IT eBooks
Download, Read, Use
Neural Networks with JavaScript Succinctly
Neural Networks with JavaScript Succinctly

James McCaffrey leads you through the fundamental concepts of neural networks, including their architecture, input-output, tanh and softmax activation, back-propagation, error and accuracy, normalization and encoding, and model interpretation. Although most concepts are relatively simple, there are many of them, and they interact with each other in unobvious ways, which is a major challenge of neural networks. But you can learn all important neural network concepts by running and examining the code in Neural Networks with JavaScript Succinctly, with complete example programs for the three major types of neural network problems. ...
Cloud Native DevOps with Kubernetes
Cloud Native DevOps with Kubernetes

Kubernetes has become the operating system of today's cloud native world, providing a reliable and scalable platform for running containerized workloads. In this friendly, pragmatic book, cloud experts Justin Domingus and John Arundel show you what Kubernetes can do-and what you can do with it. This updated second edition guides you through the growing Kubernetes ecosystem and provides practical solutions to everyday problems with software tools currently in use. You'll walk through an example containerized application running in Kubernetes step-by-step, from the development environment through the continuous deployment pipeline, exploring patterns you can use for your own applications. Make your development teams lean, fast, and effective by adopting Kubernetes and DevOps principles. - Understand containers and Kubernetes-no experience necessary; - Run your own applications on managed cloud Kubernetes services or on-prem environments; - Design your own cloud native services an ...
Bug Bounty Bootcamp
Bug Bounty Bootcamp

A comprehensive guide for any web application hacker, Bug Bounty Bootcamp is a detailed exploration of the many vulnerabilities present in modern websites and the hands-on techniques you can use to most successfully exploit them. Bug Bounty Bootcamp prepares you for participation in bug bounty programs, which companies set up to reward hackers for finding and reporting vulnerabilities in their applications. The Bootcamp begins with guidance on writing high-quality bug reports and building lasting relationships with client organizations. You'll then set up a hacking lab and dive into the mechanisms of common web vulnerabilities, like XSS and SQL injection, aided by thorough explanations of what causes them, how you can exploit them, where to find them, and how to bypass protections. You'll also explore recon strategies for gathering intel on a target and automate recon with bash scripting. Finally, you'll wade into advanced techniques, like hacking mobile apps, testing APIs, and revi ...
Go H*ck Yourself
Go H*ck Yourself

Go H*ck Yourself is an eye-opening, hands-on introduction to the world of hacking, from an award-winning cybersecurity coach. As you perform common attacks against yourself, you'll be shocked by how easy they are to carry out - and realize just how vulnerable most people really are. You'll be guided through setting up a virtual hacking lab so you can safely try out attacks without putting yourself or others at risk. Then step-by-step instructions will walk you through executing every major type of attack, including physical access hacks, Google hacking and reconnaissance, social engineering and phishing, malware, password cracking, web hacking, and phone hacking. You'll even hack a virtual car! You'll experience each hack from the point of view of both the attacker and the target. Most importantly, every hack is grounded in real-life examples and paired with practical cyber defense tips, so you'll understand how to guard against the hacks you perform. You'll learn: How to practice h ...
Get Started with Arduino
Get Started with Arduino

Whether you want to build robots, smart devices, or any other electronically controlled projects, this is the book you need. We take you through how to program and connect an Arduino microcontroller board, then explore some great projects to make with it. - Build a four-legged walking robot; - Create a Tetris-inspired clock; - Grow your own veg with hydroponics; - Make music with a DIY synthesizer; - And much more! ...
ASP.NET Core 6 and Angular, 5th Edition
ASP.NET Core 6 and Angular, 5th Edition

Every full-stack ninja needs the tools to operate on front-end and back-end application development. This web app development book takes a hands-on, project-based approach to provide you with all the tools and techniques that web developers need to create, debug, and deploy efficient web applications using ASP.NET Core and Angular. The fifth edition has been updated to cover advanced topics such as Minimal APIs, Web APIs with GraphQL, real-time updates with SignalR, and new features in .NET 6 and Angular 13. You begin by building a data model with Entity Framework Core, alongside utilizing the Entity Core Fluent API and EntityTypeConfiguration class. You'll learn how to fetch and display data and handle user input with Angular reactive forms and front-end and back-end validators for maximum effect. Later, you will perform advanced debugging and explore the unit testing features provided by xUnit.net (.NET 6) and Jasmine, as well as Karma for Angular. After adding authenticatio ...
Mastering Kali Linux for Advanced Penetration Testing, 4th Edition
Mastering Kali Linux for Advanced Penetration Testing, 4th Edition

Remote working has given hackers plenty of opportunities as more confidential information is shared over the internet than ever before. In this new edition of Mastering Kali Linux for Advanced Penetration Testing, you'll learn an offensive approach to enhance your penetration testing skills by testing the sophisticated tactics employed by real hackers. You'll go through laboratory integration to cloud services so that you learn another dimension of exploitation that is typically forgotten during a penetration test. You'll explore different ways of installing and running Kali Linux in a VM and containerized environment and deploying vulnerable cloud services on AWS using containers, exploiting misconfigured S3 buckets to gain access to EC2 instances. This book delves into passive and active reconnaissance, from obtaining user information to large-scale port scanning. Building on this, different vulnerability assessments are explored, including threat modeling. See how hackers use lat ...
Software Architecture with C# 10 and .NET 6, 3rd Edition
Software Architecture with C# 10 and .NET 6, 3rd Edition

Software architecture is the practice of implementing structures and systems that streamline the software development process and improve the quality of an app. This fully revised and expanded third edition, featuring the latest features of .NET 6 and C# 10, enables you to acquire the key skills, knowledge, and best practices required to become an effective software architect. Software Architecture with C# 10 and .NET 6, Third Edition features new chapters that describe the importance of the software architect, microservices with ASP.NET Core, and analyzing the architectural aspects of the front-end in the applications, including the new approach of .NET MAUI. It also includes a new chapter focused on providing a short introduction to artificial intelligence and machine learning using ML.NET, and updated chapters on Azure Kubernetes Service, EF Core, and Blazor. You will begin by understanding how to transform user requirements into architectural needs and exploring the differenc ...
Beginning gRPC with ASP.NET Core 6
Beginning gRPC with ASP.NET Core 6

Broaden your developer experience by learning how to use gRPC and ASP.NET Core together on the Microsoft's developer framework, .NET 6 and discover a new way of developing APIs with gRPC. Beginning gRPC with ASP.NET Core 6 is your guide to quickly and efficiently getting down to the business of building gRPC applications in the Microsoft .NET ecosystem. Readers will dive in and build an application using gRPC and the latest technologies such Angular and ASP.NET Core Razor Pages. This book will teach you how to set up an efficient application using industry best practices such as security, monitoring, logging, and more. You will do this by performing Create, Read, Update, and Delete (CRUD) operations on a SQL Server database with Entity Framework Core. From there you will build web applications using Angular and ASP.NET Core Razor pages combined with gRPC APIs. After reading the book, you'll be able to take advantage of the full range of developer opportunities with gRPC, and ...
Pro iPhone Development with SwiftUI, 3rd Edition
Pro iPhone Development with SwiftUI, 3rd Edition

You know the basics. Your Swift code flows with logic and ease. This isn't your first time building a workable app for iOS platforms. Now, it's time to build a magical app for iOS platforms! Move beyond what you mastered in the best-selling Beginning iPhone Development with SwiftUI. Debug Swift code, use multi-threaded programming with Grand Central Dispatch, pass data between view controllers, and design apps functional in multiple languages. Not only will your apps run like magic under the hood but, with the new standard of SwiftUI, you'll add animations, scaling, multiscreen support, and so much more to your interfaces. You'll also see how to integrate audio and video files in your apps, access the camera and send pictures to and from the Photos library, use location services to pinpoint your user's position on a map, and display web pages in-app. Don't just stop at flawless code and stickily engaging interfaces. Give your apps a mind with Apple's advanced frameworks for machine ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2026