IT eBooks
Download, Read, Use
Positioning in CSS
Positioning in CSS

The Grid Layout spec will soon change your approach to website design, but there will still be plenty of uses for CSS positioning tricks. Whether you want to create sidebars that remain in the viewport (browser window), add sticky section headings to lists or long articles, or overlap one element with another, this concise ebook will expertly guide you through all the main CSS positioning types. Short and deep, this book is an excerpt from the upcoming fourth edition of CSS: The Definitive Guide. When you purchase either the print or the ebook edition of Positioning in CSS, you'll receive a discount on the entire Definitive Guide once it's released. Why wait? Make your web pages come alive today. ...
Information Security The Complete Reference, 2nd Edition
Information Security The Complete Reference, 2nd Edition

Today's complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information Security: The Complete Reference, 2nd Edition is the only comprehensive book that offers vendor-neutral details on all aspects of information protection, with an eye toward the evolving threat landscape. Thoroughly revised and expanded to cover all aspects of modern information security—from concepts to details—this edition provides a one-stop reference equally applicable to the beginner and the seasoned professional. Find out how to build a holistic security program based on proven methodology, risk analysis, compliance, and business needs. You'll learn how to successfully protect data, networks, computers, and applications. In-depth chapters cover data protection, encryption, information rights management, network security, intrusion detection and prevention, Unix and Windows security, virtual and cloud security, secure applicat ...
Gray Hat Hacking, 3rd Edition
Gray Hat Hacking, 3rd Edition

This one-of-a-kind guide offers a comprehensive overview of the hacking landscape and is organized in a progressive manner, first giving an update on the latest developments in hacking-related law, useful to everyone in the security field. Next, the book describes the security testing process and covers useful tools and exploit frameworks. The second section is expanded by explaining social engineering, physical, and insider attacks and the latest trends in hacking (Voice over IP and SCADA attacks). The book then explains, from both a code and machine-level perspective, how exploits work and guides you through writing simple exploits. Finally, the authors provide a comprehensive description of vulnerability research and reverse engineering. ...
HTML & CSS: The Complete Reference, 5th Edition
HTML & CSS: The Complete Reference, 5th Edition

HTML & CSS: The Complete Reference, 5th Edition contains full details on CSS 2.1 as well as every proprietary and emerging CSS3 property currently supported. Annotated examples of correct markup and style show you how to use all of these technologies to build impressive Web pages. Helpful appendixes cover the syntax of character entities, fonts, colors, and URLs. This comprehensive reference is an essential tool for professional Web developers. ...
UNIX Operating System
UNIX Operating System

UNIX Operating System: The Development Tutorial via UNIX Kernel Services - introduces the hierarchical structure, principles, applications, kernel, shells, development, and management of the UNIX operation systems multi-dimensionally and systematically. It clarifies the natural bond between physical UNIX implementation and general operating system and software engineering theories, and presents self-explanatory illustrations for readers to visualize and understand the obscure relationships and intangible processes in UNIX operating system. ...
Rethinking the Internet of Things
Rethinking the Internet of Things

Over the next decade, most devices connected to the Internet will not be used by people in the familiar way that personal computers, tablets and smart phones are. Billions of interconnected devices will be monitoring the environment, transportation systems, factories, farms, forests, utilities, soil and weather conditions, oceans and resources. Many of these sensors and actuators will be networked into autonomous sets, with much of the information being exchanged machine-to-machine directly and without human involvement. Machine-to-machine communications are typically terse. Most sensors and actuators will report or act upon small pieces of information - chirps. Burdening these devices with current network protocol stacks is inefficient, unnecessary and unduly increases their cost of ownership. ...
JavaScript Creativity
JavaScript Creativity

JavaScript Creativity teaches you how to use every feature of this versatile and powerful language in exciting and creative ways. JavaScript can be used for so much more than simple interactivity. Master your use of canvas, animation, audio and video, 3D visualizations, motion detection and real-time collaboration. In every chapter of this book you will learn how to use and evolve JavaScript's creative capabilities in your own projects, as well as having project examples to follow throughout. JavaScript Creativity is for the developer who has a working knowledge of JavaScript and wants to take their code to the next level. Every feature explored can be manipulated and implemented in your everyday projects to really impress your clients or just increase your code skill. This book is an exciting, action-packed introduction to all the advanced and truly creative aspects of this language - start creative coding today! ...
Pro Windows 8.1 Development with XAML and C#
Pro Windows 8.1 Development with XAML and C#

Windows 8.1 apps are revolutionizing development on the Windows platform. Fast, fluid, tactile and chrome-free, they provide a brand-new look and feel for Windows users. These apps rely on Microsoft's Windows 8 modern UI to provide their rich and engaging user experiences for both desktop and tablet users. The new UI in turn relies upon the Windows Runtime (WinRT) to give its apps unparalleled flexibility and power. Understanding this stack of new technologies and how they tie in to the proven C# language and the XAML standard is the subject of this book. Experienced writers Jesse Liberty, Phil Japikse, and Jon Galloway explain how you can get the most from Windows 8.1 by focusing on the features that you need for your project and bringing your existing C# coding knowledge to bear. ...
Pro ASP.NET MVC 5 Platform
Pro ASP.NET MVC 5 Platform

The power of ASP.NET MVC 5 stems from the underlying ASP.NET platform. To make your ASP.NET MVC applications the best they can be, you need to fully understand the platform features and know how they can be used to build effective and elegant MVC framework applications. The ASP.NET platform provides ASP.NET MVC applications with a rich suite of services including vital every-day features like extensible request handling, state management, and user authentication. Understanding how these features work is the difference between creating an average web application and the best-in-class. ...
Python Algorithms, 2nd Edition
Python Algorithms, 2nd Edition

Python Algorithms, 2nd Edition explains the Python approach to algorithm analysis and design. Written by Magnus Lie Hetland, author of Beginning Python, this book is sharply focused on classical algorithms, but it also gives a solid understanding of fundamental algorithmic problem-solving techniques. The book deals with some of the most important and challenging areas of programming and computer science in a highly readable manner. It covers both algorithmic theory and programming practice, demonstrating how theory is reflected in real Python programs. Well-known algorithms and data structures that are built into the Python language are explained, and the user is shown how to implement and evaluate others. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025