IT eBooks
Download, Read, Use
Learning Jupyter 5, 2nd Edition
Learning Jupyter 5, 2nd Edition

The Jupyter Notebook allows you to create and share documents that contain live code, equations, visualizations, and explanatory text. The Jupyter Notebook system is extensively used in domains such as data cleaning and transformation, numerical simulation, statistical modeling, and machine learning. Learning Jupyter 5 will help you get to grips with interactive computing using real-world examples. The book starts with a detailed overview of the Jupyter Notebook system and its installation in different environments. Next, you will learn to integrate the Jupyter system with different programming languages such as R, Python, Java, JavaScript, and Julia, and explore various versions and packages that are compatible with the Notebook system. Moving ahead, you will master interactive widgets and namespaces and work with Jupyter in a multi-user mode. By the end of this book, you will have used Jupyter with a big dataset and be able to apply all the functionalities you've explored throu ...
Word 2019 For Dummies
Word 2019 For Dummies

Whether you've used older versions of this popular program or have never processed a single word, this hands-on guide gets you going with the latest version of Microsoft Word. In no time, you'll begin editing, formatting, proofing, and dressing up your Word documents like a pro. In this leading book about the world's number one word processing application, Dan Gookin talks about using Microsoft Word in friendly, easy-to-follow terms. Focusing on the needs of the beginning Word user, it provides everything you need to know about Word - without any painful jargon. Covers the new and improved features found in the latest version of Word; Create your own templates; Explains why you can't always trust the spell checker; Offers little-known keyboard shortcuts. If you're new to Word and want to spend more time on your actual work rather than figuring out how to make it work for you, this new edition of Word X For Dummies has you covered. ...
Building Xamarin.Forms Mobile Apps Using XAML
Building Xamarin.Forms Mobile Apps Using XAML

Leverage Xamarin.Forms to build iOS and Android apps using a single, cross-platform approach. This book is the XAML companion to the C# guide Xamarin Mobile Application Development. You'll begin with an overview of Xamarin.Forms, then move on to an in-depth XAML (eXtensible Application Markup Language) primer covering syntax, namespaces, markup extensions, constructors, and the XAML standard. XAML gives us both the power of decoupled UI development and the direct use of Xamarin.Forms elements. This book explores the core of the Xamarin.Forms mobile app UI: using layouts and FlexLayouts to position controls and views to design and build screens, formatting your UI using resource dictionaries, styles, themes and CSS, then coding user interactions with behaviors, commands, and triggers. You'll see how to use XAML to build sophisticated, robust cross-platform mobile apps and help your user get around your app using Xamarin.Forms navigation patterns. Building Xamarin.Forms Mobile Ap ...
Secure by Design
Secure by Design

Secure by Design teaches developers how to use design to drive security in software development. This book is full of patterns, best practices, and mindsets that you can directly apply to your real world development. You'll also learn to spot weaknesses in legacy code and how to address them. Security should be the natural outcome of your development process. As applications increase in complexity, it becomes more important to bake security-mindedness into every step. The secure-by-design approach teaches best practices to implement essential software features using design as the primary driver for security. Secure by Design teaches you principles and best practices for writing highly secure software. At the code level, you'll discover security-promoting constructs like safe error handling, secure validation, and domain primitives. You'll also master security-centric techniques you can apply throughout your build-test-deploy pipeline, including the unique concerns of modern micro ...
Raspberry Pi Projects for Kids
Raspberry Pi Projects for Kids

The Raspberry Pi is an inexpensive, pocket-sized computer that will help you build and code your own hardware projects. Raspberry Pi Projects for Kids will show you how to harness the power of the Raspberry Pi to create 12 cool projects using simple code and common materials like a webcam, microphone, and LED lights. Step-by-step instructions and detailed diagrams guide you through each project. After a brief introduction to the Python programming language, you'll learn how to: Create an LED night-light that turns itself on and off; Set up a Raspberry Pi camera to take selfies and videos; Set up a webcam to stream video to your cell phone; Manipulate environments in Minecraft; Hijack local radio waves to play your own songs and recordings; Configure Raspberry Pi to send texts to a cell phone; Track your family members locations via wi-fi and Bluetooth; Create an MP3 player; Set up a camera to take motion-triggered photos of wildlife; Control the electronics in your home with your ...
A Graduate Course in Applied Cryptography
A Graduate Course in Applied Cryptography

Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making it relatively easy to incorporate strong encryption into a wide range of applications. While extremely useful, cryptography is also highly brittle. The most secure cryptographic system can be rendered completely insecure by a single specification or programming error. No amount of unit testing will uncover a security vulnerability in a cryptosystem. Instead, to argue that a cryptosystem is secure, we rely on mathematical modeling and proofs to show that a particular system satisfies the security properties attributed to it. We often need to introduce certain plausible assumptions to push our security arguments through. ...
Rational Cybersecurity for Business
Rational Cybersecurity for Business

Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will know how to prioritize your security program, and motivate and retain your team. Misalignment between security and your business can start at the top at the C-suite or happen at the line of business, IT, development, or user level. It has a corrosive effect on any security project it touches. But it does not have to be like this. Author Dan Blum presents valuable lessons learned from interviews with over 70 security and business leaders. You will discover how to successfully solve issues related to: risk management, operational security, privacy protection, hybrid cloud management, security culture and user awareness, and communication challenges. This open access book presents si ...
Adversarial Tradecraft in Cybersecurity
Adversarial Tradecraft in Cybersecurity

Little has been written about what to do when live hackers are on your system and running amok. Even experienced hackers tend to choke up when they realize the network defender has caught them and is zoning in on their implants in real time. This book will provide tips and tricks all along the kill chain of an attack, showing where hackers can have the upper hand in a live conflict and how defenders can outsmart them in this adversarial game of computer cat and mouse. This book contains two subsections in each chapter, specifically focusing on the offensive and defensive teams. It begins by introducing you to adversarial operations and principles of computer conflict where you will explore the core principles of deception, humanity, economy, and more about human-on-human conflicts. Additionally, you will understand everything from planning to setting up infrastructure and tooling that both sides should have in place. Throughout this book, you will learn how to gain an advantage ove ...
Raspberry Pi Camera Guide
Raspberry Pi Camera Guide

Take pictures and shoot video with your Raspberry Pi. Connecting a High Quality Camera or Camera Module turns your favourite credit-card-sized computer into a powerful digital camera. Learn how to set up and control the camera to capture stills and video footage. Discover the numerous modes and effects available, and use the camera in a variety of exciting projects across 17 packed chapters: - Set up the new High Quality Camera, attach a lens, and start capturing stunning hi-res images - Take selfies and shoot stop-motion videos - Build a wildlife camera and also an underwater one - Make a smart door with a video doorbell - Set up a security camera to monitor your home - And much, much more! ...
Code the Classics
Code the Classics

This stunning 224-page hardback book not only tells the stories of some of the seminal video games of the 1970s and 1980s, but shows you how to create your own games inspired by them using Python and Pygame Zero, following examples programmed by Raspberry Pi founder Eben Upton. In the first of two volumes, we remake five classic video games - ranging from Pong to Sensible Soccer, each represents a different genre. We interview the games' original creators and learn from their example, as well as utilise the art and audio engineering skills of two of the 1980s' most prolific games developers for our recreated versions of the games. - Get game design tips and tricks from the masters; - Explore the code listings and find out how they work; - Download and play game examples by Eben Upton; - Learn how to code your own games with Pygame Zero; - Read interviews with expert graphics and audio creators. ...
← Prev      
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025