IT eBooks
Download, Read, Use
Developing Microservices Architecture on Microsoft Azure with Open Source Technologies
Developing Microservices Architecture on Microsoft Azure with Open Source Technologies

Increasingly, organizations are modernizing application development by integrating open source technologies into a holistic architecture for delivering high-quality workloads to the cloud. This is a complete, step-by-step guide to building flexible microservices architecture by leveraging Microsoft Azure cloud services, together with key open source technologies such as Java, Node.JS, .NET Core and Angular. Through a realistic case study project, expert Microsoft engineers Ovais Mehboob Ahmed Khan and Arvind Chandaka guide you through every step of technical implementation required to achieve value: establishing end-to-end infrastructure, developing cloud-native applications, automating deployments, monitoring operations, and more. Microsoft engineers Ovais Mehboob Ahmed Khan and Arvind Chandaka show how to: Define application features and business requirements, and map them onto microservices using modeling techniques; Design microservices solution architecture that enables high-qu ...
FPGAs for Dummies, 2nd Edition
FPGAs for Dummies, 2nd Edition

Field programmable gate arrays (FPGAs) are integrated circuits that enable designers to program customized digital logic in the field. FPGAs have been around since the 1980s and were originally conceived to give all design teams the ability to create custom logic. In the early days, using an FPGA in your design meant you had to do a lot of programming just to get your FPGA to perform simple functions, so most designers avoided them. If you haven't looked into FPGAs since your university studies way back when, you'll want to take another look at them. The FPGA has evolved from a useful but humble interface device into a system-level integrated circuit (IC) with its own microprocessors, memory blocks, and interfaces. It's the next big thing. Now would be a great time to get an inexpensive development kit, download free tools, and begin to explore this world for yourself. And this book will help you understand the practical uses of FPGAs. This book is for you if you're a system d ...
Pro Active Directory Certificate Services
Pro Active Directory Certificate Services

In order to deploy and use Microsoft Certificate Services, you need to understand the fundamentals of cryptography, digital signatures, encryption, TLS, and S/MIME. It is also important to understand the concepts behind public key infrastructure (PKI). This book teaches you all the required background knowledge you need. Then it takes you deeper, step by step, teaching you how to deploy Certificate Services and configure it to issue various digital certificate types, complete with examples of using these certificates with IIS, Outlook, and Windows. Microsoft-based networks - on-premises, hybrid, and cloud-based networks - are used in companies of all sizes. Within them, there are many applications of digital certificates that can be created and managed by Microsoft Certificate Services. As security is more important than ever, and cryptography and PKI are fundamental to so many of these defenses, understanding Microsoft Certificate Services is becoming an increasingly more desirable ...
SQL Server Source Control Basics
SQL Server Source Control Basics

Few software developers would build an application without using source control, but its adoption for databases has been slower. Yet without source control to maintain the scripts necessary to create our database objects, load lookup data, and take other actions, we cannot guarantee a reliable and repeatable database deployment process, let alone coordinate database upgrades with changes to the application. We also run the risk that our "ad hoc" database patching will cause inconsistencies and data loss. Source control can and should play a key role in the database development and deployment process, and this book will show you exactly how to get started. It provides 'just enough' detail about the core components of a source control system and how to incorporate that system into the database development and deployment processes, covering: Database Source Control architecture - what to include, how to structure the components Collaborative editing - teamwork on a database project, while ...
Artificial Intelligence Programming with Python
Artificial Intelligence Programming with Python

In Practical Artificial Intelligence Programming with Python: From Zero to Hero, veteran educator and photophysicist Dr. Perry Xiao delivers a thorough introduction to one of the most exciting areas of computer science in modern history. The book demystifies artificial intelligence and teaches readers its fundamentals from scratch in simple and plain language and with illustrative code examples. Divided into three parts, the author explains artificial intelligence generally, machine learning, and deep learning. It tackles a wide variety of useful topics, from classification and regression in machine learning to generative adversarial networks. He also includes: Fulsome introductions to MATLAB, Python, AI, machine learning, and deep learning; Expansive discussions on supervised and unsupervised machine learning, as well as semi-supervised learning; Practical AI and Python "cheat sheet" quick references. This hands-on AI programming guide is perfect for anyone with a basic knowledg ...
Python for Cybersecurity
Python for Cybersecurity

Python For Cybersecurity: Using Python for Cyber Offense and Defense delivers an intuitive and hands-on explanation of using Python for cybersecurity. It relies on the MITRE ATT&CK framework to structure its exploration of cyberattack techniques, attack defenses, and the key cybersecurity challenges facing network administrators and other stakeholders today. Offering downloadable sample code, the book is written to help you discover how to use Python in a wide variety of cybersecurity situations, including: Reconnaissance, resource development, initial access, and execution; Persistence, privilege escalation, defense evasion, and credential access; Discovery, lateral movement, collection, and command and control; Exfiltration and impact. Each chapter includes discussions of several techniques and sub-techniques that could be used to achieve an attacker's objectives in any of these use cases. The ideal resource for anyone with a professional or personal interest in cybersecurity, ...
PHP & MySQL
PHP & MySQL

Learn PHP, the programming language used to build sites like Facebook, Wikipedia and WordPress, then discover how these sites store information in a database (MySQL) and use the database to create the web pages. This full-color book is packed with inspiring code examples, infographics and photography that not only teach you the PHP language and how to work with databases, but also show you how to build new applications from scratch. It demonstrates practical techniques that you will recognize from popular sites where visitors can: Register as a member and log in; Create articles, posts and profiles that are saved in a database; Upload their own images and files; Automatically receive email notifications; Like and comment on posts. To show you how to apply the skills you learn, you will build a complete content management system, enhanced with features that are commonly seen on social networks. Written by best-selling HTML & CSS and JavaScript & jQuery author Jon Duckett, this ...
Using .NET Core, Docker, and Kubernetes Succinctly
Using .NET Core, Docker, and Kubernetes Succinctly

Terms like container and Docker, unknown to Microsoft programmers until now, have recently become essential in technical discussions about the development, distribution, and management of our applications. Containers can solve some of programmers' everyday problems, but a challenge with them is managing their lifecycles and the communication among them. So we need to choose a container technology, with Docker being the most commonly used, and an orchestrator, with Kubernetes being the best choice today. In Using .NET Core, Docker, and Kubernetes Succinctly, Michele Aponte will walk you through using Docker and Kubernetes with a .NET Core example application. ...
Apache HTTP Server Cookbook
Apache HTTP Server Cookbook

The Apache HTTP Server, colloquially called Apache, is the world's most used web server software. Originally based on the NCSA HTTPd server, development of Apache began in early 1995 after work on the NCSA code stalled. Apache played a key role in the initial growth of the World Wide Web, quickly overtaking NCSA HTTPd as the dominant HTTP server, and has remained most popular since April 1996. In 2009, it became the first web server software to serve more than 100 million websites. Apache is developed and maintained by an open community of developers under the auspices of the Apache Software Foundation. Most commonly used on a Unix-like system (usually Linux), the software is available for a wide variety of operating systems besides Unix, including eComStation, Microsoft Windows, NetWare, OpenVMS, OS/2, and TPF. Released under the Apache License, Apache is free and open-source software. In this open book, we provide a compilation of Apache HTTP Server tutorials that will help you ...
SAP Intelligent RPA for Developers
SAP Intelligent RPA for Developers

SAP Intelligent Robotic Process Automation (RPA) enables businesses to automate repetitive work and integrate automation capabilities across SAP and non-SAP systems. This book provides end-to-end coverage of business process automation using SAP Intelligent RPA and shows how to build multiple SAP Intelligent RPA projects from start to finish. Some of these projects may build upon the work done in previous chapters to showcase the Agile development process in SAP Intelligent RPA. As you progress, you'll cover the SAP Intelligent RPA factory, Desktop Studio, Cloud Studio, and the Bot store. You'll also learn about the building blocks of the SAP Intelligent RPA solution and creating bots from initial application declaration to workflow design and deployment, along with making bots run in attended and unattended modes. You'll also learn about SAP Process Automation, the new SAP service that is going to replace the SAP Intelligent RPA service soon. Finally, we will discuss the migr ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2026