IT eBooks
Download, Read, Use
Secret Recipes of the Python Ninja
Secret Recipes of the Python Ninja

This book covers the unexplored secrets of Python, delve into its depths, and uncover its mysteries. You'll unearth secrets related to the implementation of the standard library, by looking at how modules actually work. You'll understand the implementation of collections, decimals, and fraction modules. If you haven't used decorators, coroutines, and generator functions much before, as you make your way through the recipes, you'll learn what you've been missing out on. We'll cover internal special methods in detail, so you understand what they are and how they can be used to improve the engineering decisions you make. Next, you'll explore the CPython interpreter, which is a treasure trove of secret hacks that not many programmers are aware of. We'll take you through the depths of the PyPy project, where you'll come across several exciting ways that you can improve speed and concurrency. Finally, we'll take time to explore the PEPs of the latest versions to discover some intere ...
Learning Linux Shell Scripting, 2nd Edition
Learning Linux Shell Scripting, 2nd Edition

Linux is the most powerful and universally adopted OS. Shell is a program that gives the user direct interaction with the operating system. Scripts are collections of commands that are stored in a file. The shell reads this file and acts on commands as if they were typed on the keyboard. Learning Linux Shell Scripting covers Bash, GNU Bourne Again Shell, preparing you to work in the exciting world of Linux shell scripting. CentOS is a popular rpm-based stable and secured Linux distribution. Therefore, we have used CentOS distribution instead of Ubuntu distribution. Linux Shell Scripting is independent of Linux distributions, but we have covered both types of distros. We start with an introduction to the Shell environment and basic commands used. Next, we explore process management in Linux OS, real-world essentials such as debugging and perform Shell arithmetic fluently. You'll then take a step ahead and learn new and advanced topics in Shell scripting, such as decision making, star ...
OpenACC for Programmers
OpenACC for Programmers

Scientists and technical professionals can use OpenACC to leverage the immense power of modern GPUs without the complexity traditionally associated with programming them. OpenACC for Programmers is one of the first comprehensive and practical overviews of OpenACC for massively parallel programming. This book integrates contributions from 19 leading parallel-programming experts from academia, public research organizations, and industry. The authors and editors explain each key concept behind OpenACC, demonstrate how to use essential OpenACC development tools, and thoroughly explore each OpenACC feature set. Throughout, you'll find realistic examples, hands-on exercises, and case studies showcasing the efficient use of OpenACC language constructs. You'll discover how OpenACC's language constructs can be translated to maximize application performance, and how its standard interface can target multiple platforms via widely used programming languages. Each chapter builds on what yo ...
Sales Hunting
Sales Hunting

The first year of developing a new sales territory is a daunting task—especially in dog-eat-dog industries. The traditional advice is to train quickly on product, grab a customer list, start calling for appointments, discover opportunities, and close deals. In fact, almost every sales model out there is based on nothing more than "opportunity" management. But jumping straight to opportunity will have new salespeople—or veterans developing new territories—chasing their tails for the first year or two. As Sales Hunting: How to Develop New Territories and Major Accounts in Half the Time Using Trust as Your Weapon details, there is a significant problem you must overcome when opening up new accounts and territories. No matter what you are selling, your prospect already has a trusted relationship with an incumbent vendor and will continue to buy from that vendor even when you have the better solution. ...
The Agile Culture
The Agile Culture

What do you want? Delighted customers. How do you get them? By rapidly delivering innovative, exciting products and services your customers will love to use. How do you do this? By uniting talented people around shared ideas and purpose, trusting them, helping them take ownership, and getting out of their way. It sounds easy—but you know it isn't. To make it happen, you must create an agile culture: one that's open to change and can respond quickly to whatever your customers need and desire. The Agile Culture gives you proven models, pragmatic tools, and handy worksheets for doing just that. Building on their experience helping hundreds of companies, three world-class experts help you align and unleash the talents of everyone in your organization. Step by step, you'll learn how to move toward a culture of trust, in which everyone knows, owns, and improves the results. ...
Windows 10 Anniversary Update Bible
Windows 10 Anniversary Update Bible

Windows 10 Bible, Anniversary Update presents the ultimate reference for enterprise and professional Windows 10 Anniversary Update users. From setup and settings to networking and the daily workflow, this book provides expert guidance on all aspects of the OS. Read from beginning to end for a comprehensive tour of all of the nooks and crannies, or dip in as needed to find quick answers to your most pressing issues - formatted as a reference divided into mini-tutorials, this guide delves deep into the Windows 10 Anniversary Update to walk you through every inch of functionality. Personalize your settings, desktop, and security to augment the way you work; configure Windows 10 for enterprise with remote access, groups, and Hyper-V; set up a private network for two or 20 computers, and manage security to keep your content safe - everything you need to know is explained here. This book provides clear, authoritative guidance toward every aspect of the old and new to help you take advanta ...
FPGA Prototyping by SystemVerilog Examples
FPGA Prototyping by SystemVerilog Examples

This is the successor edition of the popular FPGA Prototyping by Verilog Examples text. It follows the same "learning-by-doing" approach to teach the fundamentals and practices of HDL synthesis and FPGA prototyping. The new edition uses a coherent series of examples to demonstrate the process to develop sophisticated digital circuits and IP (intellectual property) cores, integrate them into an SoC (system on a chip) framework, realize the system on an FPGA prototyping board, and verify the hardware and software operation. The examples start with simple gate-level circuits, progress gradually through the RT (register transfer) level modules, and lead to a functional embedded system with custom I/O peripherals and hardware accelerators. Although it is an introductory text, the examples are developed in a rigorous manner, and the derivations follow the strict design guidelines and coding practices used for large, complex digital systems. The book is completely updated and uses the Syst ...
Computing the Environment
Computing the Environment

Computing the Environment presents practical workflows and guidance for designers to get feedback on their design using digital design tools on environmental performance. Starting with an extensive state-of-the-art survey of what top international offices are currently using in their design projects, this book presents detailed descriptions of the tools, algorithms, and workflows used and discusses the theories that underlie these methods. Project examples from Transsolar Klimaengineering, Buro Happold's SMART Group, Behnish Behnisch Architects, Thomas Herzog, Autodesk Research are contextualized with quotes and references to key thinkers in this field such as Eric Winsberg, Andrew Marsh, Michelle Addington and Ali Malkawi. ...
Darknet
Darknet

This collaborative research project allows for fundamental advances not only in the understanding of the phenomena but also in the development of practical calculation methods that can be used by engineers. This collaborative research project allows for fundamental advances not only in the understanding of the phenomena but also in the development of practical calculation methods that can be used by engineers. ...
Learning Malware Analysis
Learning Malware Analysis

Malware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. With adversaries becoming sophisticated and carrying out advanced malware attacks on critical infrastructures, data centers, and private and public organizations, detecting, responding to, and investigating such intrusions is critical to information security professionals. Malware analysis and memory forensics have become must-have skills to fight advanced malware, targeted attacks, and security breaches. This book teaches you the concepts, techniques, and tools to understand the behavior and characteristics of malware through malware analysis. It also teaches you techniques to investigate and hunt malware using memory forensics. This book introduces you to the basics of malware analysis, and then gradually progresses into the more advanced concepts of code analysis and memory forensics. It uses real-world malware samples, ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2026