IT eBooks
Download, Read, Use
Entity Framework Core in Action, 2nd Edition
Entity Framework Core in Action, 2nd Edition

Entity Framework Core in Action, Second Edition is an in-depth guide to reading and writing databases with EF Core. Revised from the bestselling original edition, it's filled with over 100 diagrams, code snippets, and examples - including building and scaling your own bookselling web application. Learn from author Jon Smith's extensive experience working with EF Core in production, as you discover time-saving patterns and best practices for security, performance tuning, and unit testing. Entity Framework radically simplifies data access in .NET applications. This easy-to-use object-relational mapper (ORM) lets you write database code in pure C#. It automatically maps classes to database tables and enables queries with standard LINQ commands. It even generates SQL, so you don't have to! Entity Framework Core in Action, Second Edition teaches you to write flawless database interactions for .NET applications. Following relevant examples from author Jon Smith's extensive experience, ...
Protecting SQL Server Data
Protecting SQL Server Data

In Protecting SQL Server Data, John Magnabosco demonstrates how sensitive data, stored in SQL Server, can be protected using an efficient and maintainable encryption-based data architecture. He explains how to assess and categorize data elements according to sensitivity, regulate access to the various categories of data using database roles, views and stored procedures, and then how to implement a secure data architecture using features such as cell-level encryption, transparent data encryption, one-way encryption, obfuscation, and more. The battle to secure personal and business data is a tough one, and the consequences of mishandling sensitive data can be severe. Even more damaging than the fines and lawsuits that can be result from non-compliance with regulations, is the loss of customer confidence that results when these breaches of security occur. Database Administrators must use every weapon and strategy at their disposal in the "war" to protect their sensitive data from ...
Mastering Windows Server 2019, 3rd Edition
Mastering Windows Server 2019, 3rd Edition

Windows Server 2019 has a lot to offer, with a variety of roles, features, toolsets, and server management interfaces that allow interaction with your servers from virtually anywhere in the world. This updated edition comes with four new chapters to provide you with the in-depth knowledge needed to implement and use this operating system in any environment. Centralized management, monitoring, and configuration of servers are key to an efficient IT department. This book delves into multiple methods for quickly managing all your servers from a 'single pane of glass' - the ability to monitor different servers across a network using Server Manager, Windows PowerShell, and even Windows Admin Center - from anywhere. Despite the book being more focused on Windows Server 2019 LTSC, you will still explore containers and Nano Server, which are more related to the SAC of server releases. This additional coverage will give you insights into all aspects of using Windows Server 2019 in your envir ...
Building the Modern Workplace with SharePoint Online
Building the Modern Workplace with SharePoint Online

Build a digital workplace solution from scratch using SharePoint Online, Teams, and the Power Platform. The book will help you implement all the modern capabilities of the SharePoint Framework, Teams, and Power Platform into a SharePoint Online solution. You will begin your journey with a short overview of the basics of SharePoint Online. You will then work through a case study with a solutions approach to implement various business requirements using SharePoint Online. Further, you will learn how to provision sites using PnP and build SharePoint forms using out-of-the-box forms. The next section covers Power Apps and Power Automate, followed by a discussion on SharePoint Framework where you will learn to customize SharePoint Online sites using SPFx. Moving forward you will go through configuration and customization of PnP modern search. Wrapping up, you will integrate Microsoft Teams, MS Graph, and Power Virtual Agents with SharePoint Online. After reading Building the Modern Wo ...
Linux Cookbook, 2nd Edition
Linux Cookbook, 2nd Edition

This handy cookbook teaches new-to-intermediate Linux users the essential skills necessary to manage a Linux system, using both graphical and command-line tools. Whether you run Linux in embedded, desktop, server, or cloud or virtual environments, the fundamental skills are the same. This book aims to get you up and running quickly, with copy-paste examples. Carla Schroder provides recipes that cover specific problems, with discussions that explain how each recipe works, as well as references for additional study. You'll learn how to: Use systemd, the new comprehensive service manager; Build simple or complex firewalls with firewalld; Set up secure network connections for Linux systems and mobile devices; Rescue nonbooting systems; Reset lost passwords on Linux and Windows; Use dnsmasq to simplify managing your LAN name services; Manage users and groups and control access to files; Probe your computer hardware and monitor hardware health; Manage the GRUB bootloader and multiboot ...
Full Stack Python Security
Full Stack Python Security

Full Stack Python Security: Cryptography, TLS, and attack resistance teaches you everything you'll need to build secure Python web applications. As you work through the insightful code snippets and engaging examples, you'll put security standards, best practices, and more into action. Along the way, you'll get exposure to important libraries and tools in the Python ecosystem. Security is a full-stack concern, encompassing user interfaces, APIs, web servers, network infrastructure, and everything in between. Master the powerful libraries, frameworks, and tools in the Python ecosystem and you can protect your systems top to bottom. Packed with realistic examples, lucid illustrations, and working code, this book shows you exactly how to secure Python-based web applications. Full Stack Python Security: Cryptography, TLS, and attack resistance teaches you everything you need to secure Python and Django-based web apps. In it, seasoned security pro Dennis Byrne demystifies complex secur ...
Lisp Web Tales
Lisp Web Tales

The book is a set of tutorials and examples. It uses the Common Lisp language and some of the libraries we'll be using for the examples and tutorials include: - The hunchentoot web server - The Restas web framework - The SEXML library for outputting XML and HTML - Closure-template for HTML templating - Postmodern for PostgreSQL access, and cl-reddis as a simple datastore - Various utilities ...
Efficient MySQL Performance
Efficient MySQL Performance

You'll find several books on basic or advanced MySQL performance, but nothing in between. That's because explaining MySQL performance without addressing its complexity is difficult. This practical book bridges the gap by teaching software engineers mid-level MySQL knowledge beyond the fundamentals, but well shy of deep-level internals required by database administrators (DBAs). Daniel Nichter shows you how to apply the best practices and techniques that directly affect MySQL performance. You'll learn how to improve performance by analyzing query execution, indexing for common SQL clauses and table joins, optimizing data access, and understanding the most important MySQL metrics. You'll also discover how replication, transactions, row locking, and the cloud influenceMySQL performance. Understand why query response time is the North Star of MySQL performance; Learn query metrics in detail, including aggregation, reporting, and analysis; See how to index effectively for common SQL c ...
AWS Cookbook
AWS Cookbook

This practical guide provides over 70 self-contained recipes to help you creatively solve common AWS challenges you'll encounter on your cloud journey. If you're comfortable with rudimentary scripting and general cloud concepts, this cookbook provides what you need to address foundational tasks and create high-level capabilities. Authors John Culkin and Mike Zazon share real-world examples that incorporate best practices. Each recipe includes a diagram to visualize the components. Code is provided so that you can safely execute in an AWS account to ensure solutions work as described. From there, you can customize the code to help construct an application or fix an existing problem. Each recipe also includes a discussion to provide context, explain the approach, and challenge you to explore the possibilities further. Go beyond theory and learn the details you need to successfully build on AWS. The recipes help you: Redact personal identifiable information (PII) from text using Ama ...
Computer Vision and Augmented Reality in iOS
Computer Vision and Augmented Reality in iOS

Learn how computer vision works, how augmented reality renders digital graphics into the physical world via an iPhone's camera, and how to incorporate these technologies into your own apps. This book shows you how to take full advantage of computer vision technologies. Interacting with other people online usually involves user-generated images and videos; whether it be "memes", short videos, or heavily-modified images. Before smart phones, generating this content required a professional using high-level image and video editing software. Not any more. This book will teach you to use computer vision in the most popular ways, such as for facial recognition, image to text analysis and, of course, recording a video of a dancing hot dog in your living room. Starting with the history of computer vision, image and video processing fundamentals, and an introduction to developing augmented reality applications, you'll learn to incorporate computer vision both in the content you create and t ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025