IT eBooks
Download, Read, Use
Ace the Programming Interview
Ace the Programming Interview

Programmers are in demand, but to land the job, you must demonstrate knowledge of those things expected by today's employers. This guide sets you up for success. Not only does it provide 160 of the most commonly asked interview questions and model answers, but it also offers insight into the context and motivation of hiring managers in today's marketplace. Written by a veteran hiring manager, this book is a comprehensive guide for experienced and first-time programmers alike. ...
Excel 2013: The Missing Manual
Excel 2013: The Missing Manual

The world's most popular spreadsheet program is now more powerful than ever, but it's also more complex. That's where this Missing Manual comes in. With crystal-clear explanations and hands-on examples, Excel 2013: The Missing Manual shows you how to master Excel so you can easily track, analyze, and chart your data. You'll be using new features like PowerPivot and Flash Fill in no time. ...
Analyzing the Analyzers
Analyzing the Analyzers

There has been intense excitement in recent years around activities labeled "data science," "big data," and "analytics." However, the lack of clarity around these terms and, particularly, around the skill sets and capabilities of their practitioners has led to inefficient communication between "data scientists" and the organizations requiring their services. This lack of clarity has frequently led to missed opportunities. To address this issue, we surveyed several hundred practitioners via the Web to explore the varieties of skills, experiences, and viewpoints in the emerging data science community. ...
802.11ac: A Survival Guide
802.11ac: A Survival Guide

The next frontier for wireless LANs is 802.11ac, a standard that increases throughput beyond one gigabit per second. This concise guide provides in-depth information to help you plan for 802.11ac, with technical details on design, network operations, deployment, and monitoring. Author Matthew Gast-an industry expert who led the development of 802.11-2012 and security task groups at the Wi-Fi Alliance—explains how 802.11ac will not only increase the speed of your network, but its capacity as well. Whether you need to serve more clients with your current level of throughput, or serve your existing client load with higher throughput, 802.11ac is the solution. This book gets you started. ...
Gradle Beyond the Basics
Gradle Beyond the Basics

If you're familiar with Gradle's basics elements - possibly through the author's previous O'Reilly book, Building and Testing with Gradle - this more advanced guide provides the recipes, techniques, and syntax to help you master this build automation tool. With clear, concise explanations and lots of ready-to-use code examples, you'll explore four discrete areas of Gradle functionality: file operations, custom Gradle plugins, build lifecycle hooks, and dependency management. Learn how to use Gradle's rich set of APIs and Groovy-based Domain Specific Language to customize build software that actually conforms to your product. By using the techniques in this book, you'll be able to write domain-specific builds that support every other line of code your team creates. ...
GDI+ Application Custom Controls with Visual C# 2005
GDI+ Application Custom Controls with Visual C# 2005

If you want to build custom controls with C# but you don't know where to start, or you are intimidated by the huge amount of information that needs to be absorbed, then this book is for you. This friendly tutorial is based on numerous examples with real-world applicability, and includes a case study featuring the development of a fully functional PieChart control. Showing you how to use the free Visual C# 2005 Express Edition environment to develop your controls, GDI+ Custom Controls with Visual C# 2005 will teach you how to create professional, reusable custom controls for your desktop applications in no time. ...
Pluggable Authentication Modules
Pluggable Authentication Modules

PAM-aware applications reduce the complexity of authentication. With PAM you can use the same user database for every login process. PAM also supports different authentication processes as required. Moreover, PAM is a well-defined API, and PAM-aware applications will not break if you change the underlying authentication configuration. The PAM framework is widely used by most Linux distributions for authentication purposes. Originating from Solaris 2.6 ten years ago, PAM is used today by most proprietary and free UNIX operating systems including GNU/Linux, FreeBSD, and Solaris, following both the design concept and the practical details. PAM is thus a unifying technology for authentication mechanisms in UNIX. ...
Zenoss Core Network and System Monitoring
Zenoss Core Network and System Monitoring

For system administrators, network engineers, and security analysts, it is essential to keep a track of network traffic. At some point it will be necessary to read the network traffic directly instead of monitoring application level details. Network security audits, debug network configurations, and usage patterns analyzing can all require network traffic monitoring. This task can be achieved by using network monitoring software, or network sniffers, that sniff the traffic and display it on your computer on the network. Zenoss is an enterprise network and systems management application written in Python/Zope that provides an integrated product for monitoring availability, performance, events and configuration across layers and across platforms. ...
Middleware Management with Oracle Enterprise Manager Grid Control 10g R5
Middleware Management with Oracle Enterprise Manager Grid Control 10g R5

Today's IT environment is very complex, encompassing a myriad of technologies and middleware platforms. Many organizations have large and heterogeneous middleware platforms that power their enterprise applications and it is often a real challenge for administrators to meet agreed service levels and minimize downtime. Oracle Enterprise Manager allows administrators to manage the complete lifecycle of an entire application infrastructure for middleware and SOA applications. This book will help you kick-start the setup of Oracle Enterprise Manager Grid Control and master all aspects of middleware management supported by Oracle Enterprise Manager. ...
Microsoft Windows Communication Foundation 4.0 Cookbook for Developing SOA Applications
Microsoft Windows Communication Foundation 4.0 Cookbook for Developing SOA Applications

WCF 4.0 is a communications infrastructure that unifies a broad array of distributed systems' capabilities in a composable, extensible architecture that supports multiple transports, messaging patterns, encodings, network topologies, and hosting models. This book is a collection of focused real-world recipes and covers basic recipes on topics such as working with contracts to more advanced topics such as extending WCF runtime. By the end of this book you will have valuable information that helps transform the potentially unproductive habits of .Net developers who work with WCF. This book will take you through many concepts starting with complete support for contract-related design for WCF service development. You will learn to use WCF's built-in feature for building various service endpoints. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2026