IT eBooks
Download, Read, Use
Sams Teach Yourself TCP/IP in 24 Hours, 6th Edition
Sams Teach Yourself TCP/IP in 24 Hours, 6th Edition

Sams Teach Yourself TCP/IP in 24 Hours, 6th Edition is a practical guide to the simple yet illusive protocol system that powers the Internet. A step-by-step approach reveals how the protocols of the TCP/IP stack really work and explores the rich array of services available on the Internet today. You'll learn about configuring and managing real-world networks, and you'll gain the deep understanding you'll need to troubleshoot new problems when they arise. Sams Teach Yourself TCP/IP in 24 Hours is the only single-volume introduction to TCP/IP that receives regular updates to incorporate new technologies of the ever-changing Internet. This latest edition includes up-to-date material on recent topics such as tracking and privacy, cloud computing, mobile networks, and the Internet of Things. Learn how to: Understand TCP/IP's role, how it works, and how it continues to evolve; Work with TCP/IP's Network Access, Internet, Transport, and Application layers; Design modern networks that will ...
Sams Teach Yourself Java in 24 Hours, 8th Edition
Sams Teach Yourself Java in 24 Hours, 8th Edition

Computer programming with Java is easier than it looks. In just 24 lessons of one hour or less, you can learn to write computer programs in Java. Using a straightforward, step-by-step approach, popular author Rogers Cadenhead helps you master the skills and technology you need to create desktop and web programs, web services, an Android app, and even Minecraft mods in Java. Each lesson builds on what you've already learned, giving you a rock-solid foundation for real-world success. Learn how to: Set up your Java programming environment;Write your first working program in just minutes; Control program decisions and behavior; Store and work with information; Build straightforward user interfaces; Create interactive web programs; Use threading to build more responsive programs; Read and write files and XML data; Master best practices for object-oriented programming; Use Java 9's new HTTP client; Use Java to create an Android app; Expand your skills with closures; Create Minecraft mods ...
Sams Teach Yourself Go in 24 Hours
Sams Teach Yourself Go in 24 Hours

In just 24 sessions of one hour or less, Sams Teach Yourself Go in 24 Hours will help new and experienced programmers build software that's simpler, more reliable, and far more scalable. This book's straightforward, step-by-step approach guides you from setting up your environment through testing and deploying powerful solutions. Using practical examples, expert Go developer George Ornbo walks you through Go's fundamental constructs, demonstrates its breakthrough features for concurrent and network programming, and illuminates Go's powerful new idioms. Every lesson builds on what you've already learned, giving you a rock-solid foundation for real-world success. Learn how to: Get productive quickly with Go development tools and web servers; Master core features, including strings, functions, structs, and methods; Work with types, variables, functions, and control structures; Make the most of Go's arrays, slices, and maps; Write powerful concurrent software with Goroutines and channel ...
Programming with MicroPython
Programming with MicroPython

It's an exciting time to get involved with MicroPython, the re-implementation of Python 3 for microcontrollers and embedded systems. This practical guide delivers the knowledge you need to roll up your sleeves and create exceptional embedded projects with this lean and efficient programming language. If you're familiar with Python as a programmer, educator, or maker, you're ready to learn—and have fun along the way. Author Nicholas Tollervey takes you on a journey from first steps to advanced projects. You'll explore the types of devices that run MicroPython, and examine how the language uses and interacts with hardware to process input, connect to the outside world, communicate wirelessly, make sounds and music, and drive robotics projects. Work with MicroPython on four typical devices: PyBoard, the micro:bit, Adafruit's Circuit Playground Express, and ESP8266/ESP32 boards; Explore a framework that helps you generate, evaluate, and evolve embedded projects that solve real prob ...
iOS 11 Swift Programming Cookbook
iOS 11 Swift Programming Cookbook

iOS 11, Swift 4, and Xcode 9 provide many new APIs for iOS developers. With this cookbook, you'll learn more than 170 proven solutions for tackling the latest features in iOS 11 and watchOS 4, including new ways to use Swift and Xcode to make your day-to-day app development life easier. This collection of code-rich recipes also gets you up to speed on continuous delivery and continuous integration systems. Ideal for intermediate and advanced iOS developers looking to work with the newest version of iOS, these recipes include reusable code on GitHub, so you can put them to work in your project right away. Among the topics covered in this book: New features in Swift 4 and Xcode 9; Tools for continuous delivery and continuous integration; Snapshot testing and test automation; Creating document-based applications; Updated Map view and Core Location features; iOS 11's Security and Password Autofill; Data storage with Apple's Core Data; Creating lively user interfaces with UI Dynamics; ...
bash Cookbook, 2nd Edition
bash Cookbook, 2nd Edition

For system administrators, programmers, and end users, shell command or carefully crafted shell script can save you time and effort, or facilitate consistency and repeatability for a variety of common tasks. This cookbook provides more than 300 practical recipes for using bash, the popular Unix shell that enables you to harness and customize the power of any Unix or Linux system. Ideal for new and experienced users alike - including proficient Windows users and sysadmins - this updated second edition helps you solve a wide range of problems. You'll learn ways to handle input/output, file manipulation, program execution, administrative tasks, and many other challenges. Each recipe includes one or more scripting examples and a discussion of why the solution works. You'll find recipes for problems including: Standard output and input, and executing commands; Shell variables, shell logic, and arithmetic; Intermediate shell tools and advanced scripting; Searching for files with find, ...
C# 7.0 in a Nutshell, 7th Edition
C# 7.0 in a Nutshell, 7th Edition

When you have questions about C# 7.0 or the .NET CLR and its core Framework assemblies, this bestselling guide has the answers you need. Since its debut in 2000, C# has become a language of unusual flexibility and breadth, but its continual growth means there's always more to learn. Organized around concepts and use cases, this updated edition provides intermediate and advanced programmers with a concise map of C# and .NET knowledge. Dive in and discover why this Nutshell guide is considered the definitive reference on C#. Get up to speed on the C# language, from the basics of syntax and variables to advanced topics such as pointers, operator overloading, and dynamic binding; Dig deep into LINQ via three chapters dedicated to the topic; Explore concurrency and asynchrony, advanced threading, and parallel programming; Work with .NET features, including XML, regular expressions, networking, serialization, reflection, application domains, and security; Delve into Roslyn, the modular ...
Network Security Assessment, 3rd Edition
Network Security Assessment, 3rd Edition

How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tools and techniques that professional security analysts use to identify and assess risks in government, military, and commercial networks. Armed with this book, you can work to create environments that are hardened and immune from unauthorized use and attack. Author Chris McNab demonstrates how determined adversaries map attack surface and exploit security weaknesses at both the network and application level. The third edition is a complete overhaul—grouping and detailing the latest hacking techniques used to attack enterprise networks. By categorizing individual threats, you will be able to adopt defensive strategies against entire attack classes, providing protection now and into the future. The testing approaches within the book are written in-line with internationally recognized standards, including NIST SP 800-115, NSA IAM, CESG CHECK, and PCI DSS. ...
OpenJDK Cookbook
OpenJDK Cookbook

OpenJDK is one of the most widely used open source implementations of the Java platform. It is used to change, customize, and tune core application internals and provide a way to extend the application internals according to your requirements. OpenJDK Cookbook begins by introducing you to OpenJDK and IcedTea builds for various virtual machine implementations and how to deploy OpenJDK on multiple platforms. Furthermore, the book digs deeper into the development concepts, JVM internals, and techniques to make robust improvements or customizations to OpenJDK. Essentially, the book covers the best practices for accessing and using the core features of OpenJDK to build advanced Java solutions by utilizing the more complex and nuanced parts of OpenJDK. ...
Penetration Testing with Raspberry Pi
Penetration Testing with Raspberry Pi

The Raspberry Pi is a low-cost credit-card sized computing system that can be customized for just about anything including penetration testing. Raspberry Pi is the best known platform not because it is cheap but because it is very powerful. Kali is a pentesting/security auditing Linux distribution. Kali Linux has many penetration-testing programs, including nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper (a password cracker), Aircrack-ng (a software suite for the penetration-testing of wireless LANs), and Burp suite and OWASP ZAP (both web application security scanners). This book covers how to turn a Raspberry Pi into a hacking arsenal to leverage the most popular open source toolkit, Kali Linux. You will learn how to use various tools to breach networks and steal data. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2026