Each month, we take stock of the month’s new asynchronous books and present your favorite asynchronous book. This book covers Linux, big data technology, software testing, GO, Wireshark, C++ programming, IT operations, etc. Learn the latest technology from the latest books, asynchronous new books to better deal with the rapidly changing technology world.

Risc-v Architecture and Embedded Development Quick Start

The Hu Zhenbo

The sister edition of this book “How to Design CPU – RISC-V Processor” has been published, providing a very efficient ultra-low power risC-V processor learning case – Hummingbird E203, and it is analyzed and explained in all aspects, to solve the problem of insufficient Chinese information in CPU hardware design.

IT Operations (2nd Edition)

Li zhao


The book is divided into five chapters (opportunity, work, work, skills and in-depth), which expounds the methods and relevant knowledge and skills that IT operation and maintenance personnel should master from different levels.

This book is simple, simple, will be in the information service obscure IT standards norms, process system with easy to understand the way. Based on a real case in 2013, the Opportunities section helps readers plan their careers and guides them to make the right choice between “software development” and “IT services”. “Work chapter” for IT service what to do, how to do, how to do well and other problems are elaborated, help IT service staff sort out the work ideas, clear the work objectives and direction. “Doing Things” explains how to win hearts from both inside and outside. The Skills section systematically introduces the IT technologies and skills involved in O&M services. The “advanced Section” introduces the advanced IT service standards, architectures, systems and methods at home and abroad.

Distributed Caching — Principles, Architecture, and Go Language Implementation

The Hu Shijie


With the rapid development of the Internet, all walks of life have higher and higher requirements for Internet services. Many common storage scenarios of the Internet system are confronted with capacity and stability risks. At this time, local cache can no longer meet the needs of distributed cache due to its high performance, high availability and other advantages quickly accepted and used by the majority of Internet companies.

The book is divided into three parts, each with three chapters. The first part is the realization of basic functions, mainly introduces the IN Memory caching service based on HTTP, HTTP/REST protocol, TCP and so on. In part 2, we will focus on improving the performance of cache services from various aspects, including the principle of pipeline, RocksDB batch write, etc. The last part is about the distributed cache service cluster, mainly introduces the distributed cache cluster, node rebalance function, etc. The programming language chosen to implement distributed caching is the current popular Go language.

This book is suitable for engineers or architects who work on caching, as well as readers who want to learn and implement distributed caching.

Software Debugging (2nd edition) : Volume 1: Hardware Fundamentals

Author: Zhang Yinkui

This book can be called the “encyclopedia” of software debugging. In this paper, the author introduces the relevant principles and mechanisms of software debugging, discusses the connotation and significance of debuggability, as well as the principles and methods of realizing software debuggability, in accordance with the three main threads of “ecosystem”, “exception” and “debugger”. Summarize the methods and skills of software debugging.

Full Software Testing (3rd Edition)

Kerry zhu zhao

This book is a systematic summary of the changes that have taken place in software testing over the past decade, and encapsulates the author’s valuable experience in software testing. This book first introduces different views on software testing, the whole process of software testing ideas, software testing infrastructure and TA framework, team capacity building; Then step by step into test planning, design, implementation, continuous feedback and improvement; Then, we discuss the idea of whole-process testing, including whole-process static testing, whole-process performance testing, whole-process security, whole-process modeling and whole-process visualization. The book concludes with a look at the future of software testing.

This book is suitable for software testers and can be used as a reference guide for related professionals.

“D3 4.x Data Visualization Combat Manual (2nd Edition)”

[PLUS] By Nick Zhu


The purpose of this book is to show the reader how to use D3 4.x for data visualization through extensive examples and code. As long as the reader knows JavaScript, he or she will know everything in this book.

Of 13 chapters of the book, from how to set up D3. Js development environment to start, gradually introduce D3 in various operations, including preliminary selection, data processing, data mapping, axis components, animated transitions, related introduction, drawing of SVG graphics, layout, interactive visualization, the mechanics simulation and manufacture of maps and test drive. Examples and code abound to help readers understand these rich concepts. Finally, in the appendix section, we introduce the reader to two other JavaScript libraries, mainly for 3d graphics and multidimensional charts.

Wireshark Network Analysis in Action (2nd Edition)

[India] By Gandra Kumar Nana

Wireshark is an updated version of the bestselling book of the same name. This step-by-step guide explains how to use Wireshark and how to use it to solve real-world network problems.

Wireshark Version 2 provides an overview of Wireshark version 2, including Wireshark troubleshooting, packet capture filter, display filter, basic Information statistics tool, advanced Information statistics tool, and Expert Information tool. Ethernet and LAN switching, wireless LAN, network layer protocols and how they operate, Transport layer protocol analysis, FTP, HTTP/1 and HTTP/2, DNS protocol analysis, E-mail protocol analysis, NetBIOS and SMB protocol analysis, Enterprise Network application behavior analysis, Troubleshooting SIP, multimedia and IP phone faults, troubleshooting caused by low bandwidth or high latency, network security and network forensics knowledge.

Java Data Analysis Guide

By John R. Hubbard

Nowadays, data science has become a hot technical field, such as data processing, information retrieval, machine learning, natural language processing, data visualization and so on have been widely used and developed. As a classical programming language, Java also has outstanding performance in the field of data science.

This book aims to guide the reader through better data analysis through Java programming. The book contains 11 chapters, covering in detail important topics such as Introduction to Data Science, data preprocessing, data visualization, statistics, relational databases, regression analysis, classification analysis, clustering analysis, recommendation systems, NoSQL databases, and Java Big Data analysis.

Windows Hacker Programming techniques in detail

The GanDiWen

This book introduces the basic techniques of hacker programming, involving Windows programming under the user layer and Rootkit programming under the kernel layer. This book is divided into two parts, user and kernel, user includes 11 chapters, supporting 49 sample program source code; The kernel includes 7 chapters, supporting 28 sample program source code. Each technique described in this book has detailed implementation principles and corresponding sample code (supporting both 32-bit and 64-bit Windows 7, Windows 8.1 and Windows 10), designed to help beginners build the foundation of hacker programming techniques.