IT eBooks
Download, Read, Use
CI/CD with Docker and Kubernetes
CI/CD with Docker and Kubernetes

Containers change how developers build, test, and deploy code. Adopting them takes time. Using them the wrong way can slow down your delivery process. But you don't have a team of engineers to dedicate to this like Spotify or Netflix do. Maybe you're a startup CTO with features to ship - you can't spend hundreds of hours on internal systems. Using this free ebook as a guide, you won't need a dedicated sysadmin to have a productive container-based CI/CD process. By the end of this book you will understand: - The key benefits of using Docker containers and how to attain them. - How deployment to Kubernetes works. - How both our culture and delivery tools need to change in order to fully benefit from the agility that containers and cloud can offer. You will be able to: - Execute a detailed roadmap to adopting containers. - Build and test applications with Docker. - Perform canary deployments to Kubernetes on the major cloud providers (AWS, DigitalOcean, Google Cloud). - ...
Natural Language Processing with Transformers
Natural Language Processing with Transformers

Since their introduction in 2017, transformers have quickly become the dominant architecture for achieving state-of-the-art results on a variety of natural language processing tasks. If you're a data scientist or coder, this practical book shows you how to train and scale these large models using Hugging Face Transformers, a Python-based deep learning library. Transformers have been used to write realistic news stories, improve Google Search queries, and even create chatbots that tell corny jokes. In this guide, authors Lewis Tunstall, Leandro von Werra, and Thomas Wolf, among the creators of Hugging Face Transformers, use a hands-on approach to teach you how transformers work and how to integrate them in your applications. You'll quickly learn a variety of tasks they can help you solve. Build, debug, and optimize transformer models for core NLP tasks, such as text classification, named entity recognition, and question answering; Learn how transformers can be used for cross-lingu ...
bash Idioms
bash Idioms

Shell scripts are everywhere, especially those written in bash-compatible syntax. But these scripts can be complex and obscure. Complexity is the enemy of security, but it's also the enemy of readability and understanding. With this practical book, you'll learn how to decipher old bash code and write new code that's as clear and readable as possible. Authors Carl Albing and JP Vossen show you how to use the power and flexibility of the shell to your advantage. You may know enough bash to get by, but this book will take your skills from manageable to magnificent. Whether you use Linux, Unix, Windows, or a Mac, you'll learn how to read and write scripts like an expert. Your future you will thank you. You'll explore the clear idioms to use and obscure ones to avoid, so that you can: Write useful, flexible, and readable bash code with style; Decode bash code such as ${MAKEMELC,,} and ${PATHNAME##*/}; Save time and ensure consistency when automating tasks; Discover how bash idioms can ...
Efficient Linux at the Command Line
Efficient Linux at the Command Line

Take your Linux skills to the next level! Whether you're a system administrator, software developer, site reliability engineer, or enthusiastic hobbyist, this practical, hands-on book will help you work faster, smarter, and more efficiently. You'll learn how to create and run complex commands that solve real business problems, process and retrieve information, and automate manual tasks. You'll also truly understand what happens behind the shell prompt, so no matter which commands you run, you can be more successful in everyday Linux use and more competitive on the job market. As you build intermediate to advanced command-line skills, you'll learn how to: Choose or construct commands that get your work done quickly; Run commands efficiently and navigate the Linux filesystem with ease; Build powerful, complex commands out of simpler ones; Transform text files and query them like databases to achieve business goals; Control Linux point-and-click features from the command line. ...
Symfony
Symfony

The Symfony Framework is well-known for being really flexible and is used to build micro-sites, enterprise applications that handle billions of connections and even as the basis for other frameworks. Since its release in July 2011, the community has learned a lot about what's possible and how to do things best. These community resources - like blog posts or presentations - have created an unofficial set of recommendations for developing Symfony applications. Unfortunately, a lot of these recommendations are unneeded for web applications. Much of the time, they unnecessarily overcomplicate things and don't follow the original pragmatic philosophy of Symfony. This guide aims to fix that by describing the best practices for developing web apps with the Symfony full-stack Framework. These are best practices that fit the philosophy of the framework as envisioned by its original creator Fabien Potencier. Any Symfony developer, whether you are an expert or a newcomer, can read this g ...
Java 17 for Absolute Beginners, 2nd Edition
Java 17 for Absolute Beginners, 2nd Edition

Write your first code in Java 17 using simple, step-by-step examples that model real-word objects and events, making learning easy. With Java 17 for Absolute Beginners you'll be able to pick up the concepts without fuss. It teaches Java development in language anyone can understand, giving you the best possible start. You'll see clear code descriptions and layout so that you can get your code running as soon as possible. Author Iuliana Cosmina focuses on practical knowledge and getting you up to speed quickly - all the bits and pieces a novice needs to get started programming in Java. First, you'll discover what type of language Java is, what it is good for, and how it is executed. With the theory out of the way, you'll install Java, choose an editor such as IntelliJ IDEA, and write your first simple Java program. Along the way you'll compile and execute this program so it can run on any platform that supports Java. As part of this tutorial you'll see how to write high-quality c ...
Microsoft Excel VBA and Macros
Microsoft Excel VBA and Macros

Use this guide to automate virtually any routine Excel task: save yourself hours, days, maybe even weeks. Make Excel do things you thought were impossible, discover macro techniques you wont find anywhere else, and create automated reports that are amazingly powerful. Bill Jelen and Tracy Syrstad help you instantly visualize information to make it actionable; capture data from anywhere, and use it anywhere; and automate the best new features in Microsoft Excel. Youll find simple, step-by-step instructions, real-world case studies, and 50 workbooks packed with examples and complete, easy-to-adapt solutions. By reading this book, you will: Quickly master Excel macro development; Work more efficiently with ranges, cells, and formulas; Generate automated reports and quickly adapt them for new requirements; Learn to automate PivotTables to summarize, analyze, explore, and present data; Leverage more of Excel VBAs power with classes, collections, and Advanced Filter; Make the most of User ...
Microsoft Visual C# Step by Step, 10th Edition
Microsoft Visual C# Step by Step, 10th Edition

Expand your expertiseand teach yourself the fundamentals of programming the latest version of Visual C# with Visual Studio 2022. This book provides software developers all the guidance, exercises, and code needed to start building responsive, scalable, cloud-connected applications that can run almost anywhere. Discover how to: Quickly start creating Visual C# code and projects with Visual Studio; Work with variables, operators, expressions, methods, and program flow; Build more robust apps with error, exception, and resource management; Spot problems fast with the integrated Visual Studio 2022 debugger; Master new default interface methods, static local functions, async disposable types, and other enhancements; Make the most of the C# object model, and create functional data structures; Leverage advanced properties, indexers, generics, and collection classes; Create Windows 11 apps that share data, collaborate, and use cloud services; Use lightweight records to build immutable ref ...
Go H*ck Yourself
Go H*ck Yourself

Go H*ck Yourself is an eye-opening, hands-on introduction to the world of hacking, from an award-winning cybersecurity coach. As you perform common attacks against yourself, you'll be shocked by how easy they are to carry out - and realize just how vulnerable most people really are. You'll be guided through setting up a virtual hacking lab so you can safely try out attacks without putting yourself or others at risk. Then step-by-step instructions will walk you through executing every major type of attack, including physical access hacks, Google hacking and reconnaissance, social engineering and phishing, malware, password cracking, web hacking, and phone hacking. You'll even hack a virtual car! You'll experience each hack from the point of view of both the attacker and the target. Most importantly, every hack is grounded in real-life examples and paired with practical cyber defense tips, so you'll understand how to guard against the hacks you perform. You'll learn: How to practice h ...
The Hardware Hacking Handbook
The Hardware Hacking Handbook

Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they're everywhere - in phones, cars, credit cards, laptops, medical equipment, even critical infrastructure. This means understanding their security is critical. The Hardware Hacking Handbook takes you deep inside different types of embedded systems, revealing the designs, components, security limits, and reverse-engineering challenges you need to know for executing effective hardware attacks. Written with wit and infused with hands-on lab experiments, this handbook puts you in the role of an attacker interested in breaking security to do good. Starting with a crash course on the architecture of embedded devices, threat modeling, and attack trees, you'll go on to explore hardware interfaces, ports and communication protocols, electrical signaling, tips for analyzing firmware images, and more. Along the way, you'll use a home testing lab to perform fault-injecti ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025