IT eBooks
Download, Read, Use
Build Your Own First-Person Shooter in Unity
Build Your Own First-Person Shooter in Unity

Ever fancied creating your own first-person shooter game? Now you can with this 140-page bookazine, brought to you by the Wireframe magazine team with tips from expert video game developers! Making a fast-paced 3D action game needn't be as daunting as it sounds. Build Your Own First-Person Shooter in Unity will take you step-by- step through the process of making Zombie Panic: a frenetic battle for survival inside a castle heaving with the undead. - Set up and use the free software you'll need; - Make enemies that follow and attack the player; - Create and texture 3D character models; - Extend your game further, with tips from experts; - Design a level with locked doors and keys. ...
Istio in Action
Istio in Action

Reduce the operational complexity of your microservices with an Istio-powered service mesh! Istio in Action shows you how to implement this powerful new architecture and move your application-networking concerns to a dedicated infrastructure layer. Non-functional concerns stay separate from your application, so your code is easier to understand, maintain, and adapt regardless of programming language. In this practical guide, you'll go hands-on with the full-featured Istio service mesh to manage microservices communication. Helpful diagrams, example configuration, and examples make it easy to understand how to control routing, secure container applications, and monitor network traffic. Offload complex microservice communication layer challenges to Istio! The industry-standard Istio service mesh radically simplifies security, routing, observability, and other service-to-service communication challenges. With Istio, you use a straightforward declarative configuration style to establish ...
Logging in Action
Logging in Action

Logging in Action is a guide to optimize and organize logging using the CNCF Fluentd and Fluent Bit projects. You'll use the powerful log management tool Fluentd to solve common log management, and learn how proper log management can improve performance and make management of software and infrastructure solutions easier. Through useful examples like sending log-driven events to Slack, you'll get hands-on experience applying structure to your unstructured data. Don't fly blind! An effective logging system can help you see and correct problems before they cripple your software. With the Fluentd log management tool, it's a snap to monitor the behavior and health of your software and infrastructure in real time. Designed to collect and process log data from multiple sources using the industry-standard JSON format, Fluentd delivers a truly unified logging layer across all your systems. Logging in Action teaches you to record and analyze application and infrastructure data using Fluent ...
Serverless Architectures on AWS, 2nd Edition
Serverless Architectures on AWS, 2nd Edition

Serverless Architectures on AWS, 2nd Edition teaches you how to design serverless systems. You'll discover the principles behind serverless architectures, and explore real-world case studies where companies used serverless architectures for their products. You won't just master the technical essentials - the book contains extensive coverage of balancing tradeoffs and making essential technical decisions. This new edition has been fully updated with new chapters covering current best practice, example architectures, and full coverage of the latest changes to AWS. Maintaining server hardware and software can cost a lot of time and money. Unlike traditional data center infrastructure, serverless architectures offload core tasks like data storage and hardware management to pre-built cloud services. Better yet, you can combine your own custom AWS Lambda functions with other serverless services to create features that automatically start and scale on demand, reduce hosting cost, and simpl ...
Application Delivery and Load Balancing in Microsoft Azure
Application Delivery and Load Balancing in Microsoft Azure

With more and more companies moving on-premises applications to the cloud, software and cloud solution architects alike are busy investigating ways to improve load balancing, performance, security, and high availability for workloads. This practical book describes Microsoft Azure's load balancing options and explains how NGINX can contribute to a comprehensive solution. Cloud architects Derek DeJonghe and Arlan Nugara take you through the steps necessary to design a practical solution for your network. Software developers and technical managers will learn how these technologies have a direct impact on application development and architecture. While the examples are specific to Azure, these load balancing concepts and implementations also apply to cloud providers such as AWS, Google Cloud, DigitalOcean, and IBM Cloud. - Understand application delivery and load balancing - and why they're important; - Explore Azure's managed load balancing options; - Learn how to run NGINX OSS an ...
Modern Mainframe Development
Modern Mainframe Development

Even as spending on digital transformation continues to skyrocket, mainframes nevertheless have major advantages for global enterprises. These systems still process huge amounts of information and allow for highly secure transactions. In this practical book, author Tom Taulli shows software developers how to pursue a hybrid approach by integrating traditional mainframes and applications with modern digital systems. By the end of this book, you'll have a solid understanding of the mainframe architecture and ecosystem, including core concepts and technologies such as COBOL, REXX, JCL, Db2, VSAM, and CICS. You'll also learn how to blend in newer technologies such as the cloud, AI and machine learning, and microservices. This handbook is indispensable for enterprises looking to thrive in the new digital world. - Learn strategies and approaches for mainframe DevOps; - Create, update, and maintain existing mainframe code, and analyze and resolve common errors; - Apply modern approach ...
Windows Internals, Part 2, 7th Edition
Windows Internals, Part 2, 7th Edition

The definitive guide to modern Windows internals: new coverage of virtualization, file systems, boot, security, and more. For advanced computing professionals, this is the definitive up-to-date guide to how Windows core components behave under the hood. Using it, experienced developers can build more powerful and scalable software, administrators can debug complex system and performance problems, and security researchers can harden their systems. This Seventh Edition is fully updated through the May 2021 (21H1/2104) updates to Windows 10 and Windows Server (2022, 2019, and 2016). It adds extensive content on Hyper-V, plus fully rewritten chapters on the boot process, new storage technologies, and Windows system and management mechanisms. As always, it delivers unparalleled insight based on insider access to Microsoft source code, with hands-on experiments using the latest debugging tools to show you Windows internal behaviors firsthand. With Windows 11 introducing new user interface ...
Cryptography and Cryptanalysis in Java
Cryptography and Cryptanalysis in Java

Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction to Java 17's new features and updates, a roadmap for Jakarta EE 10 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptography Architecture (JCA), and more. The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations). Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes. The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environme ...
Wireless Security Architecture
Wireless Security Architecture

Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise offers readers an essential guide to planning, designing, and preserving secure wireless infrastructures. It is a blueprint to a resilient and compliant architecture that responds to regulatory requirements, reduces organizational risk, and conforms to industry best practices. This book emphasizes WiFi security, as well as guidance on private cellular and Internet of Things security. Readers will discover how to move beyond isolated technical certifications and vendor training and put together a coherent network that responds to contemporary security risks. It offers up-to-date coverage - including data published for the first time - of new WPA3 security, Wi-Fi 6E, zero-trust frameworks, and other emerging trends. It also includes: Concrete strategies suitable for organizations of all sizes, from large government agencies to small public and private companies; Effective technical resources and r ...
Expert Oracle Database Architecture, 4th Edition
Expert Oracle Database Architecture, 4th Edition

Now in its fourth edition and covering Oracle Database 21c, this best-selling book continues to bring you some of the best thinking on how to apply Oracle Database to produce scalable applications that perform well and deliver correct results. Tom Kyte and Darl Kuhn share a simple philosophy: "you can treat Oracle as a black box and just stick data into it, or you can understand how it works and exploit it as a powerful computing environment." If you choose the latter, then you'll find that there are few information management problems that you cannot solve quickly and elegantly. This fully revised fourth edition covers the developments and new features up to Oracle Database 21c. Up-to-date features are covered for tables, indexes, data types, sequences, partitioning, data loading, temporary tables, and more. All the examples are demonstrated using modern techniques and are executed in container and pluggable databases. The book's proof-by-example approach encourages you to let evid ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025