IT eBooks
Download, Read, Use
CompTIA Linux+/LPIC-1 Certification All-in-One Exam Guide, Premium 2nd Edition
CompTIA Linux+/LPIC-1 Certification All-in-One Exam Guide, Premium 2nd Edition

The premium edition features the bestselling book plus one year of unlimited access to Practice Labs for CompTIA Linux+, including real world hands-on tasks carried out on real hardware simply accessed from a web browser. An innovative, hands-on study system from a team of CompTIA certification and Linux experts, CompTIA Linux+/LPIC-1 Certification All-in-One Exam Guide, Premium Edition with Online Practice Labs offers complete lab based coverage of CompTIA Linux+ exams LX0-103 and LX0-104. The Practice Labs platform offers an opportunity to work with industry standard technologies to provide hands-on experience and help you develop a deeper understanding of the topics covered in the certification exams. One year of online access includes: Real hardware and software needed to develop your practical skills - this is not a simulation but access to the actual equipment you would expect to find in any work place along with a wide range of industry standard technologies; Certification ...
Principles of Computer Security, 5th Edition
Principles of Computer Security, 5th Edition

Learn IT security fundamentals while getting complete coverage of the objectives for the latest release of CompTIA Security+ certification exam SY0-501. This thoroughly revised, full-color textbook discusses communication, infrastructure, operational security, attack prevention, disaster recovery, computer forensics, and much more. Written by a pair of highly respected security educators, Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition (Exam SY0-501) will help you pass the exam and become a CompTIA certified computer security expert. Ensure operational, organizational, and physical security; Use cryptography and public key infrastructures (PKIs); Secure remote access, wireless networks, and virtual private networks (VPNs); Authenticate users and lock down mobile devices; Harden network devices, operating systems, and applications; Prevent network attacks, such as denial of service, spoofing, hijacking, and password guessing; Combat viruses, worms, Trojan ...
Microsoft SQL Server 2017 on Linux
Microsoft SQL Server 2017 on Linux

This comprehensive guide shows, step-by-step, how to set up, configure, and administer SQL Server 2017 on Linux for high performance and high availability. Written by a SQL Server expert and respected author, Microsoft SQL Server 2017 on Linux teaches valuable Linux skills to Windows-based SQL Server professionals. You will get clear coverage of both Linux and SQL Server and complete explanations of the latest features, tools, and techniques. The book offers clear instruction on adaptive query processing, automatic tuning, disaster recovery, security, and much more. Understand how SQL Server 2017 on Linux works; Install and configure SQL Server on Linux; Run SQL Server on Docker containers; Learn Linux Administration; Troubleshoot and tune query performance in SQL Server; Learn what is new in SQL Server 2017; Work with adaptive query processing and automatic tuning techniques; Implement high availability and disaster recovery for SQL Server on Linux; Learn the security features avai ...
Gray Hat Hacking, 5th Edition
Gray Hat Hacking, 5th Edition

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hacker's Handbook, Fifth Edition explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. And the new topic of exploiting the Internet of things is introduced in this edition. Build and launch spoofing exploits with Ettercap; Induce error conditions and crash software using fuzzers; Use advanced reverse engineering to exploit Windows and Linux software; Bypass Windows Access Control and memory protection schemes; Exploit web applications with Padding Oracle Att ...
Anyone Can Create an App
Anyone Can Create an App

Do you have a fantastic idea for an iPhone app but no idea how to bring it to life? Great news! With the right tools and a little practice, anyone can create an app. This book will get you started, even if you've never written a line of computer code. Anyone Can Create an App begins with the basics by introducing programming concepts, the Swift language, and the tools you'll need to write iOS apps. As you explore the interesting examples, illuminating illustrations, and crystal-clear step-by-step instructions, you'll learn to: Get started programming, no experience necessary; Add controls like text boxes and buttons; Keep track of your favorite things by creating the Like It or Not (LioN) app. By the end, you'll be able to create and run your own apps, and you'll have the confidence to learn more on your own. ...
The Tao of Microservices
The Tao of Microservices

An application, even a complex one, can be designed as a system of independent components, each of which handles a single responsibility. Individual microservices are easy for small teams without extensive knowledge of the entire system design to build and maintain. Microservice applications rely on modern patterns like asynchronous, message-based communication, and they can be optimized to work well in cloud and container-centric environments. The Tao of Microservices guides you on the path to understanding and building microservices. Based on the invaluable experience of microservices guru Richard Rodger, this book exposes the thinking behind microservice designs. You'll master individual concepts like asynchronous messaging, service APIs, and encapsulation as you learn to apply microservices architecture to real-world projects. Along the way, you'll dig deep into detailed case studies with source code and documentation and explore best practices for team development, planning for ...
Microservices in .NET Core
Microservices in .NET Core

Microservice applications are built by connecting single-capability, autonomous components that communicate via APIs. These systems can be challenging to develop because they demand clearly defined interfaces and reliable infrastructure. Fortunately for .NET developers, OWIN (the Open Web Interface for .NET), and the Nancy web framework help minimize plumbing code and simplify the task of building microservice-based applications. Microservices in .NET Core provides a complete guide to building microservice applications. After a crystal-clear introduction to the microservices architectural style, the book will teach you practical development skills in that style, using OWIN and Nancy. You'll design and build individual services in C# and learn how to compose them into a simple but functional application back end. Along the way, you'll address production and operations concerns like monitoring, logging, and security. ...
Type-Driven Development with Idris
Type-Driven Development with Idris

Stop fighting type errors! Type-driven development is an approach to coding that embraces types as the foundation of your code - essentially as built-in documentation your compiler can use to check data relationships and other assumptions. With this approach, you can define specifications early in development and write code that's easy to maintain, test, and extend. Idris is a Haskell-like language with first-class, dependent types that's perfect for learning type-driven programming techniques you can apply in any codebase. Type-Driven Development with Idris teaches you how to improve the performance and accuracy of your code by taking advantage of a state-of-the-art type system. In this book, you'll learn type-driven development of real-world software, as well as how to handle side effects, interaction, state, and concurrency. By the end, you'll be able to develop robust and verified software in Idris and apply type-driven development methods to other languages. ...
Coding with Minecraft
Coding with Minecraft

You've mined for diamonds, crafted dozens of tools, and built all sorts of structures - but what if you could program robots to do all of that for you in a fraction of the time? In Coding with Minecraft, you'll create a virtual robot army with Lua, a programming language used by professional game developers. Step-by-step coding projects will show you how to write programs that automatically dig mines, collect materials, craft items, and build anything that you can imagine. Along the way, you'll explore key computer science concepts like data types, functions, variables, and more. Program robots that make smart decisions with flow control; Reuse code so that your robots can farm any crop you want, including wheat, sugar cane, and even cacti; Program a factory that generates infinite building supplies; Design an algorithm for creating walls and buildings of any size; Code yourself a pickaxe-swinging robotic lumberjack; Create a robot that digs mine shafts with stairs so you can exp ...
Exam Ref 70-778 Analyzing and Visualizing Data by Using Microsoft Power BI
Exam Ref 70-778 Analyzing and Visualizing Data by Using Microsoft Power BI

Prepare for Microsoft Exam 70-778 - and help demonstrate your real-world mastery of Power BI data analysis and visualization. Designed for experienced BI professionals and data analysts ready to advance their status, Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the MCSA level. Focus on the expertise measured by these objectives: Consume and transform data by using Power BI Desktop; Model and visualize data; Configure dashboards, reports, and apps in the Power BI Service. This Microsoft Exam Ref: Organizes its coverage by exam objectives; Features strategic, what-if scenarios to challenge you; Assumes you have experience consuming and transforming data, modeling and visualizing data, and configuring dashboards using Excel and Power BI. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2026