IT eBooks
Download, Read, Use
Communications Receivers, 4th Edition
Communications Receivers, 4th Edition

This thoroughly updated guide offers comprehensive explanations of the science behind today's radio receivers along with practical guidance on designing, constructing, and maintaining real-world communications systems. You will explore system planning, antennas and antenna coupling, amplifiers and gain control, filters, mixers, demodulation, digital communication, and the latest software defined radio (SDR) technology. Written by a team of telecommunication experts, Communications Receivers: Principles and Design, Fourth Edition, features technical illustrations, schematic diagrams, and detailed examples. Basic radio considerations; Radio receiver characteristics; Receiver system planning; Receiver implementation considerations; RF and baseband techniques for Software-Defined Radios; Transceiver SDR considerations; Antennas and antenna coupling; Mixers; Frequency sources and control; Ancillary receiver circuits; Performance measurement. ...
CompTIA Linux+/LPIC-1 Certification All-in-One Exam Guide, Premium 2nd Edition
CompTIA Linux+/LPIC-1 Certification All-in-One Exam Guide, Premium 2nd Edition

The premium edition features the bestselling book plus one year of unlimited access to Practice Labs for CompTIA Linux+, including real world hands-on tasks carried out on real hardware simply accessed from a web browser. An innovative, hands-on study system from a team of CompTIA certification and Linux experts, CompTIA Linux+/LPIC-1 Certification All-in-One Exam Guide, Premium Edition with Online Practice Labs offers complete lab based coverage of CompTIA Linux+ exams LX0-103 and LX0-104. The Practice Labs platform offers an opportunity to work with industry standard technologies to provide hands-on experience and help you develop a deeper understanding of the topics covered in the certification exams. One year of online access includes: Real hardware and software needed to develop your practical skills - this is not a simulation but access to the actual equipment you would expect to find in any work place along with a wide range of industry standard technologies; Certification ...
Principles of Computer Security, 5th Edition
Principles of Computer Security, 5th Edition

Learn IT security fundamentals while getting complete coverage of the objectives for the latest release of CompTIA Security+ certification exam SY0-501. This thoroughly revised, full-color textbook discusses communication, infrastructure, operational security, attack prevention, disaster recovery, computer forensics, and much more. Written by a pair of highly respected security educators, Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition (Exam SY0-501) will help you pass the exam and become a CompTIA certified computer security expert. Ensure operational, organizational, and physical security; Use cryptography and public key infrastructures (PKIs); Secure remote access, wireless networks, and virtual private networks (VPNs); Authenticate users and lock down mobile devices; Harden network devices, operating systems, and applications; Prevent network attacks, such as denial of service, spoofing, hijacking, and password guessing; Combat viruses, worms, Trojan ...
Microsoft SQL Server 2017 on Linux
Microsoft SQL Server 2017 on Linux

This comprehensive guide shows, step-by-step, how to set up, configure, and administer SQL Server 2017 on Linux for high performance and high availability. Written by a SQL Server expert and respected author, Microsoft SQL Server 2017 on Linux teaches valuable Linux skills to Windows-based SQL Server professionals. You will get clear coverage of both Linux and SQL Server and complete explanations of the latest features, tools, and techniques. The book offers clear instruction on adaptive query processing, automatic tuning, disaster recovery, security, and much more. Understand how SQL Server 2017 on Linux works; Install and configure SQL Server on Linux; Run SQL Server on Docker containers; Learn Linux Administration; Troubleshoot and tune query performance in SQL Server; Learn what is new in SQL Server 2017; Work with adaptive query processing and automatic tuning techniques; Implement high availability and disaster recovery for SQL Server on Linux; Learn the security features avai ...
Gray Hat Hacking, 5th Edition
Gray Hat Hacking, 5th Edition

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hacker's Handbook, Fifth Edition explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. And the new topic of exploiting the Internet of things is introduced in this edition. Build and launch spoofing exploits with Ettercap; Induce error conditions and crash software using fuzzers; Use advanced reverse engineering to exploit Windows and Linux software; Bypass Windows Access Control and memory protection schemes; Exploit web applications with Padding Oracle Att ...
Anyone Can Create an App
Anyone Can Create an App

Do you have a fantastic idea for an iPhone app but no idea how to bring it to life? Great news! With the right tools and a little practice, anyone can create an app. This book will get you started, even if you've never written a line of computer code. Anyone Can Create an App begins with the basics by introducing programming concepts, the Swift language, and the tools you'll need to write iOS apps. As you explore the interesting examples, illuminating illustrations, and crystal-clear step-by-step instructions, you'll learn to: Get started programming, no experience necessary; Add controls like text boxes and buttons; Keep track of your favorite things by creating the Like It or Not (LioN) app. By the end, you'll be able to create and run your own apps, and you'll have the confidence to learn more on your own. ...
Type-Driven Development with Idris
Type-Driven Development with Idris

Stop fighting type errors! Type-driven development is an approach to coding that embraces types as the foundation of your code - essentially as built-in documentation your compiler can use to check data relationships and other assumptions. With this approach, you can define specifications early in development and write code that's easy to maintain, test, and extend. Idris is a Haskell-like language with first-class, dependent types that's perfect for learning type-driven programming techniques you can apply in any codebase. Type-Driven Development with Idris teaches you how to improve the performance and accuracy of your code by taking advantage of a state-of-the-art type system. In this book, you'll learn type-driven development of real-world software, as well as how to handle side effects, interaction, state, and concurrency. By the end, you'll be able to develop robust and verified software in Idris and apply type-driven development methods to other languages. ...
Coding with Minecraft
Coding with Minecraft

You've mined for diamonds, crafted dozens of tools, and built all sorts of structures - but what if you could program robots to do all of that for you in a fraction of the time? In Coding with Minecraft, you'll create a virtual robot army with Lua, a programming language used by professional game developers. Step-by-step coding projects will show you how to write programs that automatically dig mines, collect materials, craft items, and build anything that you can imagine. Along the way, you'll explore key computer science concepts like data types, functions, variables, and more. Program robots that make smart decisions with flow control; Reuse code so that your robots can farm any crop you want, including wheat, sugar cane, and even cacti; Program a factory that generates infinite building supplies; Design an algorithm for creating walls and buildings of any size; Code yourself a pickaxe-swinging robotic lumberjack; Create a robot that digs mine shafts with stairs so you can exp ...
Exam Ref 70-762 Developing SQL Databases
Exam Ref 70-762 Developing SQL Databases

Prepare for Microsoft Exam 70-762, Developing SQL Databases - and help demonstrate your real-world mastery of skills for building and implementing databases across organizations. Designed for database professionals who build and implement databases across organizations and who ensure high levels of data availability, Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the MCSA level. Focus on the expertise measured by these objectives: Design and implement database objects; Implement programmability objects; Manage database concurrency; Optimize database objects and SQL infrastructure. This Microsoft Exam Ref: Organizes its coverage by exam objectives; Features strategic, what-if scenarios to challenge you; Assumes you have working knowledge of Microsoft Windows, Transact-SQL, and relational databases. Exam 70-762 focuses on skills and knowledge for building and implementing databases across organizations and ensuring high levels of data availa ...
Microsoft Azure Security Center
Microsoft Azure Security Center

This book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder show how to apply Azure Security Center's full spectrum of features and capabilities to address protection, detection, and response in key operational scenarios. You'll learn how to secure any Azure workload, and optimize virtually all facets of modern security, from policies and identity to incident response and risk management. Whatever your role in Azure security, you'll learn how to save hours, days, or even weeks by solving problems in most efficient, reliable ways possible. Two of Microsoft's leading cloud security experts show how to: Assess the impact of cloud and hybrid environments on security, compliance, operations, data protection, and risk management; Master a new security paradigm for a world without traditional perimeters; Gain visibility and control to secure compute, netwo ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2026