unit 1hardware—microwave integrated circuits/11.1classification of microwave integrated circuits/11.2microwave circuits in a communication system/61.3summary/91.4new words and expressions/101.5questions/101.6problems/12unit 2software—microsoft project 2013 andthe project management domain/132.1history of project management/132.2exploring project management industry standards/142.2.1project management body of knowledge (pmbok)/142.2.2prince2/182.3wbs, phases and control points, methodologies, and life cycles/202.3.1work breakdown structure(wbs)/202.3.2managerial control/212.3.3phases and gates/212.3.4methodologies/222.3.5life cycles/222.4using microsoft project with methodologies and life cycles/222.4.1waterfall development process/232.4.2iterative development/232.4.3research project/272.5accommodating teaming styles/272.6consultants tips/282.6.1determine the approach to use in managing your project/282.6.2use wbs as a first step in project definition/282.6.3use the 5×9 checklist for planning/292.7new words and expressions/292.8questions/302.9problems/31unit 3database—nosql databases: anoverview /323.1nosql: what does it mean/323.2why nosql databases/323.3aggregate data models/333.4distribution models/343.5cap theorem/353.6types of nosql databases/363.6.1keyvalue databases/363.6.2document databases/373.6.3column family stores/383.6.4graph databases/383.7why choose nosql database/403.8choosing nosql database/413.9schemaless ramifications/413.10conclusion/423.11new words and expressions/423.12questions/423.13problems/45unit 4programming—what softwarearchitects need to know about devops /464.1what software architects need to know about devops/464.2defining devops/464.3devops practices and architectural implications/484.4organizational aspects of devops/504.5implications for software architecture: microservices/514.6summary/524.7new words and expressions/534.8questions/534.9problems/56unit 5office computing—the ultimateplayers guide to minecraftxbox edition: gathering resources /575.1introducing the hud/575.2avoiding getting lost/605.3improving your tools/615.4chests: safely stashing your stuff/635.5avoiding monsters/645.6hunger management/665.7your mission: food, resources, and reconnaissance/675.7.1food on the run/685.7.2finding a building site/705.8a resourceful guide to the creative mode inventory/725.9the bottom line/745.10new words and expressions/745.11questions/755.12problems/77unit 6networking—troubleshooting methodsfor cisco ip networks/786.1troubleshooting principles/786.2structured troubleshooting approaches/816.2.1the topdown troubleshooting approach/836.2.2the bottomup troubleshooting approach/846.2.3the divideandconquertroubleshooting approach/856.2.4the followthepathtroubleshooting approach/866.2.5the compareconfigurations troubleshooting approach/876.2.6the swapcomponents troubleshooting approach/886.3troubleshooting example using six different approaches/896.4summary/916.5new words and expressions/916.6questions/926.7problems/94unit 7mobile application—whats special about mobile testing? /957.1user expectations/967.2mobility and data networks/977.3mobile devices/987.4mobile release cycles/1007.5mobile testing is software testing/1017.6summary/1027.7new words and expressions/1027.8questions/1037.9problems/105unit 8web development—the mobilecommerce revolution and the current state of mobile/1068.1americans and smartphones/1068.2mobile around the world/1098.3mobile commerce/1108.4beyond the numbers/1108.5the bottom line/1138.6new words and expressions/1138.7questions/1148.8problems/116unit 9security—information securityprinciples of success/1179.1introduction/1179.2principle 1: there is no such thing as absolute security/1179.3principle 2: the three security goals are confidentiality, integrity, and availability/1199.3.1integrity models/1199.3.2availability models/1209.4principle 3: defense in depth as strategy/1209.5principle 4: when left on their own, people tend to make the worst security decisions/1229.6principle 5: computer security depends on two types of requirements: functional and assurance/1229.7principle 6: security through obscurity is not an answer/1239.8principle 7: security = risk management/1249.9principle 8: the three types of security controls are preventative, detective, and responsive/1269.10principle 9: complexity is the enemy of security/1279.11principle 10: fear, uncertainty, and doubt do not work in selling security/1279.12principle 11: people, process, and technology are all needed to adequately secure a system or facility/1279.13principle 12: open disclosure of vulnerabilities is good for security!/1289.14summary/1299.15new words and expressions/1299.16questions/1309.17problems/131unit 10web services—designing softwarein a distributed world/13210.1visibility at scale/13310.2the importance of simplicity/13410.3composition/13410.3.1load balancer with multiple backend replicas/13410.3.2server with multiple backends/13610.3.3server tree/13810.4distributed state/13910.5the cap principle/14210.5.1consistency/14210.5.2availability/14310.5.3partition tolerance/14310.6loosely coupled systems/14510.7speed/14710.8summary/15010.9new words and expressions/15110.10questions/15110.11problems/153unit 11big data—big data computing/15411.1introduction/15411.2apache hadoop data modelling/15611.3nosql big data systems/15711.3.1key value stores/15711.3.2document databases/15711.3.3graph databases/15811.3.4xml databases/15811.3.5distributed peer stores/15811.3.6object stores/15911.4definitions of data management /15911.4.1data management/15911.4.2big data management (bdm)/16011.5the state of big data management/16011.6big data tools/16211.6.1big data tools: jaspersoft bi suite/16211.6.2big data tools: pentaho business analytics/16311.6.3big data tools: karmasphere studio andanalyst/16311.6.4big data tools: talend open studio/16411.6.5big data tools: skytree server/16411.6.6big data tools: tableau desktop and server/16511.6.7big data tools: splunk/16511.7new words and expressions/16611.8questions/16611.9problems/168unit 12cloud computing—the practice ofcloud system administration: operations in a distributed world/16912.1distributed systems operations/17012.1.1sre versus traditional enterprise it/17012.1.2change versus stability/17112.1.3defining sre/17312.1.4operations at scale/17412.2service life cycle/17712.2.1service launches/17812.2.2service decommissioning/18012.3organizing strategy for operational teams/18012.3.1team member day types/18312.3.2other strategies/18512.4virtual office/18612.4.1communication mechanisms/18712.4.2communication policies/18712.5summary/18812.6new words and expressions/18912.7questions/19012.8problems/191answers to questions/193references/194