IT eBooks
Download, Read, Use
Positioning in CSS
Positioning in CSS

The Grid Layout spec will soon change your approach to website design, but there will still be plenty of uses for CSS positioning tricks. Whether you want to create sidebars that remain in the viewport (browser window), add sticky section headings to lists or long articles, or overlap one element with another, this concise ebook will expertly guide you through all the main CSS positioning types. Short and deep, this book is an excerpt from the upcoming fourth edition of CSS: The Definitive Guide. When you purchase either the print or the ebook edition of Positioning in CSS, you'll receive a discount on the entire Definitive Guide once it's released. Why wait? Make your web pages come alive today. ...
Lumion 3D Best Practices
Lumion 3D Best Practices

Lumion is a real-time 3D technology that lets you create amazing visualizations without the need for long rendering hours. Lumion 3D Best Practices covers the most important Lumion features and techniques that can be incorporated in to any real production environment. Each chapter covers a different stage of a production workflow. The first two chapters provide a good foundation, in particular for when creating content for Lumion. Furthermore, the book provides an efficient workflow by covering two classic visualization scenes: interior and exterior scenes. You then get to know the best techniques to create physically based materials that boost the look and realism of any 3D scene. Special chapters are reserved to create efficient animations, still images and movies. By the end of this practical guide, users will be familiar with the professional and effective techniques to increase efficiency in producing high-end quality visualizations in Lumion. ...
Hacking Android
Hacking Android

With the mass explosion of Android mobile phones in the world, mobile devices have become an integral part of our everyday lives. Security of Android devices is a broad subject that should be part of our everyday lives to defend against ever-growing smartphone attacks. Everyone, starting with end users all the way up to developers and security professionals should care about android security. Hacking Android is a step-by-step guide that will get you started with Android security. You'll begin your journey at the absolute basics, and then will slowly gear up to the concepts of Android rooting, application security assessments, malware, infecting APK files, and fuzzing. On this journey you'll get to grips with various tools and techniques that can be used in your everyday pentests. You'll gain the skills necessary to perform Android application vulnerability assessment and penetration testing and will create an Android pentesting lab. ...
Learning TensorFlow
Learning TensorFlow

Roughly inspired by the human brain, deep neural networks trained with large amounts of data can solve complex tasks with unprecedented accuracy. This practical book provides an end-to-end guide to TensorFlow, the leading open source software library that helps you build and train neural networks for computer vision, natural language processing (NLP), speech recognition, and general predictive analytics. Authors Tom Hope, Yehezkel Resheff, and Itay Lieder provide a hands-on approach to TensorFlow fundamentals for a broad technical audience - from data scientists and engineers to students and researchers. You'll begin by working through some basic examples in TensorFlow before diving deeper into topics such as neural network architectures, TensorBoard visualization, TensorFlow abstraction libraries, and multithreaded input pipelines. Once you finish this book, you'll know how to build and deploy production-ready deep learning systems in TensorFlow. Get up and running with TensorFl ...
Manage It!
Manage It!

This book is a reality - based guide for modern projects. You'll learn how to recognize your project's potholes and ruts, and determine the best way to fix problems - without causing more problems. ...
Security Intelligence
Security Intelligence

Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology domain, formulates the equation that is the deployment strategy, then verifies the solution against the original problem by analyzing security incidents and mining hidden breaches, ultimately refines the security formula iteratively in a perpetual cycle. ...
A Practical Guide to Linux Commands, Editors, and Shell Programming, 4th Edition
A Practical Guide to Linux Commands, Editors, and Shell Programming, 4th Edition

Linux is today's dominant Internet server platform. System administrators and Web developers need deep Linux fluency, including expert knowledge of shells and the command line. This is the only guide with everything you need to achieve that level of Linux mastery. Renowned Linux expert Mark Sobell has brought together comprehensive, insightful guidance on the tools sysadmins, developers, and power users need most, and has created an outstanding day-to-day reference, updated with assistance from new coauthor Matthew Helmke. This title is 100 percent distribution and release agnostic. Packed with hundreds of high-quality, realistic examples, it presents Linux from the ground up: the clearest explanations and most useful information about everything from filesystems to shells, editors to utilities, and programming tools to regular expressions. Use a Mac? You'll find coverage of the macOS command line, including macOS-only tools and utilities that other Linux/UNIX titles ignore. F ...
Quicken for Windows, Eighth Edition
Quicken for Windows, Eighth Edition

Take control of your personal finances using the best practices and time-saving tips in Quicken 2018 for Windows The Official Guide! Find out the most effective methods for tracking your income, expenses, savings, transactions, investments, and so much more. Endorsed by the makers of Quicken, this practical resource shows you, step by step, how to take full advantage of the software's powerful features, including the Quicken mobile app. You'll also get professional advice to help you reduce debt, stay on budget, save money, invest wisely, and plan for a secure financial future. Customize Quicken for your preferences; Track income and expenses; Automate transactions and tasks; Record bank and credit card transactions; Use online banking features; Reconcile checking, savings, and credit card accounts; Track investments and optimize your portfolio; Monitor your assets, loans, and net worth; Evaluate your financial position; Reduce debt, save money, and plan for retirement; Simplify ...
Blockchain
Blockchain

Get the most out of cutting-edge blockchain technology using the hands-on information contained in this comprehensive resource. Written by a team of technology and legal experts, Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions demonstrates each topic through a start-to-finish, illustrated case study. The book includes financial, technology, governance, and legal use cases along with advantages and challenges. Validation, implementation, troubleshooting, and best practices are fully covered. You will learn, step-by-step, how to build and maintain effective, reliable, and transparent blockchain solutions. Understand the fundamentals of decentralized computing and blockchain; Explore business, technology, governance, and legal use cases; Review the evolving practice of law and technology as it concerns legal and governance issues arising from blockchain implementation; Write and administer performant blockchain-enabled applications; Handle cryptograp ...
Deploying ACI
Deploying ACI

With the Cisco Application Centric Infrastructure (ACI) software-defined networking platform, you can achieve dramatic improvements in data center performance, redundancy, security, visibility, efficiency, and agility. In Deploying ACI, three leading Cisco experts introduce this breakthrough platform, and walk network professionals through all facets of design, deployment, and operation. The authors demonstrate how ACI changes data center networking, security, and management; and offer multiple field-proven configurations. Deploying ACI is organized to follow the key decision points associated with implementing data center network fabrics. After a practical introduction to ACI concepts and design, the authors show how to bring your fabric online, integrate virtualization and external connections, and efficiently manage your ACI network. You'll master new techniques for improving visibility, control, and availability; managing multitenancy; and seamlessly inserting service devices ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025