IT eBooks
Download, Read, Use
Beginning Backdrop CMS
Beginning Backdrop CMS

Learn what Backdrop CMS is and how it fulfills the role of a content management system, along with how to install and configure it. This book teaches how to create and manage content, taxonomy, users, page layouts, and menus to get the best site possible. You'll also see how to install on shared hosting – which is a focus of the Backdrop CMS team – to make hosting your website affordable. Backdrop CMS has a very strong community, and Beginning Backdrop CMS shows you how to leverage Backdrop CMS's repository of contributed modules and themes to expand the functionality and look of your site, along with how to contribute your own material to the community. Beginning Backdrop CMS focuses on the user who is responsible for building, maintaining, and managing an organization's website and who is interested in Backdrop CMS's ability to meet their site's requirements. It covers why you should consider using a content management system when building a new web site. ...
Building a Comprehensive IT Security Program
Building a Comprehensive IT Security Program

This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the current situation as it relates to cybersecurity, the challenges facing private business, and the fundamental changes organizations can make to better protect themselves. The problems we face are difficult, but they are not hopeless. Cybercrime continues to grow at an astounding rate. With constant coverage of cyber-attacks in the media, there is no shortage of awareness of increasing threats. Budgets have increased and executives are implementing stronger defenses. Nonetheless, breaches continue to increase in frequency and scope. Building a Comprehensive IT Security Program shares why organizations continue to fail to secure their critical inform ...
Cyber-Physical Attack Recovery Procedures
Cyber-Physical Attack Recovery Procedures

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those things at the same time—even from the other side of the planet. Not every equipment failure or power outage is a cyber-physical attack. When your building is attacked, you probably won't suspect it was a hacker—until you see a pattern. The building control system (BCS) will act "squirrelly" and you will know—it really is a cyber-physical attack. Once a cyber-physical attack occurs, it can mean years of court cases, job losses, higher insurance rates, and maybe even criminal litigation. It also takes years to overcome the loss of safety credibility to your emplo ...
.NET Development Using the Compiler API
.NET Development Using the Compiler API

This is the first book to describe the recent significant changes to the .NET compilation process and demonstrate how .NET developers can use the new Compiler API to create compelling applications. As an open source compiler, the Compiler API now makes its code available for anyone to use. In this book, you'll get a concise, focused view of this tremendous resource for developers, who can now use any part of the platform implementation to their advantage in analyzing applications, improving code generation, and providing enforceable patterns, all under an OSS model. You will learn how to analyze your code for defects in a fast, clean manner never available before. You'll work with solutions and projects to provide automatic refactoring, and you'll discover how you can generate code dynamically to provide application implementations at runtime Having the Compiler API available opens a number of doors for .NET developers that were either simply not there before, or difficult to ach ...
Building a Virtual Assistant for Raspberry Pi
Building a Virtual Assistant for Raspberry Pi

Build a voice-controlled virtual assistant using speech-to-text engines, text-to-speech engines, and conversation modules. This book shows you how to program the virtual assistant to gather data from the internet (weather data, data from Wikipedia, data mining); play music; and take notes. Each chapter covers building a mini project/module to make the virtual assistant better. You'll develop the software on Linux or OS X before transferring it to your Raspberry Pi, ready for deploying in your own home-automation or Internet of Things applications. Building a Virtual Assistant for Raspberry Pi walks you through various STTs and TTSs and the implementation of these components with the help of Python. After that you will start implementing logic for handling user queries and commands, so that the user can have conversations with Melissa. You will then work to improve logic handling to detect what the user wants Melissa to do. You will also work on building some useful applications/modu ...
Data Wrangling with Python
Data Wrangling with Python

How do you take your data analysis skills beyond Excel to the next level? By learning just enough Python to get stuff done. This hands-on guide shows non-programmers like you how to process information that's initially too messy or difficult to access. You don't need to know a thing about the Python programming language to get started. Through various step-by-step exercises, you'll learn how to acquire, clean, analyze, and present data efficiently. You'll also discover how to automate your data process, schedule file- editing and clean-up tasks, process larger datasets, and create compelling stories with data you obtain. ...
Efficient R Programming
Efficient R Programming

Become a more productive programmer with Efficient R Programming. Drawing on years of experience teaching R courses, authors Colin Gillespie and Robin Lovelace give practical advice on a range of topics - from optimizing set-up of RStudio to leveraging C++ - that make this book a valuable asset for both experienced and novice programmers. It's suitable for academics, business users, and programmers from a wide range of backgrounds. Get practical, tried-and-true advice from longtime R instructors; Dive into a wide range of topics, including RStudio set-up and leveraging C++, suitable for all skill levels; Gain insight into RStudio's functionality to boost code-writing productivity; Learn the necessary skills for team-based R programming work; Save time, and energy, debugging code and searching online forums. ...
ASP.NET jQuery Cookbook, 2nd Edition
ASP.NET jQuery Cookbook, 2nd Edition

jQuery is a lightweight JavaScript library that has changed the landscape of client scripting in web applications. Developed by John Resig in 2006, it has taken the web by storm because of its cross-browser compatibility and the ability to get more done with less code. It has gained popularity with ASP.NET developers and is now distributed with Visual Studio and the NuGet package manager. ASP.NET jQuery Cookbook explores the wide range of utilities that the jQuery library provides. It teaches you the nitty-gritty of plugging in these features in ASP.NET web applications. It covers every aspect of interfacing the library, right from downloading and including jQuery on web pages to selecting controls, handling events, and creating animations. This book also walks you through DOM traversal and manipulation in ASP.NET and then through visual effects and graphics in ASP.NET sites. It explores advanced features such as posting AJAX requests and writing plugins. It will provide you with al ...
3D Printing Designs: Octopus Pencil Holder
3D Printing Designs: Octopus Pencil Holder

This book will cover the very basic but essential techniques you need to model an organic and functional object for 3D printing using Blender. Starting with pen and paper and then moving on to the computer, you will create your first project in Blender, add basic geometric shapes, and use techniques such as extruding and subdividing to transform these shapes into complex meshes. You will learn how modifiers can automatically refine the shape further and combine multiple shapes into a single 3D printable model. By the end of the book, you will have gained enough practical hands-on experience to be able to create a 3D printable object of your choice, which in this case is a 3D print-ready octopus pencil holder. ...
3D Printing Designs: Design an SD Card Holder
3D Printing Designs: Design an SD Card Holder

Want to model a 3D printed prototype of an object that needs to be replaced or broken? This book will teach you how to accurately measure objects in the real world with a few basic measuring techniques and how to create an object for 3D printing around the objects measured. In this book, you'll learn to identify basic shapes from a given object, use Vernier and Digital calipers and grid paper tracing techniques to derive measurements for the objects. With the help of measurements, you'll see to model these objects using Blender, organize the parts into layers, and later combine them to create the desired object, which in this book is a 3D printable SD card holder ring that fits your finger. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2026