IT eBooks
Download, Read, Use
The Book of Kubernetes
The Book of Kubernetes

Containers ensure that software runs reliably no matter where it's deployed, and Kubernetes is the open-source platform that lets you manage all of your containers from a single control plane. In this comprehensive tour of Kubernetes, each chapter includes a set of examples with just enough automation to start your container exploration with ease. The book begins with an overview of modern application architecture and the benefits of and requirements for containers and orchestration. It describes Linux control groups, process isolation, and network namespaces, and how to build container images. You'll then create containers, deploy and administer a Kubernetes cluster, and learn how to debug Kubernetes all the way down to the operating system and the network. You'll gain a deep understanding of containerization and Kubernetes, as well as how container networking works at the packet level across multiple nodes in a cluster. ...
The Art of Clean Code
The Art of Clean Code

Most software developers waste thousands of hours working with overly complex code. The eight core principles in The Art of Clean Code will teach you how to write clear, maintainable code without compromising functionality. The book's guiding principle is simplicity: reduce and simplify, then reinvest energy in the important parts to save you countless hours and ease the often onerous task of code maintenance. Bestselling author Christian Mayer leverages his experience helping thousands perfect their coding skills in this new book. This Python-based guide is suitable for programmers at any level, with ideas presented in a language-agnostic manner. ...
The Recursive Book of Recursion
The Recursive Book of Recursion

Recursion has an intimidating reputation: it's considered to be an advanced computer science topic frequently brought up in coding interviews. But there's nothing magical about recursion. The Recursive Book of Recursion uses Python and JavaScript examples to teach the basics of recursion, exposing the ways that it's often poorly taught and clarifying the fundamental principles of all recursive algorithms. You'll learn when to use recursive functions (and, most importantly, when not to use them), how to implement the classic recursive algorithms often brought up in job interviews, and how recursive techniques can help solve countless problems involving tree traversal, combinatorics, and other tricky topics. Al Sweigart has built a career explaining programming concepts in a fun, approachable manner. If you've shied away from learning recursion but want to add this technique to your programming toolkit, or if you're racing to prepare for your next job interview, this book is for y ...
The Art of Mac Malware
The Art of Mac Malware

Defenders must fully understand how malicious software works if they hope to stay ahead of the increasingly sophisticated threats facing Apple products today. The Art of Mac Malware: The Guide to Analyzing Malicious Software is a comprehensive handbook to cracking open these malicious programs and seeing what's inside. Discover the secrets of nation state backdoors, destructive ransomware, and subversive cryptocurrency miners as you uncover their infection methods, persistence strategies, and insidious capabilities. Then work with and extend foundational reverse-engineering tools to extract and decrypt embedded strings, unpack protected Mach-O malware, and even reconstruct binary code. Next, using a debugger, you'll execute the malware, instruction by instruction, to discover exactly how it operates. In the book's final section, you'll put these lessons into practice by analyzing a complex Mac malware specimen on your own. A former NSA hacker and current leader in the field of ma ...
Measure, Integration & Real Analysis
Measure, Integration & Real Analysis

This open book welcomes students into the fundamental theory of measure, integration, and real analysis. Focusing on an accessible approach, Axler lays the foundations for further study by promoting a deep understanding of key results. Content is carefully curated to suit a single course, or two-semester sequence of courses, creating a versatile entry point for graduate studies in all areas of pure and applied mathematics. Extensively class tested at multiple universities and written by an award-winning mathematical expositor, Measure, Integration & Real Analysis is an ideal resource for students at the start of their journey into graduate mathematics. A prerequisite of elementary undergraduate real analysis is assumed; students and instructors looking to reinforce these ideas will appreciate the electronic Supplement for Measure, Integration & Real Analysis that is freely available online. ...
.NET Performance Testing and Optimization
.NET Performance Testing and Optimization

As we develop the applications to meet current and future needs, it is only natural to use current best practices and techniques for our designs and implementations. In the quest to improve how we develop, we can access a true wealth of information which is available on design patterns, object-oriented analysis, low-level code techniques and language features. The technology community is full of articles, blog posts, books, and videos describing things such as generics, how to implement the observer pattern, LINQ to SQL techniques, CSS tricks, and a host of other topics. These points are often easily described in a single post or article, wherein a thorough dissemination of the technique can be presented, and readers and viewers can quickly gain a much better understanding of the technique or point in question. Indeed, when broken down into individual and easily digestible components, almost anything complex becomes much easier to grasp. From the point of view of sophisticated de ...
Jira 8 Essentials, 6th Edition
Jira 8 Essentials, 6th Edition

This new and improved sixth edition comes with the latest Jira 8.21 Data Center offerings, with enhanced features such as clustering, advanced roadmaps, custom field optimization, and tools to track and manage tasks for your projects. This comprehensive guide to Jira 8.20.x LTS version provides updated content on project tracking, issue and field management, workflows, Jira Service Management, and security. The book begins by showing you how to plan and set up a new Jira instance from scratch before getting you acquainted with key features such as emails, workflows, and business processes. You'll also get to grips with Jira's data hierarchy and design and work with projects. Since Jira is used for issue management, this book will help you understand the different issues that can arise in your projects. As you advance, you'll create new screens from scratch and customize them to suit your requirements. Workflows, business processes, and guides on setting up incoming and outgoing mail ...
The Big Book of Machine Learning Use Cases
The Big Book of Machine Learning Use Cases

The world of machine learning is evolving so quickly that it's challenging to find real-life use cases that are relevant to your day-to-day work. That's why we've created this comprehensive guide you can start using right away. Get everything you need - use cases, code samples and notebooks - so you can start putting the Databricks Lakehouse Platform to work today. Plus, you'll get case studies from leading companies like Comcast, Regeneron and Nationwide. Learn how to: - Use dynamic time warping and MLflow to detect sales trends series; - Perform multivariate time series forecasting with recurrent neural networks; - Access new product capabilities with demos; - Detect financial fraud at scale with decision trees and MLflow on Databricks. ...
Making Sense of Cybersecurity
Making Sense of Cybersecurity

Go behind the headlines of famous attacks and learn lessons from real-world breaches that author Tom Kranz has personally helped to clean up. Making Sense of Cybersecurity is full of clear-headed advice and examples that will help you identify risks in your organization and choose the right path to apply the important security concepts. You'll learn the three pillars of a successful security strategy and how to create and apply threat models that will iteratively improve your organization's readiness. Someone is attacking your business right now. Understanding the threats, weaknesses, and attacks gives you the power to make better decisions about how to secure your systems. This book guides you through the concepts and basic skills you need to make sense of cybersecurity. Making Sense of Cybersecurity is a crystal-clear overview of common cyber threats written for business and technical readers with no background in security. You'll explore the core ideas of cybersecurity so you ...
Raku One-Liners
Raku One-Liners

You are reading a book about the Raku programming language. This language has appeared as a rename of Perl 6 in October 2019. Like its parent, Perl 5, the Raku language keeps the spirit of being a powerful tool in many areas, from devops programs for configuration management through different command-line applications to concurrent web servers. In this book, you will find a number of short programs that you may want to use in your daily practice. You will also find a number of one-line snippets that can enter into your bigger programs. The goal of the book is not to give a copy-and-paste list of coding examples, but to explain the various bits of Raku that help to use the language more efficiently. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025