IT eBooks
Download, Read, Use
3D Game Development with LWJGL 3
3D Game Development with LWJGL 3

This book will introduce the main concepts required to write a 3D game using the LWJGL 3 library. LWJGL is a Java library that provides access to native APIs used in the development of graphics (OpenGL), audio (OpenAL) and parallel computing (OpenCL) applications. This library leverages the high performance of native OpenGL applications while using the Java language. The initial goal of this book was to learn the techniques involved in writing a 3D game using OpenGL. All the information required was there in the internet but it was not organized and sometimes it was very hard to find and even incomplete or misleading. Author started to collect some materials, develop some examples and decided to organize that information in the form of a book. ...
Practical Apache Lucene 8
Practical Apache Lucene 8

Gain a thorough knowledge of Lucene's capabilities and use it to develop your own search applications. This book explores the Java-based, high-performance text search engine library used to build search capabilities in your applications. Starting with the basics of Lucene and searching, you will learn about the types of queries used in it and also take a look at scoring models. Applying this basic knowledge, you will develop a hello world app using basic Lucene queries and explore functions like scoring and document level boosting. Along the way you will also uncover the concepts of partial searching and matching in Lucene and then learn how to integrate geographical information (geospatial data) in Lucene using spatial queries and n-dimensional indexing. This will prepare you to build a location-aware search engine with a representative data set that allows location constraints to be specified during a search. You'll also develop a text classifier using Lucene and Apache Mahout, ...
Beginning e-Textile Development
Beginning e-Textile Development

Electronic textiles (e-textiles) involves the combination of electronics and textiles to form "smart" textile products. It is an emerging technology with immense opportunities in the field of wearables fashion technology. And while there are many e-textile development platforms available on the market, this book uses the Wearic smart textile kit, a modular prototyping platform, to get you building projects and experiments easily and quickly. This book presents the essential skills required to get started developing e-textiles. The code presented is built using MakeCode blocks, an easy-to-use visual programming language. You'll use the BBC micro:bit microcontroller for all the projects, and with few exceptions, they require no soldering and wiring. In the end, you'll be able to apply and sew electronics to wearables, garments, and fabrics in this emerging technology. Beginning e-Textile Development presents the essential components to get you started with developing e-textiles. ...
Getting Structured Data from the Internet
Getting Structured Data from the Internet

Utilize web scraping at scale to quickly get unlimited amounts of free data available on the web into a structured format. This book teaches you to use Python scripts to crawl through websites at scale and scrape data from HTML and JavaScript-enabled pages and convert it into structured data formats such as CSV, Excel, JSON, or load it into a SQL database of your choice. This book goes beyond the basics of web scraping and covers advanced topics such as natural language processing (NLP) and text analytics to extract names of people, places, email addresses, contact details, etc., from a page at production scale using distributed big data techniques on an Amazon Web Services (AWS)-based cloud infrastructure. It book covers developing a robust data processing and ingestion pipeline on the Common Crawl corpus, containing petabytes of data publicly available and a web crawl data set available on AWS's registry of open data. Getting Structured Data from the Internet also includes a st ...
70 Tips and Tricks for Mastering the CISSP Exam
70 Tips and Tricks for Mastering the CISSP Exam

Learn how to think and apply knowledge in a practical way. Tackling the CISSP exam is vastly different from simply understanding the subject matter. Even the most experienced security professionals can fail because the questions are tricky and ask the test taker to pick the best of the options given. The CISSP exam conducted by ISC2 is the hardest and most rewarded cybersecurity examination. The test has several domains and sub-domains and covers a wide range of topics on security, including cyber and physical building security fields. It also covers breaches, discovery of breaches, and how to report data breaches. Because the subject area is vast and the questions are almost never repeated, it is hard for the exam taker to memorize or quickly discover the correct solution. The four options given as answers typically have two very close matches to the question. With quick analysis, it is possible to discover from the verbiage of a question what is truly being asked and learn how t ...
Machine Learning in the Oil and Gas Industry
Machine Learning in the Oil and Gas Industry

Apply machine and deep learning to solve some of the challenges in the oil and gas industry. The book begins with a brief discussion of the oil and gas exploration and production life cycle in the context of data flow through the different stages of industry operations. This leads to a survey of some interesting problems, which are good candidates for applying machine and deep learning approaches. The initial chapters provide a primer on the Python programming language used for implementing the algorithms; this is followed by an overview of supervised and unsupervised machine learning concepts. The authors provide industry examples using open source data sets along with practical explanations of the algorithms, without diving too deep into the theoretical aspects of the algorithms employed. Machine Learning in the Oil and Gas Industry covers problems encompassing diverse industry topics, including geophysics (seismic interpretation), geological modeling, reservoir engineering, and prod ...
A Graduate Course in Applied Cryptography
A Graduate Course in Applied Cryptography

Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making it relatively easy to incorporate strong encryption into a wide range of applications. While extremely useful, cryptography is also highly brittle. The most secure cryptographic system can be rendered completely insecure by a single specification or programming error. No amount of unit testing will uncover a security vulnerability in a cryptosystem. Instead, to argue that a cryptosystem is secure, we rely on mathematical modeling and proofs to show that a particular system satisfies the security properties attributed to it. We often need to introduce certain plausible assumptions to push our security arguments through. ...
Rational Cybersecurity for Business
Rational Cybersecurity for Business

Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will know how to prioritize your security program, and motivate and retain your team. Misalignment between security and your business can start at the top at the C-suite or happen at the line of business, IT, development, or user level. It has a corrosive effect on any security project it touches. But it does not have to be like this. Author Dan Blum presents valuable lessons learned from interviews with over 70 security and business leaders. You will discover how to successfully solve issues related to: risk management, operational security, privacy protection, hybrid cloud management, security culture and user awareness, and communication challenges. This open access book presents si ...
Modern Web Development on the JAMstack
Modern Web Development on the JAMstack

Learn how to run your web projects - everything from simple sites to complex applications - without a single server. It's possible with the JAMstack, a modern web development architecture for deploying fast, highly-scalable sites and applications that don't require traditional origin infrastructure. This practical report explains how the JAMstack delivers better performance, higher security, and lower cost of scaling than server-run web apps. Based on client-side JavaScript, reusable APIs, and prebuilt Markup, the JAMstack sits at the center of several converging trends and technologies already being used to support today's web projects. Authors Mathias Biilmann and Phil Hawksworth from Netlify demonstrate how the JAMstack drastically improves performance, increases reliability, and reduces the surface for attacks. ...
Coding in the Classroom
Coding in the Classroom

Computer science opens more doors for today's youth than any other discipline - which is why Coding in the Classroom is your key to unlocking students' future potential. Author Ryan Somma untangles the current state of CS education standards; describes the cognitive, academic, and professional benefits of learning CS; and provides numerous strategies to promote computational thinking and get kids coding! Whether you're a teacher, an after-school coach, or a parent seeking accessible ways to boost your kid's computer savvy, Coding in the Classroom is here to help. With quick-start programming strategies, scaffolded exercises for every grade level, and ideas for designing CS events that promote student achievement, this book is a rock-solid roadmap to CS integration from a wide variety of on-ramps. You'll learn: tips and resources for teaching programming concepts via in-class activities and games, without a computer; development environments that make coding and sharing web apps a ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2026