IT eBooks
Download, Read, Use
10 LED Projects for Geeks
10 LED Projects for Geeks

10 LED Projects for Geeks is a collection of interactive and customizable projects that all have the humble LED in common, but don't write them off as basic! You'll learn how to make challenging and imaginative gadgets like a magic wand that controls lights using hand gestures, a pen-sized controller for music synthesizers, a light strip that dances to the beat of music, and even an LED sash that flashes scrolling text you send from your phone. Every project includes photos, step-by-step directions, colorful circuit diagrams, and the complete code to bring the project to life. As you work your way through the book, you'll pick up adaptable skills that will take your making abilities to the next level. Design versatile circuits for your own needs; Build and print a custom printed circuit board; Create flexible circuits which you can use to make any wearable you dream up; Turn analog signal into digital data your microcontroller can read; Use gesture recognition and wireless inter ...
Salesforce Lightning Cookbook
Salesforce Lightning Cookbook

The new Lightning Experience combines three major components - Lightning Design System, Lightning App Builder, and Lightning Components - to enable anyone to quickly and easily create beautiful, modern enterprise apps. If you wish to meet the challenges that Lightning throws at you head-on, then look no further because this practical book will be your faithful companion and ensure that you make best use of the Lightning platform. The book starts by walking you through the three major Lightning Components and helps you enable and configure a Lightning solution. You will explore the art of working with standard components and build a basic layout for the application. Then, you will add more advanced components using the Lightning Framework. Finally, you will also build and migrate reports and dashboards to make your app look more professional. Towards the end of the book, you'll make use of Design System to work with Salesforce data and lay out the entire page with the components that ...
Practical Linux Security Cookbook, 2nd Edition
Practical Linux Security Cookbook, 2nd Edition

Over the last few years, system security has gained a lot of momentum and software professionals are focusing heavily on it. Linux is often treated as a highly secure operating system. However, the reality is that Linux has its share of security aws, and these security aws allow attackers to get into your system and modify or even destroy your important data. But there's no need to panic, since there are various mechanisms by which these aws can be removed, and this book will help you learn about different types of Linux security to create a more secure Linux system. With a step-by-step recipe approach, the book starts by introducing you to various threats to Linux systems. Then, this book will walk you through customizing the Linux kernel and securing local files. Next, you will move on to managing user authentication both locally and remotely and mitigating network attacks. Later, you will learn about application security and kernel vulnerabilities. You will also learn about patch ...
Hands-On Artificial Intelligence for Search
Hands-On Artificial Intelligence for Search

With the emergence of big data and modern technologies, AI has acquired a lot of relevance in many domains. The increase in demand for automation has generated many applications for AI in fields such as robotics, predictive analytics, finance, and more. In this book, you will understand what artificial intelligence is. It explains in detail basic search methods: Depth-First Search (DFS), Breadth-First Search (BFS), and A* Search, which can be used to make intelligent decisions when the initial state, end state, and possible actions are known. Random solutions or greedy solutions can be found for such problems. But these are not optimal in either space or time and efficient approaches in time and space will be explored. We will also understand how to formulate a problem, which involves looking at it and identifying its initial state, goal state, and the actions that are possible in each state. We also need to understand the data structures involved while implementing these search alg ...
Learning Jupyter 5, 2nd Edition
Learning Jupyter 5, 2nd Edition

The Jupyter Notebook allows you to create and share documents that contain live code, equations, visualizations, and explanatory text. The Jupyter Notebook system is extensively used in domains such as data cleaning and transformation, numerical simulation, statistical modeling, and machine learning. Learning Jupyter 5 will help you get to grips with interactive computing using real-world examples. The book starts with a detailed overview of the Jupyter Notebook system and its installation in different environments. Next, you will learn to integrate the Jupyter system with different programming languages such as R, Python, Java, JavaScript, and Julia, and explore various versions and packages that are compatible with the Notebook system. Moving ahead, you will master interactive widgets and namespaces and work with Jupyter in a multi-user mode. By the end of this book, you will have used Jupyter with a big dataset and be able to apply all the functionalities you've explored throu ...
Learn Bitcoin and Blockchain
Learn Bitcoin and Blockchain

Blockchain is a distributed database that enables permanent, transparent, and secure storage of data. Blockchain technology uses cryptography to keep data secure. Learn Bitcoin and Blockchain is the perfect entry point to the world of decentralized databases. This book will take you on a journey through the blockchain database, followed by advanced implementations of the blockchain concept. You will learn about Bitcoin basics and their technical operations. As you make your way through the book, you will gain insight into this leading technology and its implementation in the real world. You will also cover the technical foundation of blockchain and understand the fundamentals of cryptography and how they keep data secure. In the concluding chapters, you'll get to grips with the mechanisms behind cryptocurrencies. By the end of this book, you will have learned about decentralized digital money, advanced blockchain concepts, and Bitcoin and blockchain security. ...
Clean Code in Python
Clean Code in Python

Python is currently used in many different areas such as software construction, systems administration, and data processing. In all of these areas, experienced professionals can find examples of inefficiency, problems, and other perils, as a result of bad code. After reading this book, readers will understand these problems, and more importantly, how to correct them. The book begins by describing the basic elements of writing clean code and how it plays an important role in Python programming. You will learn about writing efficient and readable code using the Python standard library and best practices for software design. You will learn to implement the SOLID principles in Python and use decorators to improve your code. The book delves more deeply into object oriented programming in Python and shows you how to use objects with descriptors and generators. It will also show you the design principles of software testing and how to resolve software problems by implementing design pat ...
Practical Docker with Python
Practical Docker with Python

Learn the key differences between containers and virtual machines. Adopting a project based approach, this book introduces you to a simple Python application to be developed and containerized with Docker. After an introduction to Containers and Docker you'll be guided through Docker installation and configuration. You'll also learn basic functions and commands used in Docker by running a simple container using Docker commands. The book then moves on to developing a Python based Messaging Bot using required libraries and virtual environment where you'll add Docker Volumes to your project, ensuring your container data is safe. You'll create a database container and link your project to it and finally, bring up the Bot-associated database all at once with Docker Compose. Build, run, and distribute Docker containers; Develop a Python App and containerize it; Use Dockerfile to run the Python App; Define and run multi-container applications with Docker Compose; Work with persisting ...
Applied Analytics through Case Studies Using SAS and R
Applied Analytics through Case Studies Using SAS and R

Examine business problems and use a practical analytical approach to solve them by implementing predictive models and machine learning techniques using SAS and the R analytical language. This book is ideal for those who are well-versed in writing code and have a basic understanding of statistics, but have limited experience in implementing predictive models and machine learning techniques for analyzing real world data. The most challenging part of solving industrial business problems is the practical and hands-on knowledge of building and deploying advanced predictive models and machine learning algorithms. Applied Analytics through Case Studies Using SAS and R is your answer to solving these business problems by sharpening your analytical skills. Understand analytics and basic data concepts; Use an analytical approach to solve Industrial business problems; Build predictive model with machine learning techniques; Create and apply analytical strategies. ...
Pro iOS Security and Forensics
Pro iOS Security and Forensics

Examine how to keep iOS devices safe in the physical world, including creating company policies for iPhones; assessing and defending against cyber vulnerabilities and attacks; working with preinstalled as well as third party tools; and strategies for keeping your data safe including backing up and screen locks. Managing and maintaining iPhones and iPads in a corporate or other business environment inherently requires strict attention to security concerns. Managers and IT professionals need to know how to create and communicate business policies for using iOS devices in the workplace, and implement security and forensics tools to manage and protect them. The iPhone and iPad are both widely used across businesses from Fortune 500 companies down to garage start-ups. All of these devices must have secure and monitorable ways to connect to the internet, store and transmit data without leaks, and even be managed in the event of a physical theft. Pro iOS Security and Forensics covers al ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2026