IT eBooks
Download, Read, Use
Office 2013 Bible
Office 2013 Bible

Learn the sought-after features of the core applications from the Office 2013 suite. This Office 2013 Bible features the best-of-the-best content from the Excel 2013 Bible, by "Mr. Spreadsheet" John Walkenbach; the Word 2013 Bible, by Office expert Lisa A. Bucki; the PowerPoint 2013 Bible, by MOS Master Instructor and PowerPoint expert Faithe Wempen; and the Access 2013 Bible from Microsoft Certified Application Developer Michael Alexander and Office and Access expert Dick Kusleika. ...
Juniper SRX Series
Juniper SRX Series

This complete field guide, authorized by Juniper Networks, is the perfect hands-on reference for deploying, configuring, and operating Juniper's SRX Series networking device. Authors Brad Woodberg and Rob Cameron provide field-tested best practices for getting the most out of SRX deployments, based on their extensive field experience. While their earlier book, Junos Security, covered the SRX platform, this book focuses on the SRX Series devices themselves. You'll learn how to use SRX gateways to address an array of network requirements—including IP routing, intrusion detection, attack mitigation, unified threat management, and WAN acceleration. Along with case studies and troubleshooting tips, each chapter provides study questions and lots of useful illustrations. ...
Developing Business Intelligence Apps for SharePoint
Developing Business Intelligence Apps for SharePoint

Create dynamic business intelligence (BI) solutions for SharePoint faster and with more capabilities than previously possible. With this book, you'll learn the entire process - from high-level concepts to development and deployment - for building data-rich BI applications with Visual Studio LightSwitch, SQL Server 2012, and a host of related Microsoft technologies. You'll learn practical techniques and patterns necessary to use all of these technologies together as you build an example application through the course of the book, step by step. Discover how to solve real problems, using BI solutions that will evolve to meet future needs. ...
The SketchUp Workflow for Architecture
The SketchUp Workflow for Architecture

If you want to go beyond the basics and start using SketchUp 3D modeling software in all phases of your design, The SketchUp Workflow for Architecture is the perfect place to start. From preliminary schematics to construction documentation and everything in between, the book sketches out a workflow that is flexible enough to use from start to finish. You'll discover helpful techniques, smart tips, and best practices that will make your design process easier, as well as helping you easily export your models into BIM programs. ...
Ace the Programming Interview
Ace the Programming Interview

Programmers are in demand, but to land the job, you must demonstrate knowledge of those things expected by today's employers. This guide sets you up for success. Not only does it provide 160 of the most commonly asked interview questions and model answers, but it also offers insight into the context and motivation of hiring managers in today's marketplace. Written by a veteran hiring manager, this book is a comprehensive guide for experienced and first-time programmers alike. ...
Excel 2013: The Missing Manual
Excel 2013: The Missing Manual

The world's most popular spreadsheet program is now more powerful than ever, but it's also more complex. That's where this Missing Manual comes in. With crystal-clear explanations and hands-on examples, Excel 2013: The Missing Manual shows you how to master Excel so you can easily track, analyze, and chart your data. You'll be using new features like PowerPivot and Flash Fill in no time. ...
Analyzing the Analyzers
Analyzing the Analyzers

There has been intense excitement in recent years around activities labeled "data science," "big data," and "analytics." However, the lack of clarity around these terms and, particularly, around the skill sets and capabilities of their practitioners has led to inefficient communication between "data scientists" and the organizations requiring their services. This lack of clarity has frequently led to missed opportunities. To address this issue, we surveyed several hundred practitioners via the Web to explore the varieties of skills, experiences, and viewpoints in the emerging data science community. ...
Gradle Beyond the Basics
Gradle Beyond the Basics

If you're familiar with Gradle's basics elements - possibly through the author's previous O'Reilly book, Building and Testing with Gradle - this more advanced guide provides the recipes, techniques, and syntax to help you master this build automation tool. With clear, concise explanations and lots of ready-to-use code examples, you'll explore four discrete areas of Gradle functionality: file operations, custom Gradle plugins, build lifecycle hooks, and dependency management. Learn how to use Gradle's rich set of APIs and Groovy-based Domain Specific Language to customize build software that actually conforms to your product. By using the techniques in this book, you'll be able to write domain-specific builds that support every other line of code your team creates. ...
Lift Cookbook
Lift Cookbook

If you need help building web applications with the Lift framework, this cookbook provides scores of concise, ready-to-use code solutions. You'll find recipes for everything from setting up a coding environment to creating REST web services and deploying your application to production. Built on top of the Scala JVM programming language, Lift takes a different - yet ultimately easier - approach to development than MVC frameworks such as Rails. Each recipe in this book includes a discussion of how and why each solution works, not only to help you complete the task at hand, but also to illustrate how Lift works. ...
Pluggable Authentication Modules
Pluggable Authentication Modules

PAM-aware applications reduce the complexity of authentication. With PAM you can use the same user database for every login process. PAM also supports different authentication processes as required. Moreover, PAM is a well-defined API, and PAM-aware applications will not break if you change the underlying authentication configuration. The PAM framework is widely used by most Linux distributions for authentication purposes. Originating from Solaris 2.6 ten years ago, PAM is used today by most proprietary and free UNIX operating systems including GNU/Linux, FreeBSD, and Solaris, following both the design concept and the practical details. PAM is thus a unifying technology for authentication mechanisms in UNIX. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025