Building Your Own Computer Made Easy by James Bernstein provides a comprehensive guide to building a custom computer from scratch. From selecting the right components to assembling them and installing the necessary software, this book offers clear and practical instructions for both beginners and experienced tech enthusiasts. With detailed explanations and helpful tips, it empowers readers to create their own personalized computer with ease.
Individuals who want to understand the process of building a computer from scratch
Enthusiasts who are interested in customizing their computer to suit their specific needs
People who are looking to save money by building their own computer instead of buying a pre-built one
Computer and Information Security Handbook by John R. Vacca provides comprehensive coverage of the principles, technologies, and practices in the field of cybersecurity. It offers insights into various security threats and vulnerabilities, as well as strategies and tools for protecting computer systems and data. This book is a valuable resource for both beginners and experienced professionals in the field of information security.
Professionals in the field of computer and information security looking to deepen their knowledge and skills
IT managers and decision-makers responsible for safeguarding their organization's digital assets
Students and academics studying cybersecurity and seeking a comprehensive resource for reference and study
Design It! by Michael Keeling provides a comprehensive guide to software architecture and design. It offers practical advice and real-world examples to help software developers and architects create scalable, maintainable, and adaptable systems. Whether you're a seasoned professional or just starting out, this book will equip you with the knowledge and tools to design effective software solutions.
Software developers and engineers who want to improve their design skills
Aspiring software architects looking to understand the principles and practices of software design
Individuals and teams seeking practical guidance on creating scalable, maintainable, and adaptable software systems
Digital Retro by Gordon Laing delves into the fascinating world of early personal computers and gaming consoles. Through detailed analysis and stunning visuals, the book explores the evolution of technology from the 1970s to the 1990s, showcasing iconic machines such as the Commodore 64 and the Atari 2600. It offers a nostalgic journey for tech enthusiasts and a valuable historical resource for those interested in the digital revolution.
Enthusiasts of vintage technology and computing
Individuals nostalgic for the early days of personal computing
Those interested in the history and evolution of digital technology
Domain-Driven Design Distilled by Vaughn Vernon provides a clear and concise introduction to the principles and practices of domain-driven design (DDD). It offers practical guidance on how to build software that reflects the real-world complexity of business domains, leading to more effective and maintainable code. With real-world examples and actionable insights, this book is essential for any developer looking to improve their software design skills.
Software developers and architects looking to improve their understanding of domain-driven design
Product owners and business stakeholders who want to align technical solutions with business goals
Team leads and managers seeking to foster collaboration between domain experts and technical teams
Learning Malware Analysis by Monnappa K a provides a comprehensive guide to understanding, analyzing, and dissecting malicious software. It covers the fundamentals of malware analysis, reverse engineering, and practical techniques for identifying and combating different types of malware. Whether you're a beginner or an experienced security professional, this book equips you with the knowledge and skills needed to protect your systems from cyber threats.
Malware analysts and security professionals looking to enhance their skills and knowledge in malware analysis
IT professionals and system administrators who want to understand and defend against malware threats
Students and researchers interested in cybersecurity, digital forensics, and threat intelligence
Mastering Xamarin.Forms by Ed Snider is a comprehensive guide that provides in-depth knowledge and practical examples to help developers create cross-platform mobile applications using Xamarin.Forms. This book covers topics such as UI design, data binding, navigation, dependency injection, and platform-specific implementations. Whether you are new to Xamarin.Forms or an experienced developer, this book will equip you with the skills to build high-quality mobile apps.
Mobile app developers looking to master Xamarin.Forms and build professional-grade apps
Experienced Xamarin developers seeking to deepen their understanding of architecture patterns and best practices
Software engineers interested in learning how to implement MVVM pattern, data binding, and dependency injection in Xamarin.Forms
Windows Kernel Programming by Pavel Yosifovich delves into the intricacies of developing kernel-mode drivers on the Windows platform. From understanding the architecture and APIs to implementing device drivers and system services, this comprehensive guide equips developers with the knowledge and techniques needed to create efficient and reliable kernel-level code.
Software developers who want to gain a deep understanding of Windows kernel programming
Experienced programmers looking to enhance their skills in driver development and system-level programming
Professionals working in cybersecurity or system security who need to understand how the Windows kernel operates
Fundamentals of Software Architecture by Mark Richards is a comprehensive guide that covers the essential concepts and principles of software architecture. It delves into topics such as architectural styles, design patterns, quality attributes, and the role of an architect. With real-world examples and practical advice, this book is a valuable resource for both aspiring and experienced software architects.
Software developers and engineers looking to transition into a software architecture role
Experienced software architects seeking to deepen their knowledge and skills
Managers and technical leaders who want to understand the fundamentals of software architecture