IT eBooks
Download, Read, Use
Modernizing the Datacenter with Windows Server and Hybrid Cloud
Modernizing the Datacenter with Windows Server and Hybrid Cloud

Transform your datacenter for breakthrough flexibility, agility, and scalability! Using public, private, and hybrid cloud services, you can transform your datacenter to serve fast-changing workloads, process and analyze enormous amounts of data, and achieve unprecedented flexibility and value. In this guide, two world-renowned experts in Microsoft datacenter technology show how to effectively leverage current legacy systems as you incorporate your optimal mix of cloud services. Drawing on extensive experience implementing Microsoft cloud solutions, they walk you step-by-step through your entire transition: strategy, deployment, security, identity protection, management, PowerShell automation, and more. Two concluding chapters offer indispensable advice for maximizing datacenter efficiency and supporting future innovation. Two leading enterprise cloud and Windows Server experts show how to: Move from legacy IT models to an agile service structure; Implement managed self-service, ...
Microsoft Azure Security Center, 2nd Edition
Microsoft Azure Security Center, 2nd Edition

Reflecting updates through mid-2019, this book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder help you apply Azure Security Center's robust protection, detection, and response capabilities in key operational scenarios. You'll walk through securing any Azure workload, and optimizing key facets of modern security, from policies and identity to incident response and risk management. Brand-new coverage includes single-click remediation, IoT, improved container security, Azure Sentinel, and more. Whatever your security role, you'll learn how to save hours, days, or even weeks by solving problems in the most efficient and reliable ways possible. Two of Microsoft's leading cloud security experts show how to: Implement a comprehensive new security paradigm designed specifically for cloud and hybrid environments; Gain visibility and control to secure all ...
DevOps for Digital Leaders
DevOps for Digital Leaders

Learn to design, implement, measure, and improve DevOps programs that are tailored to your organization. This concise guide assists leaders who are accountable for the rapid development of high-quality software applications. In DevOps for Digital Leaders, deep collective experience on both sides of the dev-ops divide informs the global thought leadership and penetrating insights of the authors, all three of whom are cross-portfolio DevOps leaders at CA Technologies. Aruna Ravichandran, Kieran Taylor, and Peter Waterhouse analyze the organizational benefits, costs, freedoms, and constraints of DevOps. They chart the coordinated strategy of organizational change, metrics, lean thinking, and investment that an enterprise must undertake to realize the full potential of DevOps and reach the sweet spot where accelerating code deployments drive increasing customer satisfaction, revenue, and profitability. Digital leaders are charged to bridge the dev-ops disconnect if their organization ...
Ray Tracing Gems
Ray Tracing Gems

This book is a must-have for anyone serious about rendering in real time. With the announcement of new ray tracing APIs and hardware to support them, developers can easily create real-time applications with ray tracing as a core component. As ray tracing on the GPU becomes faster, it will play a more central role in real-time rendering. Ray Tracing Gems provides key building blocks for developers of games, architectural applications, visualizations, and more. Experts in rendering share their knowledge by explaining everything from nitty-gritty techniques that will improve any ray tracer to mastery of the new capabilities of current and future hardware. The latest ray tracing techniques for developing real-time applications in multiple domains; Guidance, advice, and best practices for rendering applications with Microsoft DirectX Raytracing (DXR); How to implement high-performance graphics for interactive visualizations, games, simulations, and more. ...
Managing Risk and Information Security, 2nd Edition
Managing Risk and Information Security, 2nd Edition

Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author's experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience. Managing Risk and Information Security provides thought leadership in the increasingly important area of enterprise information risk and security. It describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology not only for internal operations but increasing as a part of product or service creation, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This edition discusses business risk from a broader perspective, including privacy and regulatory considerations. It d ...
Rethinking Productivity in Software Engineering
Rethinking Productivity in Software Engineering

Get the most out of this foundational reference and improve the productivity of your software teams. This open access book collects the wisdom of the 2017 "Dagstuhl" seminar on productivity in software engineering, a meeting of community leaders, who came together with the goal of rethinking traditional definitions and measures of productivity. The results of their work, Rethinking Productivity in Software Engineering, includes chapters covering definitions and core concepts related to productivity, guidelines for measuring productivity in specific contexts, best practices and pitfalls, and theories and open questions on productivity. You'll benefit from the many short chapters, each offering a focused discussion on one aspect of productivity in software engineering. Readers in many fields and industries will benefit from their collected work. Developers wanting to improve their personal productivity, will learn effective strategies for overcoming common issues that interfere wit ...
Pro TBB
Pro TBB

This open access book is a modern guide for all C++ programmers to learn Threading Building Blocks (TBB). Written by TBB and parallel programming experts, this book reflects their collective decades of experience in developing and teaching parallel programming with TBB, offering their insights in an approachable manner. Throughout the book the authors present numerous examples and best practices to help you become an effective TBB programmer and leverage the power of parallel systems. Pro TBB starts with the basics, explaining parallel algorithms and C++'s built-in standard template library for parallelism. You'll learn the key concepts of managing memory, working with data structures and how to handle typical issues with synchronization. Later chapters apply these ideas to complex systems to explain performance tradeoffs, mapping common parallel patterns, controlling threads and overhead, and extending TBB to program heterogeneous systems or system-on-chips. Use Threading Buil ...
Demystifying Internet of Things Security
Demystifying Internet of Things Security

Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions Secure devices, immunizing them against different threats originating from inside and outside the network; Gather an over ...
Micro:bit for Mad Scientists
Micro:bit for Mad Scientists

The BBC micro:bit is a tiny, inexpensive, and surprisingly powerful computer that you can use to build cool things and experiment with code. The 30 simple projects and experiments in this book will show you how to use the micro:bit to build a secret science lab - complete with robots, door alarms, lie detectors, and more - as you learn basic coding and electronics skills. Here are just some of the projects you'll build: A light-controlled guitar you can play just by waving your hand; A working lie detector; A self-watering plant care system; A two-wheeled robot; A talking robotic head with moving eyes; A door alarm made with magnets. Learn to code like a Mad Scientist! ...
Bayesian Statistics the Fun Way
Bayesian Statistics the Fun Way

Probability and statistics are increasingly important in a huge range of professions. But many people use data in ways they don't even understand, meaning they aren't getting the most from it. Bayesian Statistics the Fun Way will change that. This book will give you a complete understanding of Bayesian statistics through simple explanations and un-boring examples. Find out the probability of UFOs landing in your garden, how likely Han Solo is to survive a flight through an asteroid belt, how to win an argument about conspiracy theories, and whether a burglary really was a burglary, to name a few examples. By using these off-the-beaten-track examples, the author actually makes learning statistics fun. And you'll learn real skills, like how to: How to measure your own level of uncertainty in a conclusion or belief; Calculate Bayes theorem and understand what it's useful for; Find the posterior, likelihood, and prior to check the accuracy of your conclusions; Calculate distributions ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2026