IT eBooks
Download, Read, Use
Building Virtual Pentesting Labs for Advanced Penetration Testing
Building Virtual Pentesting Labs for Advanced Penetration Testing

A penetration test, also known as pentest, is a method of assessing computer and network security by replicating an attack on a computer system or network from the outside world and internal threats. With the increase of advanced hackers and threats to our virtual world, pentesting is an absolute necessity. Building Virtual Pentesting Labs for Advanced Penetration Testing will teach you how to build your own labs and give you a proven process to test these labs; a process that is currently used in industry by global pentesting teams. You will also learn a systematic approach to professional security testing, building routers, firewalls, and web servers to hone your pentesting skills. ...
C++ 2013 for C# Developers, 2nd Edition
C++ 2013 for C# Developers, 2nd Edition

C++ 2013 for C# Developers provides a fast-track to C++ proficiency forthose already using the C# language at an advanced level. Beginning with a detailed explanation of the mechanics of C++'s execution sequence, its grammar, syntax and data access you'll quickly learn the similarities and differences between C++ and C#. The second and third partsof the of the book are devoted to a detailed deep-dive into C++ development to provide clear information and advice about how to use the languageeffectively. ...
Cassandra Design Patterns
Cassandra Design Patterns

Cassandra is a powerful data store solution in the open source NoSQL world. The ability to use its vast capabilities correctly is the need of the hour as more developers start using this powerful tool. Hence, it becomes important to be able to understand how and where to apply Cassandra correctly. This practical guide will help you understand the strengths and weaknesses of Cassandra and teach you to how to identify business and technical use cases that Cassandra solves.You will also learn how to solve real world business problems and enable you to use Cassandra in the best possible way. ...
Competing with High Quality Data
Competing with High Quality Data

Data is rapidly becoming the powerhouse of industry, but low-quality data can actually put a company at a disadvantage. To be used effectively, data must accurately reflect the real-world scenario it represents, and it must be in a form that is usable and accessible. Quality data involves asking the right questions, targeting the correct parameters, and having an effective internal management, organization, and access system. It must be relevant, complete, and correct, while falling in line with pervasive regulatory oversight programs. Competing with High Quality Data takes a holistic approach to improving data quality, from collection to usage. ...
Create Web Charts with D3
Create Web Charts with D3

Create Web Charts with D3 shows how to convert your data into eye-catching, innovative, animated, and highly interactive browser-based charts. This book is suitable for developers of all experience levels and needs: if you want power and control and need to create data visualization beyond traditional charts, then D3 is the JavaScript library for you. By the end of the book, you will have a good knowledge of all the elements needed to manage data from every possible source, from high-end scientific instruments to Arduino boards, from PHP SQL databases queries to simple HTML tables, and from Matlab calculations to reports in Excel. ...
Cybersecurity for Executives
Cybersecurity for Executives

Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business. Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues; Covers 'What to Do When You Get Hacked?' including Business Continuity and Disaster Recovery planning, Public Relations, Legal and Regulatory issues, and Notifications and Disclosures; Provides steps for integrating cybersecurity into Strategy; Policy and Guidelines; Change Management and Personnel Management; Identifies cybersecurity best practices that executives can and should use both in the office and at home to protect their vital information. ...
D Cookbook
D Cookbook

D is a modern programming language that uses the familiar C family syntax while offering advanced modeling capabilities, safety guarantees, programmer productivity, and high efficiency. It helps you to get the most out of your hardware and your programmers simultaneously, saving both development and deployment costs. This practical guide will walk you through getting the work done with D, from writing your first program to writing advanced autogenerated objects, with notes based on real-world experiences telling you about potential pitfalls and how to avoid them. You'll use some of the third-party libraries available for D to get code working fast, including access to database engines, image processing, and more. ...
Data Push Apps with HTML5 SSE
Data Push Apps with HTML5 SSE

Make sure your website or web application users get content updates right now with minimal latency. This concise guide shows you how to push new data from the server to clients with HTML5 Server-Sent Events (SSE), an exceptional technology that doesn't require constant polling or user interaction. You'll learn how to build a real-world SSE application from start to finish that solves a demanding domain problem. You'll also discover how to increase that application's desktop and mobile browser support from 60% to 99%, using different fallback solutions. If you're familiar with HTML, HTTP, and basic JavaScript, you're ready to get started. ...
Data Scientists at Work
Data Scientists at Work

Data Scientists at Work is a collection of interviews with sixteen of the world's most influential and innovative data scientists from across the spectrum of this hot new profession. "Data scientist is the sexiest job in the 21st century," according to the Harvard Business Review. By 2018, the United States will experience a shortage of 190,000 skilled data scientists, according to a McKinsey report. Each of these data scientists shares how he or she tailors the torrent-taming techniques of big data, data visualization, search, and statistics to specific jobs by dint of ingenuity, imagination, patience, and passion. Data Scientists at Work parts the curtain on the interviewees' earliest data projects, how they became data scientists, their discoveries and surprises in working with data, their thoughts on the past, present, and future of the profession, their experiences of team collaboration within their organizations, and the insights they have gained as they get their ha ...
Expert Oracle SQL
Expert Oracle SQL

Expert Oracle SQL: Optimization, Deployment, and Statistics is about optimizing individual SQL statements, especially on production database systems. This Oracle-specific book begins by assuming you have already identified a particular SQL statement and are considering taking steps to improve its performance. The book describes a systematic process by which to diagnose a problem statement, identify a fix, and to implement that fix safely in a production system. You'll learn not only to improve performance when it is too slow, but also to stabilize performance when it is too variable. You'll learn about system statistics and how the Cost-Based Optimizer uses them to determine a suitable execution plan for a given statement. That knowledge provides the foundation from which to identify the root cause, and to stabilize and improve performance. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2026