IT eBooks
Download, Read, Use
Exam Ref 70-687: Configuring Windows 8.1
Exam Ref 70-687: Configuring Windows 8.1

Fully updated for Windows 8.1! Prepare for Microsoft Exam 70-687 - and help demonstrate your real-world mastery of configuring Windows 8.1 in the enterprise. Designed for experienced IT professionals ready to advance their status, Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the MCSA or MCSE level. ...
Introducing Windows Azure Hdinsight
Introducing Windows Azure Hdinsight

In Introducing Microsoft Azure HDInsight, we cover what big data really means, how you can use it to your advantage in your company or organization, and one of the services you can use to do that quickly-specifically, Microsoft's HDInsight service. We start with an overview of big data and Hadoop, but we don't emphasize only concepts in this book-we want you to jump in and get your hands dirty working with HDInsight in a practical way. To help you learn and even implement HDInsight right away, we focus on a specific use case that applies to almost any organization and demonstrate a process that you can follow along with. ...
Introducing Microsoft SQL Server 2014
Introducing Microsoft SQL Server 2014

Get a head start evaluating SQL Server 2014 - guided by two experts who have worked with the technology from the earliest beta. Based on Community Technology Preview 2 (CTP2) software, this guide introduces new features and capabilities, with practical insights on how SQL Server 2014 can meet the needs of your business. Get the early, high-level overview you need to begin preparing your deployment now. ...
Microsoft Excel 2013 Data Analysis and Business Modeling
Microsoft Excel 2013 Data Analysis and Business Modeling

Master business modeling and analysis techniques with Microsoft Excel 2013, and transform data into bottom-line results. Written by award-winning educator Wayne Winston, this hands-on, scenario-focused guide shows you how to use the latest Excel tools to integrate data from multiple tables - and how to effectively build a relational data source inside an Excel workbook. ...
iPad and iPhone Kung Fu
iPad and iPhone Kung Fu

A shortcut straight to power-user level with over 300 tips, tricks, hints, and hacks to make your Apple device the one thing you can't live without. Learn the secrets of FaceTime, Maps, Safari, and Mail. Transform your Apple device into a go-to office tool, as well as tighten security to deter theft. Designed to be dipped into, most tips in iPad and iPhone Kung Fu take only a minute to implement, but will change your life. Good for iOS 7 on iPhone, iPad, iPod Touch. Apple changed the world with the iPhone and iPad. But while Apple's impeccable design and attention to detail makes using the devices easy, getting the very most from the software takes time and effort. iPad and iPhone Kung Fu picks up where instruction manuals finish and wastes no time turning you into an expert. ...
Raspberry Pi, 2nd Edition
Raspberry Pi, 2nd Edition

The Raspberry Pi is one of the most successful open source hardware projects ever. For less than $40, you get a full-blown PC, a multimedia center, and a web server--and this book gives you everything you need to get started. You'll learn the basics, progress to controlling the Pi, and then build your own electronics projects. This new edition is revised and updated with two new chapters on adding digital and analog sensors, and creating videos and a burglar alarm with the Pi camera. Get your Raspberry Pi up and running and doing cool stuff. You'll start with the basics: adding hardware, installing and configuring Debian Linux, and customizing the Pi's firmware to get the most out of your hardware. ...
Programming Erlang, 2nd Edition
Programming Erlang, 2nd Edition

A multi-user game, web site, cloud application, or networked database can have thousands of users all interacting at the same time. You need a powerful, industrial-strength tool to handle the really hard problems inherent in parallel, concurrent environments. You need Erlang. In this second edition of the bestselling Programming Erlang, you'll learn how to write parallel programs that scale effortlessly on multicore systems. Using Erlang, you'll be surprised at how easy it becomes to deal with parallel problems, and how much faster and more efficiently your programs run. That's because Erlang uses sets of parallel processes-not a single sequential process, as found in most programming languages. ...
Google BigQuery Analytics
Google BigQuery Analytics

Google BigQuery Analytics is the perfect guide for business and data analysts who want the latest tips on running complex queries and writing code to communicate with the BigQuery API. The book uses real-world examples to demonstrate current best practices and techniques, and also explains and demonstrates streaming ingestion, transformation via Hadoop in Google Compute engine, AppEngine datastore integration, and using GViz with Tableau to generate charts of query results. In addition to the mechanics of BigQuery, the book also covers the architecture of the underlying Dremel query engine, providing a thorough understanding that leads to better query results. ...
Data-Driven Security
Data-Driven Security

Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security methods, and make better decisions. Everything in this book will have practical application for information security professionals. ...
Computer Security Handbook, 6th Edition
Computer Security Handbook, 6th Edition

Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer security breaches in your systems. Written for professionals and college students, it provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more. This essential and highly-regarded reference maintains timeless lessons and is fully revised and updated with current information on security issues for social networks, cloud computing, virtualization, and more. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025