IT eBooks
Download, Read, Use
Exam Ref MD-100 Windows 10
Exam Ref MD-100 Windows 10

Prepare for Microsoft Exam MD-100: Windows 10 - and help demonstrate your real-world mastery of skills and knowledge required to deploy, configure, secure, manage, and monitor Windows devices and client applications. Designed for Windows administrators, Exam Ref MD-100: Windows 10 focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified Associate level. Focus on the expertise measured by these objectives: Deploy Windows; Manage devices and data; Configure connectivity; Maintain Windows. Exam MD-100: Windows 10 focuses on knowledge needed to deploy Windows; perform post-installation configuration; manage local users, local groups, and devices; configure data access and protection; configure devices with local policies; manage Windows security; configure networking; configure remote connectivity; configure system and data recovery; manage updates; and monitor and manage Windows. ...
Pro TBB
Pro TBB

This open access book is a modern guide for all C++ programmers to learn Threading Building Blocks (TBB). Written by TBB and parallel programming experts, this book reflects their collective decades of experience in developing and teaching parallel programming with TBB, offering their insights in an approachable manner. Throughout the book the authors present numerous examples and best practices to help you become an effective TBB programmer and leverage the power of parallel systems. Pro TBB starts with the basics, explaining parallel algorithms and C++'s built-in standard template library for parallelism. You'll learn the key concepts of managing memory, working with data structures and how to handle typical issues with synchronization. Later chapters apply these ideas to complex systems to explain performance tradeoffs, mapping common parallel patterns, controlling threads and overhead, and extending TBB to program heterogeneous systems or system-on-chips. Use Threading Buil ...
Rootkits and Bootkits
Rootkits and Bootkits

Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine's boot process or UEFI firmware. With the aid of numerous case studies and professional research from three of the world's leading security experts, you'll trace malware development over time from rootkits like TDL3 to present-day UEFI implants and examine how they infect a system, persist through reboot, and evade security software. As you inspect and dissect real malware, you'll learn: How Windows boots - including 32-bit, 64-bit, and UEFI mode - and where to find vulnerabilities; The details of boot process security mechanisms like Secure Boot, including an overview of Virtual Secure Mode (VSM) and Device Guard; Reverse engineering and forensic techniques for analyzing real malware, including bootkits like Rovnix/Carberp, Gapz, TDL4, and the infamous rootkits TDL3 and Festi; How to perform static and dynamic analysis using emulation and tools like Bochs ...
Micro:bit for Mad Scientists
Micro:bit for Mad Scientists

The BBC micro:bit is a tiny, inexpensive, and surprisingly powerful computer that you can use to build cool things and experiment with code. The 30 simple projects and experiments in this book will show you how to use the micro:bit to build a secret science lab - complete with robots, door alarms, lie detectors, and more - as you learn basic coding and electronics skills. Here are just some of the projects you'll build: A light-controlled guitar you can play just by waving your hand; A working lie detector; A self-watering plant care system; A two-wheeled robot; A talking robotic head with moving eyes; A door alarm made with magnets. Learn to code like a Mad Scientist! ...
Your Linux Toolbox
Your Linux Toolbox

Get the most out of your Linux system using tools you already have! These illustrated zines by Julia Evans will teach you how simple it can be to tame the powerful beast called Linux. And for the first time, her tips and tricks are together in one place. Find out what your programs are doing and why. Understand how your system's parts talk to each other and what to do when they bicker. And see how a cat GIF travels from a distant server to your very own screen. Includes 7 zines: So You Want to Be a Wizard; Bite-Size Linux! Networking, ACK! Let's Learn tcpdump! Linux Debugging Tools You'll Love; Spying on Your Programs with strace; Profiling & Tracing with perf. ...
The Rust Programming Language
The Rust Programming Language

The Rust Programming Language is the official book on Rust: an open source systems programming language that helps you write faster, more reliable software. Rust offers control over low-level details (such as memory usage) in combination with high-level ergonomics, eliminating the hassle traditionally associated with low-level languages. The authors of The Rust Programming Language, members of the Rust Core Team, share their knowledge and experience to show you how to take full advantage of Rust's features - from installation to creating robust and scalable programs. You'll begin with basics like creating functions, choosing data types, and binding variables and then move on to more advanced concepts, such as: Ownership and borrowing, lifetimes, and traits; Using Rust's memory safety guarantees to build fast, safe programs; Testing, error handling, and effective refactoring; Generics, smart pointers, multithreading, trait objects, and advanced pattern matching; Using Cargo, Rust's b ...
Build Your Own IoT Platform
Build Your Own IoT Platform

Discover how every solution in some way related to the IoT needs a platform and how to create that platform. This book is about being agile and reducing time to market without breaking the bank. It is about designing something that you can scale incrementally without having to do a lot of rework and potentially disrupting your current state of the work. So the key questions are: what does it take, how long does it take, and how much does it take to build your own IoT platform? Build Your Own IoT Platform answers these questions and provides you with step-by-step guidance on how to build your own IoT platform. The author bursts the bubble of IoT platforms and highlights what the core of an IoT platform looks like. There are must-haves and there are nice-to-haves; this book will distinguish the two and focus on how to build the must-haves. Building your own IoT platform is not only the biggest cost saver, but also can be a satisfying learning experience, giving you control over you ...
Practical Oracle JET
Practical Oracle JET

Learn how to use Oracle's JavaScript Extension Toolkit (JET) as a solution to the all too common problem of internal back office and intranet applications that are typically ugly, clunky, and cumbersome to use. JET simultaneously provides you with a JavaScript toolkit that is cutting-edge while being stable enough for enterprise development in an ecosystem that is notorious for its fast-paced rate of change. Practical Oracle JET walks through the process of developing a functional application using Oracle JET. By the end of this book you will have built a support ticket system using a variety of different components bundled with the toolkit, including lists, inputs, and visualizations. The skills acquired from reading this book and working the examples equip you to build your own applications and take your understanding even further to more advanced topics. Build a real-world Oracle JET application; Understand the fundamental technologies used in JET; Control look and feel throug ...
AI Blueprints
AI Blueprints

AI Blueprints gives you a working framework and the techniques to build your own successful AI business applications. You'll learn across six business scenarios how AI can solve critical challenges with state-of-the-art AI software libraries and a well thought out workflow. Along the way you'll discover the practical techniques to build AI business applications from first design to full coding and deployment. The AI blueprints in this book solve key business scenarios. The first blueprint uses AI to find solutions for building plans for cloud computing that are on-time and under budget. The second blueprint involves an AI system that continuously monitors social media to gauge public feeling about a topic of interest - such as self-driving cars. You'll learn how to approach AI business problems and apply blueprints that can ensure success. The next AI scenario shows you how to approach the problem of creating a recommendation engine and monitoring how those recommendations perfor ...
Becoming the Hacker
Becoming the Hacker

Becoming the Hacker will teach you how to approach web penetration testing with an attacker's mindset. While testing web applications for performance is common, the ever-changing threat landscape makes security testing much more difficult for the defender. There are many web application tools that claim to provide a complete survey and defense against potential threats, but they must be analyzed in line with the security needs of each web application or service. We must understand how an attacker approaches a web application and the implications of breaching its defenses. Through the first part of the book, Adrian Pruteanu walks you through commonly encountered vulnerabilities and how to take advantage of them to achieve your goal. The latter part of the book shifts gears and puts the newly learned techniques into practice, going over scenarios where the target may be a popular content management system or a containerized application and its network. Becoming the Hacker is a c ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025