ITeye's March technical book prize-winning trial reading activity has begun!




In order to create a good technical atmosphere, this month ITeye and the Electronic Industry Press Bowen Viewpoint jointly held the March technical book prize-winning trial reading event . We have carefully selected five popular technical books for you, there is always one you want! There are a lot of prizes, come and write your thoughts on the trial reading and win a good technical book! The books to read this time are:
  • "Kubernetes Authoritative Guide - From Docker to Kubernetes Practice Full Contact"
  •    Kubernetes is a pioneering work in the container ecosystem, with perfect coverage in all directions, and it can be used for reference.
  • "Python Stunts: Using Python to Become a Top Hacker"
  •    This book will be used as a professional book for the students of "Myth - Subversive Action of Information Security Talents"
  • Principles and Practice of Distributed Service Framework
  •    A must for architects and program developers in the era of microservices
  • "The Beauty of Algorithms - The Principles Hidden Behind Data Structures (C++ Version)"
  •    Exploring the algorithm world and finding the way of data structure
  • "Java core technology written for busy people"
  •    Core Java Essence Edition is based on the new features of Java 8 to master the core technology without fear of the development framework

Event time: March 1st to March 31st
Participation

method: Select one or more trial reading chapters from the trial reading books we provide, and publish an article of no less than 500 words on the ITeye blog or forum. Write a trial reading experience or write personal opinions based on the topics provided, and send the title + link of the article to the comments of the event post.
Activity Notes:
  • Articles participating in the event must post the title and link to the message area of ​​the event post, otherwise they will not participate in the awards;
  • You can write the trial reading experience or personal opinion of one or more books, such as the articles are excellent and can be repeatedly awarded;
  • The content of the article participating in the activity should revolve around the content of the book to be read, no less than 500 words, and the style is not limited;
  • Articles participating in the event must be original bloggers, healthy in content, objective and fair, and must not reprint or intercept other people's articles. If the plagiarism of other people's articles is verified, the qualification to participate in the activity will be disqualified.

Awards rules:
The excellent articles of this event will be voted for by the editors of ITeye community and the editors of the blog post of Electronic Industry Press. 5 outstanding authors were selected for each technical book. Excellent authors will receive a technical book they have read! The more trial readings, the more prizes!       
1. "Kubernetes Authoritative Guide - Full Contact from Docker to Kubernetes Practice"



Book introduction:
Kubernetes is a Docker container cluster management system open sourced by Google, which provides a complete set of functions for containerized applications such as resource scheduling, deployment and operation, service discovery, capacity expansion, and capacity reduction. This book understands, analyzes, and solves problems from the perspective of a developer. It covers Kubernetes introduction, core principles, practical development, operation and maintenance, advanced cases, and source code analysis. Comprehensive; and around the problems that may arise in the production environment, a large number of typical cases are given, such as security problems, network solution selection, high availability solutions and Trouble Shooting skills, which are very useful for reference.
Prompt topics:
1. Why use Kubernetes
2. Talk about your views on the trial chapters of this book
Purchase link: http://item.jd.com/11847020.html
2. "Python Stunts: Using Python to Become a Top Hacker" 》



Book introduction:
Python is a commonly used programming language, it is not only easy to use, but also has a rich support library. For hackers, computer crime investigators, penetration testers, and security engineers who often need to write specialized tools for their specific scenarios, these features of Python can help them do this task quickly and well, with minimal effort. amount of code to implement the desired functionality. Combining specific scenarios and real cases, this book details the huge role that Python plays in penetration testing, electronic forensics, network traffic analysis, wireless security, automatic information capture on websites, and virus immunity.
Prompt topics:
1. What role does Python play in penetration testing, electronic forensics, network traffic analysis, wireless security, etc.
2. Talk about your views on the trial chapters of this book
Purchase link: http://item. jd.com/11848567.html
3. "Principle and Practice of Distributed Service Framework"



Book introduction:
The author of this book has rich distributed service framework and platform middleware architecture design and practical experience. The Huawei distributed service framework designed by him has been successfully commercialized in dozens of countries around the world. Relying on work practice, this book covers multiple topics such as service-based architecture evolution, subscription publishing, routing strategy, cluster fault tolerance, and service governance, from the architectural design principles of distributed service frameworks to practical experience summary, and comprehensively analyzes the design of service frameworks. Principles and principles, combined with a large number of practical cases to share with readers the author's experience in the design and operation and maintenance of distributed service frameworks. At the same time, the deployment of microservices based on Docker and the development, deployment and operation and maintenance of business systems based on the microservice architecture are introduced in detail.
Prompt topics:
1. What are microservices
2. Challenges faced by RPC frameworks
3. Talk about your views on the trial chapters of this book
Purchase link: http://item.jd.com/11870213.html
4. "Algorithms" The beauty - the principle behind the data structure (C++ version)"



Book Introduction:
This book focuses on the topic of algorithms and data structures, and introduces more than 40 classic algorithms commonly used in modern computer technology step by step and in simple language, as well as algorithm design ideas such as backtracking, divide-and-conquer, greedy, and dynamic programming. In this process, the book also systematically explains linked lists (including singly linked lists, one-way circular linked lists and doubly circular linked lists), stacks, queues (including ordinary queues and priority queues), trees (including binary trees, Huffman Common data structures such as trees, heaps, red-black trees, AVL trees, and dictionary trees), graphs, sets (including disjoint sets), and dictionaries. At the same time, through the explanation of 22 classic problems (including the Joseph ring problem, the Tower of Hanoi problem, the eight queens problem and the knight travel problem, etc.), the algorithm principle hidden behind the data structure is gradually revealed, and the reader is trying to consolidate the knowledge reserve. Activate your thinking skills and finally break through the barriers that hinder your programming skills.
Prompt topics:
1. Where is the fun of algorithms
2. Talk about your views on the trial chapters of this book
Purchase link: http://item.jd.com/11858031.html
5. "Java for Busy People" Core Technology"



Book introduction:
This book is a new masterpiece by Cay S. Horstmann, the author of the classic Core Java. It focuses on key core technologies, refines the essence of the language in a global and highly refined way, and details the new features of Java 8 in a high-concentration and high-quality way. Explain, and immerse it in Java for many years. The insights are contained in the book, which not only covers the basic knowledge of Java programming, but also starts from lambda expression, one of the most important new features of Java 8, and leads readers to explore and practice Java 8 all the way. New features such as Streams for data processing, enhancements in concurrent programming, a new time/date API, and the use of a scripting language in Java.

Prompt topics:
1. New features and improvements to original functions in Java 8
2. Talk about your views on the trial chapters of this book
Purchase link: http://item.jd.com/11862000.htmlTrial

chapters download:

Guess you like

Origin http://10.200.1.11:23101/article/api/json?id=327041956&siteId=291194637