IT eBooks
Download, Read, Use
Beginning Serverless Computing
Beginning Serverless Computing

Learn the basics of serverless computing and how to develop event-driven architectures with the three major cloud platforms: Amazon Web Services, Microsoft Azure, and Google Cloud. This hands-on guide dives into the foundations of serverless computing, its use cases, and how to apply it using developer tools such as Node.js, Visual Studio Code, Postman, and Serverless Framework. You will apply the fundamentals of serverless technology from the ground up, and come away with a greater understanding of its power and how to make it work for you. This book teaches you how to quickly and securely develop applications without the hassle of configuring and maintaining infrastructure. You will learn how to harness serverless technology to rapidly reduce production time and minimize your costs, while still having the freedom to customize your code, without hindering functionality. Upon completion, you will have the knowledge and resources to build your own serverless application hosted in AWS ...
Java: The Complete Reference, 10th edition
Java: The Complete Reference, 10th edition

Fully updated for Java SE 9, Java: The Complete Reference, 10th Edition explains how to develop, compile, debug, and run Java programs. Bestselling programming author Herb Schildt covers the entire Java language, including its syntax, keywords, and fundamental programming principles. You'll also find information on key portions of the Java API library, such as I/O, the Collections Framework, the stream library, and the concurrency utilities. Swing, JavaFX, JavaBeans, and servlets are examined and numerous examples demonstrate Java in action. Of course, the new module system added by Java SE 9 is discussed in detail. This Oracle Press resource also offers an introduction to JShell, Java's new interactive programming tool. ...
Java: A Beginner's Guide, 7th Edition
Java: A Beginner's Guide, 7th Edition

Fully updated for Java Platform, Standard Edition 9 (Java SE 9), Java: A Beginner's Guide, 7th Edition, gets you started programming in Java right away. Bestselling programming author Herb Schildt begins with the basics, such as how to create, compile, and run a Java program. He then moves on to the keywords, syntax, and constructs that form the core of the Java language. The book also covers some of Java's more advanced features, including multithreaded programming, generics, lambda expressions, Swing, and JavaFX. This practical Oracle Press guide features details on Java SE 9's innovative new module system, and, as an added bonus, it includes an introduction to JShell, Java's new interactive programming tool. Designed for Easy Learning: Key Skills and Concepts - Chapter-opening lists of specific skills covered in the chapter; Ask the Expert - Q&A sections filled with bonus information and helpful tips; Try This - Hands-on exercises that show you how to apply your skills Self Tests ...
CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (CS0-001)
CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (CS0-001)

This highly effective self-study system provides complete coverage of every objective for the challenging CompTIA CySA+ Cybersecurity Analyst exam. You'll find learning objectives at the beginning of each chapter, exam tips, in-depth explanations, and practice exam questions. All questions closely mirror those on the live test in content, format, and tone. Designed to help you pass exam CS0-001 with ease, this definitive guide also serves as an essential on-the-job reference. ...
Cisco Firepower Threat Defense (FTD)
Cisco Firepower Threat Defense (FTD)

This is the definitive guide to best practices and advanced troubleshooting techniques for the Cisco flagship Firepower Threat Defense (FTD) system running on Cisco ASA platforms, Cisco Firepower security appliances, Firepower eXtensible Operating System (FXOS), and VMware virtual appliances. Senior Cisco engineer Nazmul Rajib draws on unsurpassed experience supporting and training Cisco Firepower engineers worldwide, and presenting detailed knowledge of Cisco Firepower deployment, tuning, and troubleshooting. Writing for cybersecurity consultants, service providers, channel partners, and enterprise or government security professionals, he shows how to deploy the Cisco Firepower next-generation security technologies to protect your network from potential cyber threats, and how to use Firepower's robust command-line tools to investigate a wide variety of technical issues. Each consistently organized chapter contains definitions of keywords, operational flowcharts, architectural di ...
The IT as a Service (ITaaS) Framework
The IT as a Service (ITaaS) Framework

Ongoing digitization, along with the risks of digital disruption, mean today's Enterprise businesses are more reliant than ever on their IT Organizations to be successful; but business cannot wait on IT. Instead, Enterprise IT Organizations must transform to Fast IT to keep pace with the various lines of business, operate more agilely and efficiently than ever before, while simultaneously supporting rapid innovation of transformative capabilities. The IT as a Service (ITaaS) Framework - based on the work pioneered by Cisco's own global IT organization - is a proven model for transforming to an end-to-end Services Organization, and shifting the underlying culture of the IT organization as a foundation for Fast IT. Now, the developer of the ITaaS framework provides you with an in-depth guide ensuring that your Services Transformation achieves the intended value outcomes of establishing IT as a trusted advisor to the business, and operating IT like an agile, competitive, and cost-effic ...
Investigating the Cyber Breach
Investigating the Cyber Breach

Today, cybersecurity and networking professionals know they can't possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they occur. Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer is the first comprehensive guide to doing just that. Writing for working professionals, senior cybersecurity experts Joseph Muniz and Aamir Lakhani present up-to-the-minute techniques for hunting attackers, following their movements within networks, halting exfiltration of data and intellectual property, and collecting evidence for investigation and prosecution. You'll learn how to make the most of today's best open source and Cisco tools for cloning, data analytics, network and endpoint breach detection, case management, monitoring, analysis, and more. Unlike digital forensics books focused primarily on post-attack evidence gathering, this one offers complete coverage of tracking threats, improving inte ...
Learn Salesforce Lightning
Learn Salesforce Lightning

Refer to this invaluable how-to guide for basic training on Salesforce Lightning. Salespeople and technical users and consultants will no longer have to resort to learning the interface on their own, which is very time consuming. Learn Salesforce Lightning is a step-by-step visual guide that offers immediate and valuable solutions to the new set of UI tools included in Lightning. With chapters broken down into easily absorbed topics, you walk through the entire process of managing your daily activities within Salesforce, as well as basic customizations and system management. The book explains the primary use cases for Lighting, and simplifies some of the more complex features, such as opportunity stage management and the new dashboard builder. Topics covered include: Sales and service management; Lightning Apps on the AppExchange; Lightning dashboards and reports; Lightning security; Lightning Process Builder and more. ...
Oracle Incident Response and Forensics
Oracle Incident Response and Forensics

Take the right steps when a breach of your Oracle Database environment becomes known or suspected. You will learn techniques for discerning how an attacker got in, what data they saw, and what else they might have done. This book helps you understand forensics in relation to Oracle Database, and the tools and techniques that should be used to investigate a database breach. You will learn the measures to put in place now to make it harder for an attack to be successful, and to aid in the detection and investigation of future attacks. You will know how to bring together tools and methods to create a holistic approach and investigation when an event occurs, helping you to be confident of your ability to react correctly and responsibly to threats against your organization's data. Detect when breaches have or may have occurred; React with confidence using an organized plan; Determine whether a suspected breach is real; Determine the scope of data that has been compromised; Preserve ev ...
Make Your Own Python Text Adventure
Make Your Own Python Text Adventure

Learn programming with Python by creating a text adventure. This book will teach you the fundamentals of programming, how to organize code, and some coding best practices. By the end of the book, you will have a working game that you can play or show off to friends. You will also be able to change the game and make it your own by writing a different story line, including new items, creating new characters, and more. Make your own Python Text Adventure offers a structured approach to learning Python that teaches the fundamentals of the language, while also guiding the development of the customizable game. The first half of the book introduces programming concepts and Python syntax by building the basic structure of the game. You'll also apply the new concepts in homework questions (with solutions if you get stuck!) that follow each chapter. The second half of the book will shift the focus to adding features to your game and making it more entertaining for the player. Python is oft ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2026