IT eBooks
Download, Read, Use
Designing Hyper-V Solutions
Designing Hyper-V Solutions

This book is a practical, example-oriented tutorial that will guide you through the basics and architecture of the Hyper-V platform and help you understand how to build your virtualization infrastructure from the ground up. It then goes on to focus on scalability and high availability aspects, and trains you to set up highly available Hyper-V clusters and perform the live migration of virtual machines. You will also learn about advancements in virtual networking and storage in Windows Server 2012 and Windows Server 2012 R2. Finally, the book then advises you on how to set up backup and recovery and how to prepare a disaster recovery plan via Hyper-V Replica, concluding with insight into Microsoft VDI implementation guidance. ...
Develop on Yammer
Develop on Yammer

Develop on Yammer is your guide to integrating the Yammer social network with your company's application ecosystem. By developing custom apps and features on the Yammer platform, you can make your workplace more productive, encourage communication and feedback, and get your colleagues collaborating across a range of platforms, including SharePoint, ASP.NET, and Windows Phone. The book begins with an introduction to the development options available along with guidance on how to set up a Yammer developer account. You'll then take your first step in Yammer integration by building a Yammer feed into a web page or other JavaScript-based client application, before diving into app creation and management on the Yammer platform. ...
Drupal 8 for Absolute Beginners
Drupal 8 for Absolute Beginners

Drupal 8 for Absolute Beginners is your definitive guide to starting from scratch with Drupal even if you have little web knowledge. This book teaches you the basics of HTML, CSS, JavaScript, and PHP in relation to Drupal, so that you can begin to use this popular CMS with all of its features. You will first learn how to set up and customize a basic blog using Drupal, one of the most powerful and popular content management systems available today. From there you will learn the basics of HTML, CSS, JavaScript and PHP, and apply this knowledge to create your own custom Drupal module. You will learn how to build, style, and add functionality to your own Drupal module from scratch. You will then use Drush to apply a theme to Drupal, customizing everything to your liking, before publishing your work to the world. The book also covers some more advanced topics that beginners often ask about, such as getting set up with Git and using source control, using MySQL to interact with a database, ...
edX E-Learning Course Development
edX E-Learning Course Development

edX is an open source learning management system (LMS) and course-authoring tool that educational institutions and private organizations can use to create massive online open courses (MOOCs) and small private online courses (SPOCs). This book walks you through the eight essential steps you will take to create your first edX course while teaching you tools and techniques you need to know as an edX instructor. Organized sequentially, each chapter represents a stage in your curriculum development and implementation process. We begin with an overview of MOOCs and the history of edX; detail curriculum development and video production best practices; explore options for exercises and assessments; address your course's administrative options; and then review your role as a facilitator. Lastly, we suggest a strategy to market your course with traditional tools, edX options, and social media. ...
Elasticsearch Blueprints
Elasticsearch Blueprints

Elasticsearch is a distributed search server similar to Apache Solr with a focus on large datasets, schemaless setup, and high availability. Utilizing the Apache Lucene library (also used in Apache Solr), Elasticsearch enables powerful full-text search, as well as autocomplete "morelikethis" search, multilingual functionality, and an extensive search query DSL. This book starts with the creation of a Google-like web search service, enabling you to generate your own search results. You will then learn how an e-commerce website can be built using Elasticsearch. We will discuss various approaches in getting relevant content up the results, such as relevancy based on how well a query matched the text, time-based recent documents, geographically nearer items, and other frequently used approaches. Finally, the book will cover various geocapabilities of Elasticsearch to make your searches similar to real-world scenarios. ...
Elasticsearch Indexing
Elasticsearch Indexing

Beginning with an overview of the way ElasticSearch stores data, you'll begin to extend your knowledge to tackle indexing and mapping, and learn how to configure ElasticSearch to meet your users' needs. You'll then find out how to use analysis and analyzers for greater intelligence in how you organize and pull up search results – to guarantee that every search query is met with the relevant results! You'll explore the anatomy of an ElasticSearch cluster, and learn how to set up configurations that give you optimum availability as well as scalability. Once you've learned how these elements work, you'll find real-world solutions to help you improve indexing performance, as well as tips and guidance on safety so you can back up and restore data. Once you've learned each component outlined throughout, you will be confident that you can help to deliver an improved search experience – exactly what modern users demand and expect. ...
Elastix Unified Communications Server Cookbook
Elastix Unified Communications Server Cookbook

Elastix brings together the most useful tools and features from the Unified Communications and Open Source worlds: IP-PBX, Chat, Call Center, Multisite, Video, and so on, in a modular way. Beginning with installation and gaining an in-depth understanding of the internal workings of Elastix, you will soon dive into the core features of Elastix and VoIP and Unified Communications to enable a full cost-effective Unified Communications server solution. You will explore the configuration of IP-BPX features, control call routes and destinations, and troubleshoot the unified communications software. Finish by going that extra mile and securing your server and implement advanced dialplan functions. Through this step-by-step guide you will get to grips with VoIP and Unified Communications with Elastix and dive into practical tips to install, deploy, and maintain your own solutions. ...
Elementary Number Theory with Programming
Elementary Number Theory with Programming

Bridging an existing gap between mathematics and programming, Elementary Number Theory with Programming provides a unique introduction to elementary number theory with fundamental coverage of computer programming. Written by highly-qualified experts in the fields of computer science and mathematics, the book features accessible coverage for readers with various levels of experience and explores number theory in the context of programming without relying on advanced prerequisite knowledge and concepts in either area. Elementary Number Theory with Programming features comprehensive coverage of the methodology and applications of the most well-known theorems, problems, and concepts in number theory. Using standard mathematical applications within the programming field, the book presents modular arithmetic and prime decomposition, which are the basis of the public-private key system of cryptography. ...
Enterprise Cybersecurity
Enterprise Cybersecurity

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity program that is seamlessly coordinated with policy, programmatics, IT life cycle, and assessment. Fail-safe cyberdefense is a pipe dream. Given sufficient time, an intelligent attacker can eventually defeat defensive measures protecting an enterprise's computer systems and IT networks. To prevail, an enterprise cybersecurity program must manage risk by detecting attacks early enough and delaying them long enough that the defenders have time to respond effectively. Enterprise Cybersecurity shows players at all levels of responsibility how to unify their organization's people, budgets, technolog ...
Enterprise IoT
Enterprise IoT

Current hype aside, the Internet of Things will ultimately become as fundamental as the Internet itself, with lots of opportunities and trials along the way. To help you navigate these choppy waters, this practical guide introduces a dedicated methodology for businesses preparing to transition towards IoT-based business models. With a set of best practices based on case study analysis, expert interviews, and the authors' own experience, the Ignite | IoT Methodology outlined in this book delivers actionable guidelines to assist you with IoT strategy management and project execution. You'll also find a detailed case study of a project fully developed with this methodology. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2026