IT eBooks
Download, Read, Use
Web Operations
Web Operations

Learn what it takes to build and maintain high-traffic websites with Web Operations. Featuring essays from today's top web veterans, this insightful book shows you how to run your web ops as reliably and effectively as Google, Microsoft, and Yahoo run theirs. Even if your site never gets that big, you'll profit from the experience and knowledge of the people who created sites for these and other industry giants. ...
The Geek Atlas
The Geek Atlas

With this unique traveler's guide, you'll learn about 128 destinations around the world where discoveries in science, mathematics, or technology occurred or is happening now. Travel to Munich to see the world's largest science museum, watch Foucault's pendulum swinging in Paris, ponder a descendant of Newton's apple tree at Trinity College, Cambridge, and more. Each site in The Geek Atlas focuses on discoveries or inventions, and includes information about the people and the science behind them. ...
The Art of Capacity Planning
The Art of Capacity Planning

Web-based companies live or die by the ability to scale their infrastructure to accommodate increasing demand. This book is a hands-on and practical guide to planning for such growth, with many techniques and considerations to help you plan, deploy, and manage web application infrastructure. Written by the manager of data operations for the world-famous photo-sharing site Flickr.com, the author offers advice based on years of valuable experience. ...
SEO Warrior
SEO Warrior

How can you make it easier for people to find your website? And how can you convert casual visitors into active users? SEO Warrior shows you how it's done through a collection of tried and true techniques, hacks, and best practices. Learn the nuts and bolts of SEO theory, the importance of keyword strategy, and how to avoid and remedy search engine traps. This book serves as a tutorial, and as a reference guide for implementing effective SEO techniques. ...
Beautiful Security
Beautiful Security

In Beautiful Security, today's security experts offer a collection of essays that describe bold and extraordinary methods to secure computer systems in the face of ever-increasing threats. You'll learn how new and more aggressive security measures work -- and where they will lead us. This far-reaching discussion takes you into the techniques, technology, ethics, and laws at the center of the biggest revolution in the history of network security. ...
Oracle Built-in Packages
Oracle Built-in Packages

Oracle's built-in packages dramatically extend the power of the PL/SQL language, but few developers know how to use them effectively. This book is a complete reference to all of the built-ins, including those new to Oracle8. the enclosed diskette includes an online tool that provides easy access to the many files of source code and documentation developed by the authors. ...
Network Security with OpenSSL
Network Security with OpenSSL

OpenSSL is a popular and effective open source version of SSL/TLS, the most widely used protocol for secure network communications. The only guide available on the subject, Network Security with OpenSSLdetails the challenges in securing network communications, and shows you how to use OpenSSL tools to best meet those challenges. Focused on the practical, this book provides only the information that is necessary to use OpenSSL safely and effectively. ...
Real World Instrumentation with Python
Real World Instrumentation with Python

Learn how to develop your own applications to monitor or control instrumentation hardware. Whether you need to acquire data from a device or automate its functions, this practical book shows you how to use Python's rapid development capabilities to build interfaces that include everything from software to wiring. You get step-by-step instructions, clear examples, and hands-on tips for interfacing a PC to a variety of devices. Use the book's hardware survey to identify the interface type for your particular device, and then follow detailed examples to develop an interface with Python and C. Organized by interface type, data processing activities, and user interface implementations, this book is for anyone who works with instrumentation, robotics, data acquisition, or process control. ...
grep Pocket Reference
grep Pocket Reference

grep Pocket Reference is the first guide devoted to grep, the powerful Unix content-location utility. This handy book is ideal for system administrators, security professionals, developers, and others who want to learn more about grep and take new approaches with it - for everything from mail filtering and system log management to malware analysis. ...
Mastering Algorithms with Perl
Mastering Algorithms with Perl

Many programmers would love to use Perl for projects that involve heavy lifting, but miss the many traditional algorithms that textbooks teach for other languages. Computer scientists have identified many techniques that a wide range of programs need, such as: Fuzzy pattern matching for text (identify misspellings!), Finding correlations in data, Game-playing algorithms, Predicting phenomena such as Web traffic, Polynomial and spline fitting. Using algorithms explained in this book, you too can carry out traditional programming tasks in a high-powered, efficient, easy-to-maintain manner with Perl. This book assumes a basic understanding of Perl syntax and functions, but not necessarily any background in computer science. The authors explain in a readable fashion the reasons for using various classic programming techniques, the kind of applications that use them, and - most important - how to code these algorithms in Perl. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2026