IT eBooks
Download, Read, Use
Practical Guide to Salesforce Communities
Practical Guide to Salesforce Communities

Whether you are brand new to the world of Salesforce communities or you are looking to take your Community Cloud knowledge to the next level, this detailed guide will help you to build and manage a Salesforce community by leveraging the declarative power of the platform with clicks, not code. Each Salesforce community is a part of a widespread ecosystem, with thousands of communities and millions of users active today on Community Cloud. Through valuable social and business tools, this online platform enables companies to empower and equip their customers, partners, and employees in new, powerful ways. In this book, Philip Weinmeister, a Salesforce MVP and the first-ever recipient of the "Community Cloud MVP" Trailblazer award, leads you through the ins and outs of Salesforce communities and provides you with an array of best practices to deliver top-notch business portals on the Salesforce platform. Practical Guide to Salesforce Communities is the first book to comprehensivel ...
Practical API Architecture and Development with Azure and AWS
Practical API Architecture and Development with Azure and AWS

Learn the business and technical importance of API design and architecture using the available cloud services from Azure and AWS. This book starts off with an introduction to APIs and the concept of API Economy from a business and organizational perspective. You'll decide on a sustainable API strategy and API architecture based on different case scenarios. You'll then look at actual examples on API development guidelines, providing a practical view and approach towards the API development and aligning teams in API development. This book walks you through the API gateway services available in Azure and AWS and reviews different approaches to API Security. This will prepare you for understanding the trade-off between security and the frictionless API experience. Implement API Gateways to streamline API Development; Examine Security Mapping with API gateways from Azure and AWS; Apply API implementation using Serverless architecture; Review evolving APIs for monitoring and changing ...
Introducing the MySQL 8 Document Store
Introducing the MySQL 8 Document Store

Learn the new Document Store feature of MySQL 8 and build applications around a mix of the best features from SQL and NoSQL database paradigms. Don't allow yourself to be forced into one paradigm or the other, but combine both approaches by using the Document Store. MySQL 8 was designed from the beginning to bridge the gap between NoSQL and SQL. Oracle recognizes that many solutions need the capabilities of both. More specifically, developers need to store objects as loose collections of schema-less documents, but those same developers also need the ability to run structured queries on their data. With MySQL 8, you can do both! Introducing the MySQL 8 Document Store presents new tools and features that make creating a hybrid database solution far easier than ever before. This book covers the vitally important MySQL Document Store, the new X Protocol for developing applications, and a new client shell called the MySQL Shell. Also covered are supporting technologies and concepts such ...
Beginning Backup and Restore for SQL Server
Beginning Backup and Restore for SQL Server

Be guided through the techniques to back up and restore databases and files in SQL Server. Multiple techniques are presented for ensuring the integrity and consistency of database backups, as well as the reliability and manageability of restoring from backups. In today's data-driven world, the most important asset that a company has is its data. Data recovery strategies can be wide ranging; from the practically non-existent backup without verification to a very complex, distributed, and redundant system. An important objective for any database administrator is data loss prevention, and in a catastrophic data loss event, pre-defined data recovery techniques must be employed in order to get the databases back up and running efficiently and quickly. Using a tutorial method of teaching, Beginning Backup and Restore for SQL Server explores the many facets behind the principles of backing up and restoring data from your database, and then shows practical application methods for gettin ...
Azure and Xamarin Forms
Azure and Xamarin Forms

Discover how to create cross platform apps for Android, iOS and UWP using Azure services and C# with Xamarin Forms. This book illustrates how to utilize Azure cloud storage for serving up Azure SQL DB data through Azure App Services. The book starts by setting up Xamarin and introducing Xamarin Forms and then covers the Azure Portal from a developer's perspective and goes on to demonstrate how to build an Azure Service using Quickstart. You'll also see how to add Azure support to Xamarin Forms application. You'll review in detail how to build a Xamarin Form with Azure Client and modify an existing app to become a Xamarin Forms Client for Azure with offline synchronization. You then move on to third-party controls that speed up development. By the end of the book, you will be able to use Azure and Xamarin together and master how to use Azure Mobile Quickstarts, Azure SQL plumbing, database synchronization and Xamarin Forms. Create a Xamarin Forms App and understand the Structur ...
Programming 101
Programming 101

Understand the importance of programming, even if you've never programmed before! This book will teach you the basics of programming using the Processing programming language. You will create your own Processing sketches, using personal images, themes, or hobbies that you enjoy. The chapters in the book will demonstrate the process of programming, starting with formulating an idea, planning, building on past projects, and refining the work, similar to writing an essay or composing a song. This approach will guide you to make use of logic and mathematics to produce beautiful effects. The term for program in Processing is sketch, though the sketches featured in this book are far more than static drawings; they incorporate interaction, animation, video, audio, and accessing files on the local computer and on the Web. Technical features are introduced and explained in the context of complete examples: games (Snake, Hangman, jigsaw, slingshot), making a collage of family images and ...
Python Graphics
Python Graphics

Use Python's built-in features to create innovative graphics for data visualization and technical illustrations. This book goes beyond simple commands and libraries to explain how to not only display but also rotate, shade, and edit graphics for any purpose. Starting with the essential Python functions to set up a plotting space and produce 2 and 3-dimensional objects, you'll learn how to construct more complex objects, translate and rotate them, remove hidden lines, introduce shading to add realism, and project images to visualize any dataset. The final chapter includes several worked applications in science and engineering including planetary models, which you can adapt for your own use. Written for developers who want to harness Python's capabilities to fine-tune their images, Python Graphics covers the different commands for plotting dots, lines, arrows, or arcs, creating custom plotting grids, correcting distortions, adding text and labels to illustrations, manipulating arcs ...
Asset Attack Vectors
Asset Attack Vectors

Build an effective vulnerability management strategy to protect your organization's assets, applications, and data. Today's network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a target. Attack surfaces are rapidly expanding to include not only traditional servers and desktops, but also routers, printers, cameras, and other IOT devices. It doesn't matter whether an organization uses LAN, WAN, wireless, or even a modern PAN—savvy criminals have more potential entry points than ever before. To stay ahead of these threats, IT and security leaders must be aware of exposures and understand their potential impact. Asset Attack Vectors will help you build a vulnerability management program designed to work in the modern threat environment. Drawing on years of combined experience, the authors detail the latest techniques for threat analysis, risk measurement, and ...
Open Source Intelligence Methods and Tools
Open Source Intelligence Methods and Tools

Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring intelligence about individuals and other entities. This book will also improve your skills to acquire information online from both the regular Internet as well as the hidden web through its two sub-layers: the deep web and the dark web. The author includes many OSINT resources that can be used by intelligence agencies as well as by enterprises to monitor trends on a global level, identify risks, and gather competitor intelligence so more effective decisions can be made. You will discover techniques, methods, and tools that are equally used by hackers and penetration testers to gather intelligence about a specific target online. And you will be aware o ...
Defending IoT Infrastructures with the Raspberry Pi
Defending IoT Infrastructures with the Raspberry Pi

Apply a methodology and practical solutions for monitoring the behavior of the Internet of Things (IoT), industrial control systems (ICS), and other critical network devices with the inexpensive Raspberry Pi. With this book, you will master passive monitoring and detection of aberrant behavior, and learn how to generate early indications and warning of attacks targeting IoT, ICS, and other critical network resources. Defending IoT Infrastructures with the Raspberry Pi provides techniques and scripts for the discovery of dangerous data leakage events emanating from IoT devices. Using Raspbian Linux and specialized Python scripts, the book walks through the steps necessary to monitor, detect, and respond to attacks targeting IoT devices. There are several books that cover IoT, IoT security, Raspberry Pi, and Python separately, but this book is the first of its kind to put them all together. It takes a practical approach, providing an entry point and level playing field for a wide ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2026