tools of Python's object system Take a deep dive into Python's automated testing and TDD Learn how Python logging helps you troubleshoot and debug more quickly




Geophysical Data Analysis and Inverse Theory with MATLAB® and Python


Book Description

Geophysical Data Analysis and Inverse Theory with MATLAB or Python, Fifth Edition is a revised and expanded introduction to inverse theory and tomography as it is practiced by geophysicists. The book demonstrates the methods needed to analyze a broad spectrum of geophysical datasets, with special attention given to those methods that generate images of the earth. Data analysis can be a mathematically complex activity, but the treatment in this volume is carefully designed to emphasize those mathematical techniques that readers will find the most familiar and to systematically introduce less-familiar ones. A series of "crib sheets" offer step-by-step summaries of methods presented. Utilizing problems and case studies, along with MATLAB and Python computer code and summaries of methods, the book provides professional geophysicists, students, data scientists and engineers in geophysics with the tools necessary to understand and apply mathematical techniques and inverse theory. - Includes material on probability, including Bayesian influence, probability density function, and metropolis algorithm - Offers detailed discussions of the application of inverse theory to seismological, gravitational, and tectonic studies - Provides numerous examples, color figures, and end-of-chapter problems to help readers explore and further understand the presented ideas - Includes both MATLAB and Python examples and problem sets




Jenkins 2: Up and Running


Book Description

Design, implement, and execute continuous delivery pipelines with a level of flexibility, control, and ease of maintenance that was not possible with Jenkins before. With this practical book, build administrators, developers, testers, and other professionals will learn how the features in Jenkins 2 let you define pipelines as code, leverage integration with other key technologies, and create automated, reliable pipelines to simplify and accelerate your DevOps environments. Author Brent Laster shows you how Jenkins 2 is significantly different from the more traditional, web-only versions of this popular open source automation platform. If you’re familiar with Jenkins and want to take advantage of the new technologies to transform your legacy pipelines or build new modern, automated continuous delivery environments, this is your book. Create continuous delivery pipelines as code with the Jenkins domain-specific language Get practical guidance on how to migrate existing jobs and pipelines Harness best practices and new methods for controlling access and security Explore the structure, implementation, and use of shared pipeline libraries Learn the differences between declarative syntax and scripted syntax Leverage new and existing project types in Jenkins Understand and use the new Blue Ocean graphical interface Take advantage of the capabilities of the underlying OS in your pipeline Integrate analysis tools, artifact management, and containers




Security Power Tools


Book Description

What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, utilities, and tools available using Windows, Linux, Mac OS X, and Unix platforms. Designed to be browsed, Security Power Tools offers you multiple approaches to network security via 23 cross-referenced chapters that review the best security tools on the planet for both black hat techniques and white hat defense tactics. It's a must-have reference for network administrators, engineers and consultants with tips, tricks, and how-to advice for an assortment of freeware and commercial tools, ranging from intermediate level command-line operations to advanced programming of self-hiding exploits. Security Power Tools details best practices for: Reconnaissance -- including tools for network scanning such as nmap; vulnerability scanning tools for Windows and Linux; LAN reconnaissance; tools to help with wireless reconnaissance; and custom packet generation Penetration -- such as the Metasploit framework for automated penetration of remote computers; tools to find wireless networks; exploitation framework applications; and tricks and tools to manipulate shellcodes Control -- including the configuration of several tools for use as backdoors; and a review of known rootkits for Windows and Linux Defense -- including host-based firewalls; host hardening for Windows and Linux networks; communication security with ssh; email security and anti-malware; and device security testing Monitoring -- such as tools to capture, and analyze packets; network monitoring with Honeyd and snort; and host monitoring of production servers for file changes Discovery -- including The Forensic Toolkit, SysInternals and other popular forensic tools; application fuzzer and fuzzing techniques; and the art of binary reverse engineering using tools like Interactive Disassembler and Ollydbg A practical and timely network security ethics chapter written by a Stanford University professor of law completes the suite of topics and makes this book a goldmine of security information. Save yourself a ton of headaches and be prepared for any network security dilemma with Security Power Tools.




Programming Language Pragmatics


Book Description

Programming Language Pragmatics, Third Edition, is the most comprehensive programming language book available today. Taking the perspective that language design and implementation are tightly interconnected and that neither can be fully understood in isolation, this critically acclaimed and bestselling book has been thoroughly updated to cover the most recent developments in programming language design, inclouding Java 6 and 7, C++0X, C# 3.0, F#, Fortran 2003 and 2008, Ada 2005, and Scheme R6RS. A new chapter on run-time program management covers virtual machines, managed code, just-in-time and dynamic compilation, reflection, binary translation and rewriting, mobile code, sandboxing, and debugging and program analysis tools. Over 800 numbered examples are provided to help the reader quickly cross-reference and access content. This text is designed for undergraduate Computer Science students, programmers, and systems and software engineers. - Classic programming foundations text now updated to familiarize students with the languages they are most likely to encounter in the workforce, including including Java 7, C++, C# 3.0, F#, Fortran 2008, Ada 2005, Scheme R6RS, and Perl 6. - New and expanded coverage of concurrency and run-time systems ensures students and professionals understand the most important advances driving software today. - Includes over 800 numbered examples to help the reader quickly cross-reference and access content.




Network Programmability and Automation


Book Description

"This practical guide shows network engineers how to use a range of technologies and tools--including Linux, Python, JSON, and XML--to automate their systems through code. [This book] will help you simplify tasks involved in configuring, managing, and operating network equipment, topologies, services, and connectivity."--Page 4 of cover




Towards Next Generation Grids


Book Description

This book is the fifth volume of the CoreGRID series. Organized jointly with the Euro-Par 2007 conference, The CoreGRID Symposium intends to become the premiere European event on Grid Computing. The aim of this symposium is to strengthen and advance scientific and technological excellence in the area of Grid and Peer-to-Peer Computing. The book includes all aspects of Grid Computing including service infrastructure. It is designed for a professional audience composed of researchers and practitioners in industry. This volume is also suitable for advanced-level students in computer science.




Network Programmability and Automation


Book Description

Network engineers are finding it harder than ever to rely solely on manual processes to get their jobs done. New protocols, technologies, delivery models, and the need for businesses to become more agile and flexible have made network automation essential. The updated second edition of this practical guide shows network engineers how to use a range of technologies and tools, including Linux, Python, APIs, and Git, to automate systems through code. This edition also includes brand new topics such as network development environments, cloud, programming with Go, and a reference network automation architecture. Network Programmability and Automation will help you automate tasks involved in configuring, managing, and operating network equipment, topologies, services, and connectivity. Through the course of the book, you'll learn the basic skills and tools you need to make this critical transition. You'll learn: Programming skills with Python and Go: data types, conditionals, loops, functions, and more How to work with Linux-based systems, the foundation for modern networking and cloud platforms Data formats and models: JSON, XML, YAML, and YANG Jinja templating for creating network device configurations The role of application programming interfaces (APIs) in network automation Source control with Git to manage code changes during the automation process Cloud-native technologies like Docker and Kubernetes How to automate network devices and services using Ansible, Salt, and Terraform Tools and technologies for developing and continuously integrating network automation