IT eBooks
Download, Read, Use
Build Reactive Websites with RxJS
Build Reactive Websites with RxJS

Upgrade your skill set, succeed at work, and above all, avoid the many headaches that come with modern front-end development. Simplify your codebase with hands-on examples pulled from real-life applications. Master the mysteries of asynchronous state management, detangle puzzling race conditions, and send spaceships soaring through the cosmos. When you finish this book, you'll be able to tame the wild codebeasts before they ever get a chance to wreck your day. The front-end world can be fraught with complexity. The RxJS library offers a solution: Observables. Observables merge other JavaScript asynch mechanisms such as callbacks and promises into a new way of looking at data. Instead of dealing with objects and keeping track of their state, Observables view asynchronous events as a stream. RxJS provides you the tools to manage, manipulate, and process Observables to simplify and speed up your front-end applications. Never fear, you're in exactly the right place. Don't worry about ...
Customizing Dynamics 365
Customizing Dynamics 365

Gain an understanding of basic and advanced customizations in Dynamics 365 and learn how they can be effectively used to implement simple business requirements. This is a practical book for developers that explains the use of various Dynamics 365 features as well as use of advanced concepts such as Azure integration and custom development. Customizing Dynamics 365 starts by explaining the business requirements of the example application, which will explain the platform features, and discussing why Dynamics 365 is the ideal platform for the solution. Next, you will set up your development environment and use the different customizations of the platform to implement the basic business requirements of the example application. Further, you will automate the business process and create advanced customizations with plugins and custom workflow activities. Towards the end you will learn more about Azure integration, reports and dashboards, portal development, and data migration techniques, ...
R Quick Syntax Reference, 2nd Edition
R Quick Syntax Reference, 2nd Edition

This handy reference book detailing the intricacies of R updates the popular first edition by adding R version 3.4 and 3.5 features. Starting with the basic structure of R, the book takes you on a journey through the terminology used in R and the syntax required to make R work. You will find looking up the correct form for an expression quick and easy. Some of the new material includes information on RStudio, S4 syntax, working with character strings, and an example using the Twitter API. With a copy of the R Quick Syntax Reference in hand, you will find that you are able to use the multitude of functions available in R and are even able to write your own functions to explore and analyze data. Discover the modes and classes of R objects and how to use them; Use both packaged and user-created functions in R; Import/export data and create new data objects in R; Create descriptive functions and manipulate objects in R; Take advantage of flow control and conditional statements; Work ...
Practical Shader Development
Practical Shader Development

It's time to stop thinking that shaders are magical. You can use shaders to turn data into stunning visual effects, and get your hands dirty by building your own shader with this step-by-step introduction to shader development for game and graphics developers. Learn how to make shaders that move, tint, light up, and look awesome, all without cracking open a math textbook. Practical Shader Development teaches the theory behind how shaders work. The book also shows you how to apply that theory to create eye-popping visual effects. You'll learn to profile and optimize those effects to make sure your projects keep running quickly with all their new visuals. You'll learn good theory, good practices, and without getting bogged down in the math. Author Kyle Halladay explains the fundamentals of shader development through simple examples and hands-on experiments. He teaches you how to find performance issues in shaders you are using and then how to fix them. Kyle explains (and contrasts) ...
Exam Ref MS-100 Microsoft 365 Identity and Services
Exam Ref MS-100 Microsoft 365 Identity and Services

Prepare for Microsoft Exam MS-100 - and help demonstrate your real-world mastery of skills and knowledge needed to effectively design, deploy, manage, and secure Microsoft 365 services. Designed for experienced IT professionals, Exam Ref focuses on critical thinking and decision-making acumen needed for success at the Microsoft Certified Expert level. Focus on the expertise measured by these objectives: Design and implement Microsoft 365 services; Manage user identity and roles; Manage access and authentication; Plan Office 365 workloads and applications. Exam MS-100 focuses on knowledge needed to manage domains; plan a Microsoft 365 implementation; set up and manage Microsoft 365 tenancy and subscriptions; plan user and data migration; design identity strategy; plan and manage identity synchronization with Azure AD Connect; manage Azure AD identities and user roles; manage authentication; implement MFA; configure application access; implement access for external users of Microso ...
Modernizing the Datacenter with Windows Server and Hybrid Cloud
Modernizing the Datacenter with Windows Server and Hybrid Cloud

Transform your datacenter for breakthrough flexibility, agility, and scalability! Using public, private, and hybrid cloud services, you can transform your datacenter to serve fast-changing workloads, process and analyze enormous amounts of data, and achieve unprecedented flexibility and value. In this guide, two world-renowned experts in Microsoft datacenter technology show how to effectively leverage current legacy systems as you incorporate your optimal mix of cloud services. Drawing on extensive experience implementing Microsoft cloud solutions, they walk you step-by-step through your entire transition: strategy, deployment, security, identity protection, management, PowerShell automation, and more. Two concluding chapters offer indispensable advice for maximizing datacenter efficiency and supporting future innovation. Two leading enterprise cloud and Windows Server experts show how to: Move from legacy IT models to an agile service structure; Implement managed self-service, ...
Exam Ref MS-101 Microsoft 365 Mobility and Security
Exam Ref MS-101 Microsoft 365 Mobility and Security

Prepare for Microsoft Exam MS-101 - and help demonstrate your real-world mastery of skills and knowledge needed to manage Microsoft 365 mobility, security, and related administration tasks. Designed for experienced IT professionals, Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified Expert level. Focus on the expertise measured by these objectives: Implement modern device services; Implement Microsoft 365 security and threat management; Manage Microsoft 365 governance and compliance. Exam MS-101 focuses on knowledge needed to implement Mobile Device Management (MDM); manage device compliance; plan for devices and apps; plan Windows 10 deployment; implement Cloud App Security (CAS), threat management, and Windows Defender Advanced Threat Protection (ATP); manage security reports and alerts; configure Data Loss Prevention (DLP); implement Azure Information Protection (AIP); and manage data governance, auditing, and eD ...
Rootkits and Bootkits
Rootkits and Bootkits

Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine's boot process or UEFI firmware. With the aid of numerous case studies and professional research from three of the world's leading security experts, you'll trace malware development over time from rootkits like TDL3 to present-day UEFI implants and examine how they infect a system, persist through reboot, and evade security software. As you inspect and dissect real malware, you'll learn: How Windows boots - including 32-bit, 64-bit, and UEFI mode - and where to find vulnerabilities; The details of boot process security mechanisms like Secure Boot, including an overview of Virtual Secure Mode (VSM) and Device Guard; Reverse engineering and forensic techniques for analyzing real malware, including bootkits like Rovnix/Carberp, Gapz, TDL4, and the infamous rootkits TDL3 and Festi; How to perform static and dynamic analysis using emulation and tools like Bochs ...
Bayesian Statistics the Fun Way
Bayesian Statistics the Fun Way

Probability and statistics are increasingly important in a huge range of professions. But many people use data in ways they don't even understand, meaning they aren't getting the most from it. Bayesian Statistics the Fun Way will change that. This book will give you a complete understanding of Bayesian statistics through simple explanations and un-boring examples. Find out the probability of UFOs landing in your garden, how likely Han Solo is to survive a flight through an asteroid belt, how to win an argument about conspiracy theories, and whether a burglary really was a burglary, to name a few examples. By using these off-the-beaten-track examples, the author actually makes learning statistics fun. And you'll learn real skills, like how to: How to measure your own level of uncertainty in a conclusion or belief; Calculate Bayes theorem and understand what it's useful for; Find the posterior, likelihood, and prior to check the accuracy of your conclusions; Calculate distributions ...
Foundations of Blockchain
Foundations of Blockchain

Blockchain technology is a combination of three popular concepts: cryptography, peer-to-peer networking, and game theory. This book is for anyone who wants to dive into blockchain from first principles and learn how decentralized applications and cryptocurrencies really work. This book begins with an overview of blockchain technology, including key definitions, its purposes and characteristics, so you can assess the full potential of blockchain. All essential aspects of cryptography are then presented, as the backbone of blockchain. For readers who want to study the underlying algorithms of blockchain, you'll see Python implementations throughout. You'll then learn how blockchain architecture can create decentralized applications. You'll see how blockchain achieves decentralization through peer-to-peer networking, and how a simple blockchain can be built in a P2P network. You'll learn how these elements can implement a cryptocurrency such as Bitcoin, and the wider applications of ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025