IT eBooks
Download, Read, Use

Most Popular eBooks


The Official Raspberry Pi Handbook 2023

The Official Raspberry Pi Handbook 2023
Blockchain For Dummies, 2nd Edition

Blockchain For Dummies, 2nd Edition
Foundations of Machine Learning, 2nd Edition

Foundations of Machine Learning, 2nd Edition
Managing Cloud Native Data on Kubernetes

Managing Cloud Native Data on Kubernetes
An Introduction to C & GUI Programming, 2nd Edition

An Introduction to C & GUI Programming, 2nd Edition
Security as Code

Security as Code
Build a Raspberry Pi Media Player

Build a Raspberry Pi Media Player
Linux Commands Handbook

Linux Commands Handbook
A Graduate Course in Applied Cryptography

A Graduate Course in Applied Cryptography
Introduction to Data Science

Introduction to Data Science

Last Added eBooks


Practical Cloud Security, 2nd Edition
Practical Cloud Security, 2nd Edition
With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. In this updated second edition, you'll examine security best pract...
Cloud Native Security Cookbook
Cloud Native Security Cookbook
With the rise of the cloud, every aspect of IT has been shaken to its core. The fundamentals for building systems are changing, and although many of the principles that underpin security still ring tr...

Hybrid Cloud Backup For Dummies
Hybrid Cloud Backup For Dummies
Every modern technology-driven organization understands data is one of its most valuable assets. It's no surprise, then, that the protection of that data has become an increasing concern. This concern...
VMware Backup For Dummies, 2nd Edition
VMware Backup For Dummies, 2nd Edition
Server virtualization is one of the most disruptive innovations of the past twenty years. It is a foundational technology in cloud computing and has been widely deployed by businesses of all sizes in...

DevOps for Trustworthy Smart IoT Systems
DevOps for Trustworthy Smart IoT Systems
ENACT is a research project funded by the European Commission under its H2020 program. The project consortium consists of twelve industry and research member organisations spread across the whole EU....
Security Risk Management for the Internet of Things
Security Risk Management for the Internet of Things
In recent years, the rising complexity of Internet of Things (IoT) systems has increased their potential vulnerabilities and introduced new cybersecurity challenges. In this context, state of the art...

Db2 Optimization Techniques for SAP Database Migration to the Cloud
Db2 Optimization Techniques for SAP Database Migration to the Cloud
For many years, SAP migrations have been a standard process. An increasing number of customers are changing their database software to IBM Db2 for UNIX, Linux, and Windows or are moving their existing...
Mainframe Application Modernization Patterns for Hybrid Cloud
Mainframe Application Modernization Patterns for Hybrid Cloud
As businesses digitally transform, they can impose significant demands on existing mainframe applications and data requiring the need to modernize to achieve business outcomes. To meet this need for m...

Kubernetes Security
Kubernetes Security
Kubernetes has fundamentally changed the way DevOps teams create, manage, and operate container-based applications, but as with any production process, you can never provide enough security. This prac...
Web Application Firewalls
Web Application Firewalls
Firewalls have traditionally focused on network traffic, but with the advent of cloud computing and DevOps, security and operations professionals need a more sophisticated solution to track session st...

High Performance Privacy Preserving AI
High Performance Privacy Preserving AI
Artificial intelligence (AI) depends on data. In sensitive domains - such as healthcare, security, finance, and many more - there is therefore tension between unleashing the power of AI and maintainin...
Information Theory for Data Science
Information Theory for Data Science
Information theory deals with mathematical laws that govern the flow, representation and transmission of information, just as the field of physics concerns laws that govern the behavior of the physica...

RF Filter Technology For Dummies, 2nd Edition
RF Filter Technology For Dummies, 2nd Edition
The implementation of 5G and wireless applications is accelerating worldwide, along with the drive to deliver high data rates and high data capacity. This creates new challenges for wireless technolog...
Internet of Things For Dummies, 2nd Edition
Internet of Things For Dummies, 2nd Edition
The Internet of Things (IoT) is creating a new world - a quantifiable and measurable world - in which people can better manage their lives, cities can better manage their infrastructure, and companies...

Machine Learning at Enterprise Scale
Machine Learning at Enterprise Scale
Enterprises in traditional and emerging industries alike are increasingly turning to machine learning (ML) to maximize the value of their business data. But many of these teams are likely to experienc...
Creating a Data-Driven Enterprise in Media
Creating a Data-Driven Enterprise in Media
The data-driven revolution is finally hitting the media and entertainment industry. For decades, broadcast television and print media relied on traditional delivery channels for solvency and growth, b...

What Is eBPF?
What Is eBPF?
In just the past few years, the extended Berkeley Packet Filter (eBPF) has gone from relative obscurity to one of the hottest technology areas in modern infrastructure computing. With this report, Liz...
An Introduction to Cloud Databases
An Introduction to Cloud Databases
Cloud deployments have not only changed the way companies run mission critical databases; they've also transformed the roles of many people in production. With this practical report, database and syst...

Introduction to Numerical Methods and Matlab Programming for Engineers
Introduction to Numerical Methods and Matlab Programming for Engineers
This book originated from lecture notes developed by the lead author for a course in applied numerical methods, initially designed for Civil Engineering majors, and later expanded to include Mechanica...
Resilient Web Design
Resilient Web Design
Jeremy Keith begins by noting that the title Resilient Web Design might suggest a handbook for building robust websites, but clarifies that it is not a handbook - it is more like a history book. The t...

New Releases


HTML Handbook

HTML Handbook
CSS Handbook

CSS Handbook
Beej's Guide to Network Programming

Beej's Guide to Network Programming
Intermediate Statistics with R

Intermediate Statistics with R
Exploring JavaScript, ES2025 Edition

Exploring JavaScript, ES2025 Edition
The Linux Kernel Module Programming Guide

The Linux Kernel Module Programming Guide
Think Stats, 3rd Edition

Think Stats, 3rd Edition
Rexx Programmer's Reference, 2nd Edition

Rexx Programmer's Reference, 2nd Edition
Automate the Boring Stuff with Python, 3rd Edition

Automate the Boring Stuff with Python, 3rd Edition
Unlock Data Agility with Composable Data Architecture

Unlock Data Agility with Composable Data Architecture
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025