IT eBooks
Download, Read, Use

Apress

JSON Quick Syntax Reference
JSON Quick Syntax Reference

This compact quick scripting syntax reference on JSON covers syntax and parameters central to JSON object definitions, using the NetBeans 8.1 open source and Eclipse IDE software tool packages. JSON Quick Syntax Reference covers the syntax used in the JSON object definition language, logically organized by topical chapters, and getting more advanced as chapters progress, covering structures and file formats which are best for use with HTML5. Furthermore, this book includes the key factors regarding the data footprint optimization work process, the in-lining of .CSS and .JS files, and why a data footprint optimization work process is important. ...
Java XML and JSON
Java XML and JSON

This is your one-stop guide to mastering the XML metalanguage and JSON data format along with significant Java APIs for parsing and creating XML/JSON documents (and more). The first six chapters focus on XML along with the SAX, DOM, StAX, XPath, and XSLT APIs. The remaining four chapters focus on JSON along with the mJson, GSON, and JsonPath APIs. Each chapter in Java XML and JSON ends with select exercises designed to challenge your grasp of the chapter's content. An appendix provides the answers to these exercises. ...
Java Design Patterns
Java Design Patterns

Learn how to implement design patterns in Java: each pattern in Java Design Patterns is a complete implementation and the output is generated using Eclipse, making the code accessible to all. The examples are chosen so you will be able to absorb the core concepts easily and quickly. This book presents the topic of design patterns in Java in such a way that anyone can grasp the idea. By giving easy to follow examples, you will understand the concepts with increasing depth. The examples presented are straightforward and the topic is presented in a concise manner. This is a practitioner's book on design patterns in Java. Design patterns are a popular topic in software development. A design pattern is a common, well-described solution to a common software problem. There is a lot of written material available on design patterns, but scattered and not in one single reference source. Also, many of these examples are unnecessarily big and complex. ...
Introducing Zurb Foundation 6
Introducing Zurb Foundation 6

Introduction to Zurb Foundation 6 is your easy-to-digest brief introduction to this exciting technology for building responsive and mobile-first websites. Using this book, you'll understand the basics of the latest iteration which comes with new and exciting features. You will understand how to incorporate Foundation into your HTML file and the various options you have, including typography, utility classes, media, forms, buttons and much more. This book will jumpstart your knowledge with an easy-to-follow approach so you can come to grips with the latest version of the framework. A downloadable code bundle is also included for you to play with, and therefore understand, the subtle nuances of the latest version. ...
Introducing SEO
Introducing SEO

Your easy-to-digest brief introduction to SEO (search engine optimization) - an imperative methodology used to improve the visibility of websites using different strategies and techniques. Using a calculative and practical approach, this book teaches you the techniques, practical implementations, and concepts of SEO that will enable you to get to grips with the fundamental aspects of search engine optimization. Introducing SEO jumpstarts your knowledge using an easy-to-follow approach – add it to your library today. ...
Introducing Meteor
Introducing Meteor

Meteor is a full stack application platform that makes it easy to build powerful, real time Web apps quickly. Introducing Meteor is a short book guiding you through building top-quality Web apps in a fraction of the time using an application platform built for the modern web. This book takes you from installing the development environment all the way through deploying a live app, and everything in between. Introducing Meteor covers how to build a prototype app in days instead of weeks; how to take advantage of reactive templates; leverage the hundreds of Smart Packages available; and employ best practices and avoid common errors made by beginners. Meteor gives you the tools you need to build better apps faster. Web apps have come a long way since the 1990s, but they still require a lot of time, specialized knowledge and complex setups. Introducing Meteor shows you a better way. ...
Introducing Linux Distros
Introducing Linux Distros

The first barrier that a new Linux user has to face is the overwhelming number of "flavors" that this operating system has. These "flavors" are commonly known as distros (from distribution), and to date there are more than three hundred active distros to choose from. So, how to choose one? You can choose the most popular at the moment, or take heed of what your friend says, but are you sure that this is the one that you need? Making the wrong decision on this matter is behind a good number of disappointments with this operating system. You need to choose the distro that is right for you and your needs. Introducing Linux Distros teaches you the pros and the cons of the most frequently used distros in order to find the one that is right for you. You will explore each distro step by step, so that you don't have to endure hours of web surfing, countless downloads, becoming confused by new concepts and, in the worst cases, reading complex and marathon installation gui ...
Building a Virtual Assistant for Raspberry Pi
Building a Virtual Assistant for Raspberry Pi

Build a voice-controlled virtual assistant using speech-to-text engines, text-to-speech engines, and conversation modules. This book shows you how to program the virtual assistant to gather data from the internet (weather data, data from Wikipedia, data mining); play music; and take notes. Each chapter covers building a mini project/module to make the virtual assistant better. You'll develop the software on Linux or OS X before transferring it to your Raspberry Pi, ready for deploying in your own home-automation or Internet of Things applications. Building a Virtual Assistant for Raspberry Pi walks you through various STTs and TTSs and the implementation of these components with the help of Python. After that you will start implementing logic for handling user queries and commands, so that the user can have conversations with Melissa. You will then work to improve logic handling to detect what the user wants Melissa to do. You will also work on building some useful applications/modu ...
.NET Development Using the Compiler API
.NET Development Using the Compiler API

This is the first book to describe the recent significant changes to the .NET compilation process and demonstrate how .NET developers can use the new Compiler API to create compelling applications. As an open source compiler, the Compiler API now makes its code available for anyone to use. In this book, you'll get a concise, focused view of this tremendous resource for developers, who can now use any part of the platform implementation to their advantage in analyzing applications, improving code generation, and providing enforceable patterns, all under an OSS model. You will learn how to analyze your code for defects in a fast, clean manner never available before. You'll work with solutions and projects to provide automatic refactoring, and you'll discover how you can generate code dynamically to provide application implementations at runtime Having the Compiler API available opens a number of doors for .NET developers that were either simply not there before, or difficult to ach ...
Cyber-Physical Attack Recovery Procedures
Cyber-Physical Attack Recovery Procedures

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those things at the same time—even from the other side of the planet. Not every equipment failure or power outage is a cyber-physical attack. When your building is attacked, you probably won't suspect it was a hacker—until you see a pattern. The building control system (BCS) will act "squirrelly" and you will know—it really is a cyber-physical attack. Once a cyber-physical attack occurs, it can mean years of court cases, job losses, higher insurance rates, and maybe even criminal litigation. It also takes years to overcome the loss of safety credibility to your emplo ...
Building a Comprehensive IT Security Program
Building a Comprehensive IT Security Program

This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the current situation as it relates to cybersecurity, the challenges facing private business, and the fundamental changes organizations can make to better protect themselves. The problems we face are difficult, but they are not hopeless. Cybercrime continues to grow at an astounding rate. With constant coverage of cyber-attacks in the media, there is no shortage of awareness of increasing threats. Budgets have increased and executives are implementing stronger defenses. Nonetheless, breaches continue to increase in frequency and scope. Building a Comprehensive IT Security Program shares why organizations continue to fail to secure their critical inform ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2026