IT eBooks
Download, Read, Use
Designing Microservices with Django
Designing Microservices with Django

Explore microservices using the Python-based Django framework and review the benefits and drawbacks of them. This book will examine what microservices look like, how they talk to each other, and how they are crafted using the Python programming language and the Django web framework. You'll start by understanding what the key differences are between microservices and monolithic architectures. The book then does a deep dive into how microservices are built and what common models have emerged in our industry. You'll also take an extensive look at communication and ownership patterns and examine methodologies to speed up your architecture evolution by writing less but more distributed code using the Python programming language and the Django web framework. By the end of the book, you'll have a solid understanding of microservices architectures. Armed with a comprehensive and solid toolset, you can begin working toward systems that are more scalable, resilient, and maintainable. ...
Beginning Kubernetes on the Google Cloud Platform
Beginning Kubernetes on the Google Cloud Platform

Use this beginner's guide to understand and work with Kubernetes on the Google Cloud Platform and go from single monolithic Pods (the smallest unit deployed and managed by Kubernetes) all the way up to distributed, fault-tolerant stateful backing stores. You need only a familiarity with Linux, Bash, and Python to successfully use this book. Proficiency in Docker or cloud technology is not required. You will follow a learn-by-doing approach, running small experiments and observing the effects. Google open sourced Kubernetes in 2015 and now it is the industry standard in container orchestration. It has been adopted by all leading vendors of cloud, on-prem, and hybrid infrastructure services: Microsoft (Azure AKS), Amazon (AWS EKS), IBM (IBM Cloud Kubernetes Services), Alibaba Cloud (ACK), RedHat (OpenShift), and Pivotal (PKS). Even though Kubernetes is offered by all of the market-leading cloud providers, the Google Cloud Platform (GCP) offers an integrated shell (Google Cloud Shell) ...
Exploring Blazor
Exploring Blazor

Build and develop web applications with Blazor in C#. This book will cover all three types of Blazor – server-side, client-side, and hosted along with other features of the technology. You'll see that Blazor is a web UI framework based on C#, Razor, and HTML and how it runs front-end logic using C# either on the server or on the browser using WebAssembly. The author starts by introducing WebAssembly and gives an overview of Blazor along with its various categories. Next, you'll get started with Blazor where you learn the basics, including Razor syntax implementation. Here you will go over the major differences between Blazor and Razor and how the syntax works. A demo of the layout and navigation for server-side Blazor is followed by usage of Razor syntax to control an application in client-side Blazor. Further, you will go through the project layout, navigation, and routes for the API. Here, you will understand how to access the API from the front end and use the shared library fo ...
Database Design and Relational Theory, 2nd Edition
Database Design and Relational Theory, 2nd Edition

Create database designs that scale, meet business requirements, and inherently work toward keeping your data structured and usable in the face of changing business models and software systems. This book is about database design theory. Design theory is the scientific foundation for database design, just as the relational model is the scientific foundation for database technology in general. Databases lie at the heart of so much of what we do in the computing world that negative impacts of poor design can be extraordinarily widespread. This second edition includes greatly expanded coverage of exotic and little understood normal forms such as: essential tuple normal form (ETNF), redundancy free normal form (RFNF), superkey normal form (SKNF), sixth normal form (6NF), and domain key normal form (DKNF). Also included are new appendixes, including one that provides an in-depth look into the crucial notion of data consistency. Sequencing of topics has been improved, and many explanation ...
Raspberry Pi Projects for Kids
Raspberry Pi Projects for Kids

The Raspberry Pi is an inexpensive, pocket-sized computer that will help you build and code your own hardware projects. Raspberry Pi Projects for Kids will show you how to harness the power of the Raspberry Pi to create 12 cool projects using simple code and common materials like a webcam, microphone, and LED lights. Step-by-step instructions and detailed diagrams guide you through each project. After a brief introduction to the Python programming language, you'll learn how to: Create an LED night-light that turns itself on and off; Set up a Raspberry Pi camera to take selfies and videos; Set up a webcam to stream video to your cell phone; Manipulate environments in Minecraft; Hijack local radio waves to play your own songs and recordings; Configure Raspberry Pi to send texts to a cell phone; Track your family members locations via wi-fi and Bluetooth; Create an MP3 player; Set up a camera to take motion-triggered photos of wildlife; Control the electronics in your home with your ...
Foundations of Information Security
Foundations of Information Security

A high-level survey of the information security field by best-selling author Jason Andress. The book covers the basics of a wide variety of topics, from authentication and authorization to maintaining confidentiality and performing penetration testing. Using real-world security breaches as examples, Foundations of Information Security explores common applications of these concepts, such as operations security, network design, hardening and patching operating systems, securing mobile devices, as well as tools for assessing the security of hosts and applications. You'll also learn the basics of topics like: Multifactor authentication and how biometrics and hardware tokens can be used to harden the authentication process; The principles behind modern cryptography, including symmetric and asymmetric algorithms, hashes, and certificates; The laws and regulations that protect systems and data; Anti-malware tools, firewalls, and intrusion detection systems; Vulnerabilities such as buffe ...
Autotools, 2nd Edition
Autotools, 2nd Edition

The GNU Autotools make it easy for developers to create software that is portable across many Unix-like operating systems, and even Windows. Although the Autotools are used by thousands of open source software packages, they have a notoriously steep learning curve. Autotools is the first book to offer programmers a tutorial-based guide to the GNU build system. Author John Calcote begins with an overview of high-level concepts and a hands-on tour of the philosophy and design of the Autotools. He then tackles more advanced details, like using the M4 macro processor with Autoconf, extending the framework provided by Automake, and building Java and C# sources. He concludes with solutions to frequent problems encountered by Autotools users. This thoroughly revised second edition has been updated to cover the latest versions of the Autotools. It includes five new chapters on topics like pkg-config, unit and integration testing with Autotest, internationalizing with GNU tools, the porta ...
Augmenting Customer Experience with SharePoint Online
Augmenting Customer Experience with SharePoint Online

Build, enrich, and transform customer experience using SharePoint Online. This book will discuss different SharePoint Online approaches that you can use to enhance customer experience, including digital portals, enterprise content management, Microsoft Teams and much more. Augmenting Customer Experience with SharePoint Online starts with an introduction to SharePoint Online features you can adopt to create better digital customer experience and transformation. Next, you will learn about augmentation for user and customer experience followed by guidelines and methods to develop smart and intelligent portals. Moving forward, you will cover enterprise and web content management in detail along with the challenges and benefits of using SharePoint Online. The partner ecosystem is discussed next with a detailed discussion on working with suppliers, partners, and vendors. Along the way, you will see how to create smart solutions using SharePoint Online and how to manage customer references ...
Apple Device Management
Apple Device Management

Working effectively with Apple platforms at a corporate or business level includes not only infrastructure, but a mode of thinking that administrators have to adopt to find success. A mode of thinking that forces you to leave 30 years of IT dogma at the door. This book is a guide through how to integrate Apple products in your environment with a minimum of friction. Because the Apple ecosystem is not going away. You'll start by understanding where Apple, third-party software vendors, and the IT community is taking us. What is Mobile Device Management and how does it work under the hood. By understanding how MDM works, you will understand what needs to happen on your networks in order to allow for MDM, as well as the best way to give the least amount of access to the servers or services that's necessary. You'll then look at management agents that do not include MDM, as well as when you will need to use an agent as opposed to when to use other options. Once you can install a managemen ...
Learning Bulma
Learning Bulma

Learn to use Bulma in your HTML file by applying easy-to-understand practical examples to create responsive and mobile-first websites. Featuring a step-by-step approach, this book encourages you to modify its code examples and review the changes produced in the output, to thereby reveal the subtle nuances of this awesome utility. Bulma is an impressive, modern framework utility that allows the easy construction of web pages thanks to the highly flexible Flex-box grid styles and simple syntax. You'll see how to use Bulma's intuitive CSS capabilities to create interactive websites that support responsive design by dynamically adjusting the layout resulting in an optimal viewing experience. You'll then delve into typical modifiers, columns, Flex-box grid styles, forms, elements, utilities, CSS components, and more. By the end of this book, you will be familiar with the inner workings of Bulma at an intermediate level and be equipped to aptly leverage Bulma's utilities to strea ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2026