IT eBooks
Download, Read, Use
VMware Workstation - No Experience Necessary
VMware Workstation - No Experience Necessary

VMware Workstation runs on Linux as well as Windows hosts and handles different virtual machine formats, which allows you to share your work with users of other virtualization platforms, including VirtualBox, VMware Player, and VMware vSphere environments. VMware Workstation - No Experience Necessary helps you in getting started with VMware Workstation. You'll learn how to install VMware Workstation in any circumstance, and how to create virtual machines and keep different configurations for each virtual machine, which helps in setting up extensive test environments. You'll also learn how to share these virtual machines with users of other virtualization products as well as the cloud. ...
Magento, 2nd Edition
Magento, 2nd Edition

Magento is one of the most powerful, flexible, and customizable e-commerce systems. It offers you the ability to create and manage a profitable online store. As your online store grows, you can be sure that this robust e-commerce system can handle your needs. However, getting started with Magento can be difficult without the right guidance. Magento Beginner's Guide - Second Edition provides guidance in the form of a step-by-step approach to building a simple, effective online store. The book covers the key features of Magento that will help you get your store up and running. It guides you through installation, configuration, populating your store with products, accepting payments, maintaining relationships with your customers, and fulfilling orders. ...
Blender Compositing and Post Processing
Blender Compositing and Post Processing

Blender Compositing allows you to assemble and enhance an image (or movie). Using Composition nodes, you can glue two pieces of footage together and colorize the whole sequence all at once. You can enhance the colors of a single image or an entire movie clip in a static manner or in a dynamic way that changes over time (as the clip progresses). Blender Compositing and Post Processing enables you to attain a firm grounding in order to arrive at a desired look of the film, with more ease and efficiency. You will also learn how to create and manage compositing flows that are effective and productive in meeting project deadlines. ...
Delphi Cookbook
Delphi Cookbook

With this book, you will gain valuable and practical knowledge of the latest functionalities of Delphi. Starting with the foundations, you will work on your VCL application, customize the TDBGrid, and configure your runtime class using RTTI. Going forward, you will build on this foundation and deploy FireMonkey to go cross-platform or even call FireMonkey from a VCL project, and you will fully understand how you can include Delphi on your server. Finally, you will use App Tethering, call Android and iOS SDK classes, and even use the Android TextToSpeech engine to add sounds to your phone! With this learning resource at your side, you will acquire all that a RAD Studio developer needs to know about Delphi in one complete, informative guide. ...
Implementing SugarCRM
Implementing SugarCRM

SugarCRM is a popular customer relationship management system. It is available in both free open source and commercial versions, making it an ideal way for small-medium business to try out a CRM system without committing large sums of money. Although SugarCRM is carefully designed for ease of use, attaining measurable business gains requires careful planning and research. This book distils hard won SugarCRM experienced into an easy to follow guide to implementing the full power of SugarCRM. SugarCRM is an extensive PHP/MySQL based application but with its rich administration interfaces no programming is required to get the most of it. ...
Securing Hadoop
Securing Hadoop

Security of Big Data is one of the biggest concerns for enterprises today. How do we protect the sensitive information in a Hadoop ecosystem? How can we integrate Hadoop security with existing enterprise security systems? What are the challenges in securing Hadoop and its ecosystem? These are the questions which need to be answered in order to ensure effective management of Big Data. Hadoop, along with Kerberos, provides security features which enable Big Data management and which keep data secure. This book is a practitioner's guide for securing a Hadoop-based Big Data platform. This book provides you with a step-by-step approach to implementing end-to-end security along with a solid foundation of knowledge of the Hadoop and Kerberos security models. ...
Clojure High Performance Programming
Clojure High Performance Programming

Clojure is a young, dynamic, functional programming language that runs on the Java Virtual Machine. It is built with performance, pragmatism, and simplicity in mind. Like most general purpose languages, Clojure's features have different performance characteristics that one should know in order to write high performance code. Clojure High Performance Programming is a practical, to-the-point guide that shows you how to evaluate the performance implications of different Clojure abstractions, learn about their underpinnings, and apply the right approach for optimum performance in real-world programs. ...
Learning Nessus for Penetration Testing
Learning Nessus for Penetration Testing

IT security is a vast and exciting domain, with vulnerability assessment and penetration testing being the most important and commonly performed security activities across organizations today. The Nessus tool gives the end user the ability to perform these kinds of security tests quickly and effectively. Nessus is a widely used tool for vulnerability assessment, and Learning Nessus for Penetration Testing gives you a comprehensive insight into the use of this tool. This book is a step-by-step guide that will teach you about the various options available in the Nessus vulnerability scanner tool so you can conduct a vulnerability assessment that helps to identify exposures in IT infrastructure quickly and efficiently. This book will also give you an insight into penetration testing and how to conduct compliance checks using Nessus. ...
Minitab Cookbook
Minitab Cookbook

Minitab has been a statistical package of choice across all numerous sectors of industry including education and finance. Correctly using Minitab's statistical tools is an essential part of good decision making and allows you to achieve your targeted results, while displaying fantastic charts and a powerful analysis will also communicate your results more effectively. Minitab Cookbook will take the mystery out of using Minitab and will simplify the steps to produce great results. This book will be hugely beneficial for anyone who knows what statistics or studies they want to run, but who is unsure about just what button to press or what option to select. ...
Introducing Windows 8
Introducing Windows 8

Get a head start evaluating Window 8. Based on the Release Preview of the software, this guide introduces new features and capabilities, with scenario-based insights demonstrating how to plan for, deploy, and maintain Windows 8 in an enterprise environment. Network administrators will get an early, high-level view of these topics and more: Performance, reliability, and security features; Deployment options; Managing the new UI using; Group Policy and Windows PowerShell; Internet Explorer 10; Virtualization and cloud solutions; Microsoft Desktop Optimization Pack; Recovery features. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2026