IT eBooks
Download, Read, Use
Exam Ref AZ-900 Microsoft Azure Fundamentals
Exam Ref AZ-900 Microsoft Azure Fundamentals

Prepare for Microsoft Exam AZ-900 - and help demonstrate your real-world mastery of cloud services and how they can be provided with Microsoft Azure. Designed for professionals in any non-technical or technical role, Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified Fundamentals level. Focus on the expertise measured by these objectives: Understand cloud concepts; Understand core Azure services; Understand security, privacy, compliance, and trust; Understand Azure pricing and support. Exam AZ-900 focuses on knowledge needed to evaluate cloud service's value; explain IaaS, PaaS, and SaaS; compare public, private, and hybrid cloud models; understand core Azure architectural components, products, and management tools; describe the Azure Marketplace, its usage, and key solutions; understand Azure security, identity services, and monitoring; manage privacy, compliance, and data protection; price subscriptions and manage ...
Modernizing the Datacenter with Windows Server and Hybrid Cloud
Modernizing the Datacenter with Windows Server and Hybrid Cloud

Transform your datacenter for breakthrough flexibility, agility, and scalability! Using public, private, and hybrid cloud services, you can transform your datacenter to serve fast-changing workloads, process and analyze enormous amounts of data, and achieve unprecedented flexibility and value. In this guide, two world-renowned experts in Microsoft datacenter technology show how to effectively leverage current legacy systems as you incorporate your optimal mix of cloud services. Drawing on extensive experience implementing Microsoft cloud solutions, they walk you step-by-step through your entire transition: strategy, deployment, security, identity protection, management, PowerShell automation, and more. Two concluding chapters offer indispensable advice for maximizing datacenter efficiency and supporting future innovation. Two leading enterprise cloud and Windows Server experts show how to: Move from legacy IT models to an agile service structure; Implement managed self-service, ...
Demystifying Internet of Things Security
Demystifying Internet of Things Security

Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions Secure devices, immunizing them against different threats originating from inside and outside the network; Gather an over ...
The Secret Life of Programs
The Secret Life of Programs

Many coders are unfamiliar with the underlying technologies that make their programs run. But why should you care when your code appears to work? Because you want it to run well and not be riddled with hard-to-find bugs. You don't want to be in the news because your code had a security problem. Lots of technical detail is available online but it's not organized or collected into a convenient place. In The Secret Life of Programs, veteran engineer Jonathan E. Steinhart explores - in depth - the foundational concepts that underlie the machine. Subjects like computer hardware, how software behaves on hardware, as well as how people have solved problems using technology over time. You'll learn: How the real world is converted into a form that computers understand, like bits, logic, numbers, text, and colors; The fundamental building blocks that make up a computer including logic gates, adders, decoders, registers, and memory; Why designing programs to match computer hardware, especia ...
Pro MERN Stack, 2nd Edition
Pro MERN Stack, 2nd Edition

Assemble the complete stack required to build a modern web app using MongoDB, Express, React, and Node. This book also covers many other complementary tools: React Router, GraphQL, React-Bootstrap, Babel, and Webpack. This new edition will use the latest version of React (React 16) and the latest React Router (React Router 4), which has a significantly different approach to routing compared to React Router 2 which was used in the first edition of the book. Though the primary focus of Pro MERN Stack is to equip you with all that is required to build a full-fledged web application, a large portion of the book will be devoted to React 16. The popular MEAN (MongoDB, Express, AngularJS, Node) stack introduced Single Page Apps (SPAs) and front-end Model-View-Controller (MVC) as new and efficient paradigms. Facebook's React is a technology that competes indirectly with AngularJS. It is not a full-fledged MVC framework. It is a JavaScript library for building user interfaces (in some se ...
Build Your Own IoT Platform
Build Your Own IoT Platform

Discover how every solution in some way related to the IoT needs a platform and how to create that platform. This book is about being agile and reducing time to market without breaking the bank. It is about designing something that you can scale incrementally without having to do a lot of rework and potentially disrupting your current state of the work. So the key questions are: what does it take, how long does it take, and how much does it take to build your own IoT platform? Build Your Own IoT Platform answers these questions and provides you with step-by-step guidance on how to build your own IoT platform. The author bursts the bubble of IoT platforms and highlights what the core of an IoT platform looks like. There are must-haves and there are nice-to-haves; this book will distinguish the two and focus on how to build the must-haves. Building your own IoT platform is not only the biggest cost saver, but also can be a satisfying learning experience, giving you control over you ...
Foundations of Blockchain
Foundations of Blockchain

Blockchain technology is a combination of three popular concepts: cryptography, peer-to-peer networking, and game theory. This book is for anyone who wants to dive into blockchain from first principles and learn how decentralized applications and cryptocurrencies really work. This book begins with an overview of blockchain technology, including key definitions, its purposes and characteristics, so you can assess the full potential of blockchain. All essential aspects of cryptography are then presented, as the backbone of blockchain. For readers who want to study the underlying algorithms of blockchain, you'll see Python implementations throughout. You'll then learn how blockchain architecture can create decentralized applications. You'll see how blockchain achieves decentralization through peer-to-peer networking, and how a simple blockchain can be built in a P2P network. You'll learn how these elements can implement a cryptocurrency such as Bitcoin, and the wider applications of ...
Becoming the Hacker
Becoming the Hacker

Becoming the Hacker will teach you how to approach web penetration testing with an attacker's mindset. While testing web applications for performance is common, the ever-changing threat landscape makes security testing much more difficult for the defender. There are many web application tools that claim to provide a complete survey and defense against potential threats, but they must be analyzed in line with the security needs of each web application or service. We must understand how an attacker approaches a web application and the implications of breaching its defenses. Through the first part of the book, Adrian Pruteanu walks you through commonly encountered vulnerabilities and how to take advantage of them to achieve your goal. The latter part of the book shifts gears and puts the newly learned techniques into practice, going over scenarios where the target may be a popular content management system or a containerized application and its network. Becoming the Hacker is a c ...
The Art of CRM
The Art of CRM

CRM systems have delivered huge value to organizations. This book shares proven and cutting-edge techniques to increase the power of CRM even further. In The Art of CRM, Max Fatouretchi shares his decades of experience building successful CRM systems that make a real difference to business performance. Through clear processes, actionable advice, and informative case studies, The Art of CRM teaches you to design successful CRM systems for your clients. Fatouretchi, founder of Academy4CRM institute, draws on his experience over 20 years and 200 CRM implementations worldwide. Bringing CRM bang up to date, The Art of CRM shows how to add AI and machine learning, ensure compliance with GDPR, and choose between on-premise, cloud, and hybrid hosting solutions. If you're looking for an expert guide to real-world CRM implementations, this book is for you. ...
Learn Linux in a Month of Lunches
Learn Linux in a Month of Lunches

Learn Linux in a Month of Lunches shows you how to install and use Linux for all the things you do with your OS, like connecting to a network, installing software, and securing your system. Whether you're just curious about Linux or have to get up and running for your job, you'll appreciate how this book concentrates on the tasks you need to know how to do in 23 easy lessons. If you've only used Windows or Mac OS X, you may be daunted by the Linux operating system. And yet learning Linux doesn't have to be hard, and the payoff is great. Linux is secure, flexible, and free. It's less susceptible to malicious attacks, and when it is attacked, patches are available quickly. If you don't like the way it looks or behaves, you can change it. And best of all, Linux allows users access to different desktop interfaces and loads of software, almost all of it completely free. Learn Linux in a Month of Lunches shows you how to install and use Linux for all the things you do with your OS, lik ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025