IT eBooks
Download, Read, Use
Graph Analysis and Visualization
Graph Analysis and Visualization

Graph Analysis and Visualization brings graph theory out of the lab and into the real world. Using sophisticated methods and tools that span analysis functions, this guide shows you how to exploit graph and network analytic techniques to enable the discovery of new business insights and opportunities. Published in full color, the book describes the process of creating powerful visualizations using a rich and engaging set of examples from sports, finance, marketing, security, social media, and more. You will find practical guidance toward pattern identification and using various data sources, including Big Data, plus clear instruction on the use of software and programming. The companion website offers data sets, full code examples in Python, and links to all the tools covered in the book. Science has already reaped the benefit of network and graph theory, which has powered breakthroughs in physics, economics, genetics, and more. This book brings those proven techniques into the worl ...
Modern API Design with ASP.NET Core 2
Modern API Design with ASP.NET Core 2

Use ASP.NET Core 2 to create durable and cross-platform web APIs through a series of applied, practical scenarios. Examples in this book help you build APIs that are fast and scalable. You'll progress from the basics of the framework through to solving the complex problems encountered in implementing secure RESTful services. The book is packed full of examples showing how Microsoft's ground-up rewrite of ASP.NET Core 2 enables native cross-platform applications that are fast and modular, allowing your cloud-ready server applications to scale as your business grows. Major topics covered in the book include the fundamentals and core concepts of ASP.NET Core 2. You'll learn about building RESTful APIs with the MVC pattern using proven best practices and following the six principles of REST. Examples in the book help in learning to develop world-class web APIs and applications that can run on any platform, including Windows, Linux, and MacOS. You can even deploy to Microsoft Azure and a ...
Lync Server Cookbook
Lync Server Cookbook

This book begins with the fundamental security-related tasks you should be aware of when working with Lync, before moving on to walk you through the authentication mechanisms. You will get hands-on experience with the steps required to integrate Lync with Office 365, Exchange, or trusted forests. You will explore how to use various tools such as the Bandwidth calculator, Lync resource kit tools, stress and performance tools, and planning tools that will help you to manage complex Lync features such as enterprise voice. This book will take you through designing a Lync solution right from assessing the existing infrastructure and capturing the requirements through to planning for user-training. Finally, the book concludes by showing you how to control and manage your networks and introduces you to various debugging tools such as Wireshark, CLSController, and more. The book aims at empowering you to successfully manage your Lync deployments with ease. ...
Moving to Office 365
Moving to Office 365

This book takes a concentrated look at the very latest best practices for Office 365 migration, with a focus on the needs of senior managers, IT managers, and others involved in key decisions when moving their business to the cloud. Based on popular chapters in his first book, Office 365: Migrating and Managing Your Business in the Cloud (Apress Open, co-authored with Don Crawford), author Matt Katzer revises and expands on his original material to bring you the very latest guidance on planning methods, management best practices, personnel decisions and migration and maintenance costs, along with brand new material on some of the most important and cutting-edge considerations when moving your business to the cloud: securing company data, and driving social collaboration in the workplace. Cloud technology provides a tremendous opportunity for an organization to reduce IT costs, and to improve productivity with increased mobile access, simpler administration, better security, and e ...
Sams Teach Yourself TCP/IP in 24 Hours, 6th Edition
Sams Teach Yourself TCP/IP in 24 Hours, 6th Edition

Sams Teach Yourself TCP/IP in 24 Hours, 6th Edition is a practical guide to the simple yet illusive protocol system that powers the Internet. A step-by-step approach reveals how the protocols of the TCP/IP stack really work and explores the rich array of services available on the Internet today. You'll learn about configuring and managing real-world networks, and you'll gain the deep understanding you'll need to troubleshoot new problems when they arise. Sams Teach Yourself TCP/IP in 24 Hours is the only single-volume introduction to TCP/IP that receives regular updates to incorporate new technologies of the ever-changing Internet. This latest edition includes up-to-date material on recent topics such as tracking and privacy, cloud computing, mobile networks, and the Internet of Things. Learn how to: Understand TCP/IP's role, how it works, and how it continues to evolve; Work with TCP/IP's Network Access, Internet, Transport, and Application layers; Design modern networks that will ...
Sams Teach Yourself ASP.NET Core in 24 Hours
Sams Teach Yourself ASP.NET Core in 24 Hours

In just 24 sessions of one hour or less, Sams Teach Yourself ASP.NET Core in 24 Hours, will help you build professional-quality, cloud-based, web-connected solutions with ASP.NET Core. This book's straightforward, step-by-step approach guides you from the basics to advanced techniques, using practical examples to help you make the most of Microsoft's radically revamped ASP.NET Core framework. ASP.NET Program Manager Jeffrey T. Fritz guides you from jumpstarting development with templates to implementing cutting-edge security and containerization. Every lesson builds on what you've already learned, giving you a rock-solid foundation for real-world success. Learn how to: Set up your work environment on Windows or non-Windows operating systems; Develop solutions more quickly by starting with project templates; Configure ASP.NET Core, services, and applications; Access data with Entity Framework Core; Build modern architectures, controllers, and views with the new version of MVC; Scaffo ...
iOS 11 Swift Programming Cookbook
iOS 11 Swift Programming Cookbook

iOS 11, Swift 4, and Xcode 9 provide many new APIs for iOS developers. With this cookbook, you'll learn more than 170 proven solutions for tackling the latest features in iOS 11 and watchOS 4, including new ways to use Swift and Xcode to make your day-to-day app development life easier. This collection of code-rich recipes also gets you up to speed on continuous delivery and continuous integration systems. Ideal for intermediate and advanced iOS developers looking to work with the newest version of iOS, these recipes include reusable code on GitHub, so you can put them to work in your project right away. Among the topics covered in this book: New features in Swift 4 and Xcode 9; Tools for continuous delivery and continuous integration; Snapshot testing and test automation; Creating document-based applications; Updated Map view and Core Location features; iOS 11's Security and Password Autofill; Data storage with Apple's Core Data; Creating lively user interfaces with UI Dynamics; ...
C# 7.0 in a Nutshell, 7th Edition
C# 7.0 in a Nutshell, 7th Edition

When you have questions about C# 7.0 or the .NET CLR and its core Framework assemblies, this bestselling guide has the answers you need. Since its debut in 2000, C# has become a language of unusual flexibility and breadth, but its continual growth means there's always more to learn. Organized around concepts and use cases, this updated edition provides intermediate and advanced programmers with a concise map of C# and .NET knowledge. Dive in and discover why this Nutshell guide is considered the definitive reference on C#. Get up to speed on the C# language, from the basics of syntax and variables to advanced topics such as pointers, operator overloading, and dynamic binding; Dig deep into LINQ via three chapters dedicated to the topic; Explore concurrency and asynchrony, advanced threading, and parallel programming; Work with .NET features, including XML, regular expressions, networking, serialization, reflection, application domains, and security; Delve into Roslyn, the modular ...
Network Attacks and Exploitation
Network Attacks and Exploitation

Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate vulnerability and security operations, this guide helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Numerous real-world examples illustrate the offensive and defensive concepts at work, including Conficker, Stuxnet, the Target compromise, and more. You will find clear guidance toward strategy, tools, and implementation, with practical advice on blocking systematic computer espionage and the theft of information from governments, companies, and individuals. Assaults and manipulation of computer networks are rampant around the world. One of the biggest challenges is fitting the ever-increasing amount of information into a whole plan or framework to ...
Penetration Testing with Raspberry Pi
Penetration Testing with Raspberry Pi

The Raspberry Pi is a low-cost credit-card sized computing system that can be customized for just about anything including penetration testing. Raspberry Pi is the best known platform not because it is cheap but because it is very powerful. Kali is a pentesting/security auditing Linux distribution. Kali Linux has many penetration-testing programs, including nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper (a password cracker), Aircrack-ng (a software suite for the penetration-testing of wireless LANs), and Burp suite and OWASP ZAP (both web application security scanners). This book covers how to turn a Raspberry Pi into a hacking arsenal to leverage the most popular open source toolkit, Kali Linux. You will learn how to use various tools to breach networks and steal data. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025