IT eBooks
Download, Read, Use
Beginning Ethical Hacking with Kali Linux
Beginning Ethical Hacking with Kali Linux

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you'll move on to an introduction to VirtualBox, networking, and common Linux commands, followed by the step-by-step procedure to build your own web server and acquire the skill to be anonymous. When you have finished the examples in the first part of your book, you will have all you need to carry out safe and ethical hacking experiments. After an introduction to Kali Linux, you will carry out your first penetration tests with Python and code raw binary packets for use in those tests. You will learn how to find secret directories on a target system, use a TCP client in Python, and scan ports using NMAP. Along the way you will discover effective ways to collect important information, track ...
Beginning Functional JavaScript, 2nd Edition
Beginning Functional JavaScript, 2nd Edition

Understand functional programming concepts and the functional nature of the JavaScript language. Starting with an introduction to functional programming concepts, you will learn the key differences between imperative and functional programming. Diving straight into JavaScript functions, you will learn to write them with ES8. Followed by this you will move to higher order functions and learn how "Function as Data" opens up a world of possibilities. You will then build higher order functions with closures. Arrays will then be introduced, followed by a set of APIs you can use with them. You will learn how to transform one function to another using currying and partial application. The compose function will be discussed in detail, followed by functors and monads. After having an in-depth look at applicative functors, you will learn the new features offered in ES8. The concluding chapters of Beginning Functional JavaScript will show you how to use a functional toolkit to build a sma ...
Stylish F#
Stylish F#

Why just get by in F# when you can program in style! This book goes beyond syntax and into design. It provides F# developers with best practices, guidance, and advice to write beautiful, maintainable, and correct code. Stylish F# covers every design decision that a developer makes in constructing F# programs, helping you make the most educated and valuable design choices at every stage of code development. You will learn about the design of types and function signatures, the benefits of immutability, and the uses of partial function application. You will understand best practices for writing APIs to be used by F#, C#, and other languages. Each carefully vetted design choice is supported with compelling examples, illustrations, and rationales. Know why, when, and how to code in immutable style; Use collection functions, piping, and function composition to build working software quickly; Be aware of the techniques available to bring error handling into the mainstream of program log ...
Program the Internet of Things with Swift for iOS, 2nd Edition
Program the Internet of Things with Swift for iOS, 2nd Edition

Learn how to build apps using Apple's native APIs for the Internet of Things, including the Apple Watch, HomeKit, and Apple Pay. You'll also see how to interface with popular third-party hardware such as the Raspberry Pi, Arduino, and the FitBit family of devices.Program the Internet of Things with Swift and iOS is an update to the previous version and includes all new Swift 4 code. This book is a detailed tutorial that provides a detailed "how" and "why" for each topic, explaining Apple-specific design patterns as they come up and pulling lessons from other popular apps. To help you getting up and running quickly, each chapter is framed within a working project, allowing you to use the sample code directly in your apps. The Internet of Things is not limited to Apple devices alone, so this book also explains how to interface with popular third-party hardware devices, such as the Fitbit and Raspberry Pi, and generic interfaces, like Restful API's and HTTPS. You'll also review new API ...
Developing Turn-Based Multiplayer Games
Developing Turn-Based Multiplayer Games

Create your first turn-based multiplayer game using GameMaker Studio 2's built-in networking functions as well as using a simple NodeJS server. This book introduces you to the complexities of network programming and communication, where the focus will be on building the game from the ground up. You will start with a brief introduction to GameMaker Studio 2 and GML coding before diving into the essential principles of game design. Following this, you will go through an introductory section on NodeJS where you will learn how to create a server and send and receive data from it as well as integrating it with GameMaker Studio. You will then apply multiplayer gaming logic to your server and unlock multiplayer game features such as locating a player, syncing their data, and recording their session. Discover the architecture of GameMaker Studio 2; Add new features to your game with NodeJS modules; Integrate GameMaker Studio 2 with NodeJS; Master GameMaker Studio 2's built-in networkin ...
Blender for Video Production Quick Start Guide
Blender for Video Production Quick Start Guide

One of the critical components of any workflow related to video production is a reliable tool to create and edit media such as video and audio. In most cases, you will find video producers using software that can only cut and mount video in a "traditional" way. What if you could use a software that offers not only options to edit and cut video, but also create 3D content and animation? With Blender, you can make use of a fantastic set of tools to edit and cut video, and also produce 3D content that will enable you to take your productions to the next level. Do you want to take footage from a camera and cut or add sound and titles? This book will show you how Blender can do that for you! You will learn to add 3D virtual objects to the same footage that will help you to create a full 3D environment. Using some camera tricks, you can even turn Blender into a powerful 2.5D animation software to create compelling infographics to produce educational, marketing, and instructional videos. Y ...
Hands-On Server-Side Web Development with Swift
Hands-On Server-Side Web Development with Swift

This book is about building professional web applications and web services using Swift 4.0 and leveraging two popular Swift web frameworks: Vapor 3.0 and Kitura 2.5. In the first part of this book, we'll focus on the creation of basic web applications from Vapor and Kitura boilerplate projects. As the web apps start out simple, more useful techniques, such as unit test development, debugging, logging, and the build and release process, will be introduced to readers. In the second part, we'll learn different aspects of web application development with server-side Swift, including setting up routes and controllers to process custom client requests, working with template engines such as Leaf and Stencil to create dynamic web content, beautifying the content with Bootstrap, managing user access with authentication framework, and leveraging the Object Relational Mapping (ORM) abstraction layer (Vapor's Fluent and Kitura's Kuery) to perform database operations. Finally, in the third pa ...
Hands-On Data Science with R
Hands-On Data Science with R

R is the most widely used programming language, and when used in association with data science, this powerful combination will solve the complexities involved with unstructured datasets in the real world. This book covers the entire data science ecosystem for aspiring data scientists, right from zero to a level where you are confident enough to get hands-on with real-world data science problems. The book starts with an introduction to data science and introduces readers to popular R libraries for executing data science routine tasks. This book covers all the important processes in data science such as data gathering, cleaning data, and then uncovering patterns from it. You will explore algorithms such as machine learning algorithms, predictive analytical models, and finally deep learning algorithms. You will learn to run the most powerful visualization packages available in R so as to ensure that you can easily derive insights from your data. Towards the end, you will also learn ...
PowerShell Core for Linux Administrators Cookbook
PowerShell Core for Linux Administrators Cookbook

PowerShell Core, the open source, cross-platform that is based on the open source, cross-platform .NET Core, is not a shell that came out by accident; it was intentionally created to be versatile and easy to learn at the same time. PowerShell Core enables automation on systems ranging from the Raspberry Pi to the cloud. PowerShell Core for Linux Administrators Cookbook uses simple, real-world examples that teach you how to use PowerShell to effectively administer your environment. As you make your way through the book, you will cover interesting recipes on how PowerShell Core can be used to quickly automate complex, repetitive, and time-consuming tasks. In the concluding chapters, you will learn how to develop scripts to automate tasks that involve systems and enterprise management. By the end of this book, you will have learned about the automation capabilities of PowerShell Core, including remote management using OpenSSH, cross-platform enterprise management, working with Docke ...
Securing the Perimeter
Securing the Perimeter

Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it's now easier than ever to build and operate your own IAM stack. The most common culprit of the largest hacks has been bad personal identification. In terms of bang for your buck, effective access control is the best investment you can make. Financially, it's more valuable to prevent than to detect a security breach. That's why Identity and Access Management (IAM) is a critical component of an organization's security infrastructure. In the past, IAM software has been available only from large enterprise software vendors. Commercial IAM offerings are bundled as "suites" because IAM is not just one component. It's a number of components working together, including web, authentication, authorization, cryptographic, and persistence services. Securing the Perimeter docu ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2026