IT eBooks
Download, Read, Use
vSphere Design Best Practices
vSphere Design Best Practices

vSphere allows you to transform your IT infrastructure into a private cloud, then bridge it to public clouds on-demand, delivering an IT infrastructure as an easily accessible service. vSphere delivers uncompromised control over all IT resources with the highest efficiency and choice in the industry. The book begins with a definition of the core technologies in a virtual datacenter, vCenter, and ESXi. It then covers the architecture of specific virtual datacenter components. Readers will learn design principles related to storage and storage protocols. Moving on to networking, readers will learn to design flexible and reliable networks for their virtual datacenters. After this, Virtual Machine design considerations are reviewed in depth and readers are guided through inspecting existing VMs and design principles for correctly resourced and configured virtual machines. ...
Getting Started with SQL Server 2014 Administration
Getting Started with SQL Server 2014 Administration

The release of SQL Server 2014 has brought with it some great new features and enhancements that database administrators can use to make their database servers faster, highly available, and protected from disaster. As the lines between on-premise and on-cloud based solutions become even more blurred, enterprise database applications such as SQL Server 2014 have evolved to allow DBAs to utilize both services to maintain their key service level agreements, ensuring that their important databases are always available. SQL Server 2014 has a strong focus on business intelligence, making it a vital tool if you are looking to improve the performance of your processes as a relational database professional. ...
Design, Deployment and Performance of 4G-LTE Networks
Design, Deployment and Performance of 4G-LTE Networks

Design, Deployment and Performance of 4G-LTE Networks addresses the key practical aspects and best practice of 4G networks design, performance, and deployment. In addition, the book focuses on the end-to-end aspects of the LTE network architecture and different deployment scenarios of commercial LTE networks. It describes the air interface of LTE focusing on the access stratum protocol layers: PDCP, RLC, MAC, and Physical Layer. The air interface described in this book covers the concepts of LTE frame structure, downlink and uplink scheduling, and detailed illustrations of the data flow across the protocol layers. It describes the details of the optimization process including performance measurements and troubleshooting mechanisms in addition to demonstrating common issues and case studies based on actual field results. The book provides detailed performance analysis of key features/enhancements such as C-DRX for Smartphones battery saving, CSFB solution to support voice calls with LTE ...
The Art of Memory Forensics
The Art of Memory Forensics

Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics - now the most sought after skill in the digital forensics and incident response fields. Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. ...
Cyber Threat!
Cyber Threat!

Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nation's most highly respected cyber risk analysts, the book describes how businesses and government agencies must protect their most valuable assets to avoid potentially catastrophic consequences. Much more than just cyber security, the necessary solutions require government and industry to work cooperatively and intelligently. This resource reveals the extent of the problem, and provides a plan to change course and better manage and protect critical information. ...
A Tour of C++
A Tour of C++

In A Tour of C++, Stroustrup excerpts the overview chapters from that complete reference, expanding and enhancing them to give an experienced programmer–in just a few hours–a clear idea of what constitutes modern C++. In this concise, self-contained guide, Stroustrup covers most major language features and the major standard-library components–not, of course, in great depth, but to a level that gives programmers a meaningful overview of the language, some key examples, and practical help in getting started. Stroustrup presents the C++ features in the context of the programming styles they support, such as object-oriented and generic programming. His tour is remarkably comprehensive. Coverage begins with the basics, then ranges widely through more advanced topics, including many that are new in C++11, such as move semantics, uniform initialization, lambda expressions, improved containers, random numbers, and concurrency. The tour ends with a discussion of the design and evoluti ...
Learn Python the Hard Way, 3rd Edition
Learn Python the Hard Way, 3rd Edition

Zed Shaw has perfected the world's best system for learning Python. Follow it and you will succeed-just like the hundreds of thousands of beginners Zed has taught to date! You bring the discipline, commitment, and persistence; the author supplies everything else. In Learn Python the Hard Way, 3rd Edition, you'll learn Python by working through 52 brilliantly crafted exercises. Read them. Type their code precisely. Fix your mistakes. Watch the programs run. As you do, you'll learn how software works; what good programs look like; how to read, write, and think about code; and how to find and fix your mistakes using tricks professional programmers use. Most importantly, you'll learn the following, which you need to start writing excellent Python software of your own:Installing a complete Python environmentOrganizing and writing codeBasic mathematicsVariablesStrings and textInteracting with usersWorking with filesLoopi ...
Kivy: Interactive Applications in Python
Kivy: Interactive Applications in Python

Mobiles and tablets have brought with them a dramatic change in the utility of applications. Compatibility has become essential, and this has increased the kind of interaction that users expect: gestures, multi-touches, animations, and magic pens. Kivy is an open source Python solution that covers these market needs with an easy-to-learn and rapid development approach. Kivy is growing fast and gaining attention as an alternative to the established developing platforms. Kivy: Interactive Applications in Python quickly introduces you to the Kivy development methodology. You will learn some examples of how to use many of the Kivy components, as well as understand how to integrate and combine them into big projects. This book serves as a reference guide and is organized in such a way that once finished, you will have already completed your first project. ...
Hacking Point of Sale
Hacking Point of Sale

As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more – it's packed with practical recommendations. This terrific resource goes beyond standard PCI compliance guides to offer real solutions on how to achieve better security at the point of sale. ...
Android Hacker's Handbook
Android Hacker's Handbook

As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them. If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025