IT eBooks
Download, Read, Use
Hadoop MapReduce v2 Cookbook, 2nd Edition
Hadoop MapReduce v2 Cookbook, 2nd Edition

Starting with installing Hadoop YARN, MapReduce, HDFS, and other Hadoop ecosystem components, with this book, you will soon learn about many exciting topics such as MapReduce patterns, using Hadoop to solve analytics, classifications, online marketing, recommendations, and data indexing and searching. You will learn how to take advantage of Hadoop ecosystem projects including Hive, HBase, Pig, Mahout, Nutch, and Giraph and be introduced to deploying in cloud environments. Finally, you will be able to apply the knowledge you have gained to your own real-world scenarios to achieve the best-possible results. ...
Arduino Android Blueprints
Arduino Android Blueprints

Arduino is an open source microcontroller built on a single-circuit board that is capable of receiving sensory input from the environment and controlling interactive physical objects. The first few projects of this book will focus on displaying tweets within your app by connecting to Twitter, controlling basic functions of the Arduino board, and connecting an Arduino-powered weather station to an Android phone via Bluetooth. Next, you will learn how to use the Arduino Yún board to connect a standard USB camera to a local Wi-Fi network. At the end of the book, you will build a simple mobile robot, connect it to an Arduino board and a Bluetooth module, then control the robot from an Android phone using Bluetooth. Each project is explained in a step-by-step fashion, always starting with the choice of components and the assembly of the hardware. ...
Python Penetration Testing Essentials
Python Penetration Testing Essentials

This book is a practical guide that shows you the advantages of using Python for pentesting with the help of detailed code examples. We start by exploring the basics of networking with Python and then proceed to network hacking. Next, we delve into hacking the application layer where we start with gathering information from a website. We then move on to concepts related to website hacking such as parameter tampering, DDoS, XSS, and SQL injection. By reading this book, you will learn different techniques and methodologies that will familiarize you with the art of pentesting as well as creating automated programs to find the admin console, SQL injection, and XSS attack. ...
Python for Google App Engine
Python for Google App Engine

Google App Engine is a key component of the Google Cloud Platform and one of the most comprehensive cloud services. Together with Python, the first programming language ever supported by the platform, Google App Engine favors rapid development, significantly contributing to the success of your projects. This book will guide you through the Google Cloud Platform starting from the basics all the way through successfully designing, building, and running modern and scalable web applications in Python with Google App Engine. From authentication to data storage, and from asynchronous jobs to server push techniques, you will learn how to use services such as datastore, cloud storage, Cloud SQL, task queues and channels in a Python application based on web frameworks such as Webapp2 and Django. As the topics in this book are covered in a step-by-step fashion, you will get to grips with the information quickly and easily. ...
VMware vRealize Orchestrator Cookbook
VMware vRealize Orchestrator Cookbook

Through this practical guide, you will gain an understanding of VMware vRealize Orchestrator and its role in the vSphere architecture and automation. You will learn about Orchestrator clusters as well as vRealize Automation integration. A full introduction to using the visual programming tools without needing any additional infrastructure is aimed at beginners with limited resources. This is followed by an extensive look at how to integrate the base plugins into your workflows, such as e-mail, AMQP, SNMP, and so on. We will also look at how to use the Orchestrator API to trigger workflows from other programs. Through this book you will be able to get the most out of your Orchestrator installation, and develop complex workflows and create your own highly integrated automations of vCenter, vCloud, and vRealize environments. ...
Apache Hive Essentials
Apache Hive Essentials

In this book, we prepare you for your journey into big data by firstly introducing you to backgrounds in the big data domain along with the process of setting up and getting familiar with your Hive working environment. Next, the book guides you through discovering and transforming the values of big data with the help of examples. It also hones your skill in using the Hive language in an efficient manner. Towards the end, the book focuses on advanced topics such as performance, security, and extensions in Hive, which will guide you on exciting adventures on this worthwhile big data journey. By the end of the book, you will be familiar with Hive and able to work efficiently to find solutions to big data problems. ...
Jenkins Continuous Integration Cookbook, 2nd Edition
Jenkins Continuous Integration Cookbook, 2nd Edition

Jenkins is an award-wining and one of the most popular Continuous Integration servers in the market today. It was designed to maintain, secure, communicate, test, build, and improve the software development process. This book starts by examining the most common maintenance tasks. This is followed by steps that enable you to enhance the overall security of Jenkins. You will then explore the relationship between Jenkins builds and Maven pom.xml. Then, you will learn how to use plugins to display code metrics and fail builds to improve quality, followed by how to run performance and functional tests against a web application and web services. Finally, you will see what the available plugins are, concluding with best practices to improve quality. ...
R for Data Science
R for Data Science

R is a powerful, open source, functional programming language. It can be used for a wide range of programming tasks and is best suited to produce data and visual analytics through customizable scripts and commands. The purpose of the book is to explore the core topics that data scientists are interested in. This book draws from a wide variety of data sources and evaluates this data using existing publicly available R functions and packages. In many cases, the resultant data can be displayed in a graphical form that is more intuitively understood. You will also learn about the often needed and frequently used analysis techniques in the industry. By the end of the book, you will know how to go about adopting a range of data science techniques with R. ...
Mastering Wireless Penetration Testing for Highly Secured Environments
Mastering Wireless Penetration Testing for Highly Secured Environments

Penetration testing is a tool for testing computer systems, networks, or web applications to find vulnerabilities that an attacker could exploit. By performing a penetration test, you can proactively identify which vulnerabilities are most critical. This allows your organization to more intelligently prioritize remediation and apply necessary security patches to ensure that they are available. This book covers how to set up Kali Linux, scan and sniff wireless networks, and crack WEP, WPA, and even WPA2 encryption. By the end of this book, you will feel much more confident when it comes to conducting wireless penetration tests, and you will have a full understanding of wireless security threats. This book is full of hands-on demonstrations and how-to tutorials. This will benefit you, as the reader, when it comes to security awareness. Having some knowledge of wireless penetration testing would be helpful. ...
Learning Internet of Things
Learning Internet of Things

This book starts by exploring the popular HTTP, UPnP, CoAP, MQTT, and XMPP protocols. You will learn how protocols and patterns can put limitations on network topology and how they affect the direction of communication and the use of firewalls. Thing registries and delegation of trust are introduced as important tools to secure the life cycle of Things on the Internet. Once the fundamentals have been mastered, your focus will move to the Internet of Things architecture. A secure architecture is proposed that will take full advantage of the power of Internet of Things and at the same time protect end user integrity and private personal data without losing flexibility and interoperability. This book provides you with a practical overview of the existing protocols, communication patterns, architectures, and security issues important to Internet of Things. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025