IT eBooks
Download, Read, Use
C in a Nutshell
C in a Nutshell

Learning a language involves a process wherein you learn to rely less and less on instruction and more increasingly on the aspects of the language you've mastered. Whether you're learning French, Java, or C, at some point you'll set aside the tutorial and attempt to converse on your own. It's not necessary to know every subtle facet of French in order to speak it well, especially if there's a good dictionary available. Likewise, C programmers don't need to memorize every detail of C in order to write good programs. What they need instead is a reliable, comprehensive reference that they can keep nearby. C in a Nutshell is that reference. ...
MySQL in a Nutshell, 2nd Edition
MySQL in a Nutshell, 2nd Edition

When you need to find the right SQL keyword or MySQL client command-line option right away, turn to this convenient reference, known for the same speed and flexibility as the system it covers so thoroughly. MySQL is packed with so many capabilities that the odds of remembering a particular function or statement at the right moment are pretty slim. With MySQL in a Nutshell, you get the details you need, day in and day out, in one concise and extremely well organized book. ...
System Center Service Manager 2010 Unleashed
System Center Service Manager 2010 Unleashed

System Center Service Manager 2010 offers enterprises a complete, integrated platform for adopting and automating service management best practices, such as those found in ITIL and Microsoft Operations Framework (MOF). Now, there's a comprehensive, independent reference and technical guide to this powerful product. This book is an indispensable resource for every IT professional planning, installing, deploying, and/or administering Service Manager, including ITIL, MOF, and other IT consultants; system administrators; and developers creating customized solutions. ...
R in a Nutshell, 2nd Edition
R in a Nutshell, 2nd Edition

If you're considering R for statistical computing and data visualization, this book provides a quick and practical guide to just about everything you can do with the open source R language and software environment. You'll learn how to write R functions and use R packages to help you prepare, visualize, and analyze data. Author Joseph Adler illustrates each process with a wealth of examples from medicine, business, and sports. Updated for R 2.14 and 2.15, this second edition includes new and expanded chapters on R performance, the ggplot2 data visualization package, and parallel R computing with Hadoop. ...
Restlet in Action
Restlet in Action

Restlet in Action introduces the Restlet Framework and RESTful web APIs. You'll see how to easily create and deploy your own web API while learning to consume other web APIs effectively. You'll learn about designing, securing, versioning, documentation, optimizing, and more on both the server and client side, as well as about cloud computing, mobile Android devices, and Semantic Web applications. The book requires a basic knowledge of Java and the web, but no prior exposure to REST or Restlet. ...
Real-Time Digital Signal Processing, 2nd Edition
Real-Time Digital Signal Processing, 2nd Edition

Real-time Digital Signal Processing: Implementations and Applications has been completely updated and revised for the 2nd edition and remains the only book on DSP to provide an overview of DSP theory and programming with hands-on experiments using MATLAB, C and the newest fixed-point processors from Texas Instruments (TI). ...
iPhone: The Missing Manual, 6th Edition
iPhone: The Missing Manual, 6th Edition

With the iOS 6 software and the new iPhone 5, Apple has two world-class hits on its hands. This sleek, highly refined pocket computer comes with everything - cellphone, iPod, Internet, camcorder - except a printed manual. Fortunately, David Pogue is back with this expanded edition of his witty, full-color guide: the world's most popular iPhone book. The iPhone may be the world's coolest computer, but it's still a computer, with all of a computer's complexities. iPhone: The Missing Manual is a funny, gorgeously illustrated guide to the tips, shortcuts, and workarounds that will turn you, too, into an iPhone addict. ...
Hacking Exposed, 6th Edition
Hacking Exposed, 6th Edition

Meet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal. New and updated material! ...
Hacking Exposed Computer Forensics, 2nd Edition
Hacking Exposed Computer Forensics, 2nd Edition

Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. Learn how to re-create an attacker's footsteps, communicate with counsel, prepare court-ready reports, and work through legal and organizational challenges. Case studies straight from today's headlines cover IP theft, mortgage fraud, employee misconduct, securities fraud, embezzlement, organized crime, and consumer fraud cases. ...
Hacking Exposed Wireless, 2nd Edition
Hacking Exposed Wireless, 2nd Edition

Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless, second edition reveals how attackers use readily available and custom tools to target, infiltrate, and hijack vulnerable systems. This book discusses the latest developments in Wi-Fi, Bluetooth, ZigBee, and DECT hacking, and explains how to perform penetration tests, reinforce WPA protection schemes, mitigate packet injection risk, and lock down Bluetooth and RF devices. Cutting-edge techniques for exploiting Wi-Fi clients, WPA2, cordless phones, Bluetooth pairing, and ZigBee encryption are also covered in this fully revised guide. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025