IT eBooks
Download, Read, Use
High Performance MySQL, 4th Edition
High Performance MySQL, 4th Edition

How can you realize MySQL's full power? With High Performance MySQL, you'll learn advanced techniques for everything from setting service-level objectives to designing schemas, indexes, and queries to tuning your server, operating system, and hardware to achieve your platform's full potential. This guide also teaches database administrators safe and practical ways to scale applications through replication, load balancing, high availability, and failover. Updated to reflect recent advances in cloud- and self-hosted MySQL, InnoDB performance, and new features and tools, this revised edition helps you design a relational data platform that will scale with your business. You'll learn best practices for database security along with hard-earned lessons in both performance and database stability. Dive into MySQL's architecture, including key facts about its storage engines; Learn how server configuration works with your hardware and deployment choices; Make query performance part of you ...
SQL Server Metadata Succinctly
SQL Server Metadata Succinctly

SQL Server is a very complex and powerful product, but it provides tremendous amounts of data about itself. You can use this metadata to improve your database design, increase performance, review security, and more. Joseph D. Booth will show readers sample scripts and queries using information schema views as well as SQL Server-specific views in SQL Server Metadata Succinctly. ...
Ethical Hacking
Ethical Hacking

Ethical Hacking is a crash course in modern hacking techniques. It's already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you'll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst. You'll begin with the basics: capturing a victim's network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, you'll deploy reverse shells that let you remotely run commands on a victim's computer, encrypt files by writing your own ransomware in Python, and fake emails like the ones used in phishing attacks. In advanced chapters, you'll learn how to fuzz for new vulnerabilities, craft trojans and rootkits, exploit websites with SQL injection, and escalate your privileges to extract credentials, which you'll use to traverse a private network. You'll work with a wide range of professional penetration testing tools - and learn to write your own tools in Python - as you pra ...
Designing Secure Software
Designing Secure Software

Designing Secure Software consolidates Loren Kohnfelder's more than twenty years of experience into a concise, elegant guide to improving the security of technology products. Written for a wide range of software professionals, it emphasizes building security into software design early and involving the entire team in the process. The book begins with a discussion of core concepts like trust, threats, mitigation, secure design patterns, and cryptography. The second part, perhaps this book's most unique and important contribution to the field, covers the process of designing and reviewing a software design with security considerations in mind. The final section details the most common coding flaws that create vulnerabilities, making copious use of code snippets written in C and Python to illustrate implementation vulnerabilities. You'll learn how to: Identify important assets, the attack surface, and the trust boundaries in a system; Evaluate the effectiveness of various threat mit ...
Practical Linux Forensics
Practical Linux Forensics

Practical Linux Forensics dives into the technical details of analyzing postmortem forensic images of Linux systems that have been misused, abused, or the target of malicious attacks. This essential practitioner's guide will show you how to locate and interpret digital evidence found on Linux desktops, servers, and IoT devices, draw logical conclusions, and reconstruct timelines of past activity after a crime or security incident. It's a book written for investigators with varying levels of Linux experience, and the techniques shown are independent of the forensic analysis platform and tools used. Early chapters provide an overview of digital forensics as well as an introduction to the Linux operating system and popular distributions. From there, the book describes the analysis of storage, filesystems, files and directories, installed software packages, and logs. Special focus is given to examining human user activity such as logins, desktop environments and artifacts, home director ...
External Collaboration with Azure AD B2B Succinctly
External Collaboration with Azure AD B2B Succinctly

Secure collaboration in your organization's applications and services with outside groups can be tricky, but Azure Active Directory boasts features that make it simple. In External Collaboration with Azure AD B2B Succinctly, author Sjoukje Zaal takes readers step-by-step through creating guest accounts, managing security groups, and adding users and groups to applications. From there, the book covers different ways to automate these processes with Graph API, PowerShell, and Azure Functions, and examines the difference in sharing capabilities between Azure AD B2B and Office 365. ...
Raspberry Pi Camera Guide
Raspberry Pi Camera Guide

Take pictures and shoot video with your Raspberry Pi. Connecting a High Quality Camera or Camera Module turns your favourite credit-card-sized computer into a powerful digital camera. Learn how to set up and control the camera to capture stills and video footage. Discover the numerous modes and effects available, and use the camera in a variety of exciting projects across 17 packed chapters: - Set up the new High Quality Camera, attach a lens, and start capturing stunning hi-res images - Take selfies and shoot stop-motion videos - Build a wildlife camera and also an underwater one - Make a smart door with a video doorbell - Set up a security camera to monitor your home - And much, much more! ...
Spring in Action, 6th Edition
Spring in Action, 6th Edition

Over the years, Spring in Action has helped tens of thousands of developers get a major productivity boost from Spring. This new edition of the classic bestseller covers all of the new features of Spring 5.3 and Spring Boot 2.4 along with examples of reactive programming, Spring Security for REST Services, and bringing reactivity to your databases. You'll also find the latest Spring best practices, including Spring Boot for application setup and configuration. Spring is required knowledge for Java developers! Why? Th is powerful framework eliminates a lot of the tedious configuration and repetitive coding tasks, making it easy to build enterprise-ready, production-quality software. The latest updates bring huge productivity boosts to microservices, reactive development, and other modern application designs. It's no wonder over half of all Java developers use Spring. Spring in Action, 6th Edition is a comprehensive guide to Spring's core features, all explained in Craig Walls' fam ...
bash Idioms
bash Idioms

Shell scripts are everywhere, especially those written in bash-compatible syntax. But these scripts can be complex and obscure. Complexity is the enemy of security, but it's also the enemy of readability and understanding. With this practical book, you'll learn how to decipher old bash code and write new code that's as clear and readable as possible. Authors Carl Albing and JP Vossen show you how to use the power and flexibility of the shell to your advantage. You may know enough bash to get by, but this book will take your skills from manageable to magnificent. Whether you use Linux, Unix, Windows, or a Mac, you'll learn how to read and write scripts like an expert. Your future you will thank you. You'll explore the clear idioms to use and obscure ones to avoid, so that you can: Write useful, flexible, and readable bash code with style; Decode bash code such as ${MAKEMELC,,} and ${PATHNAME##*/}; Save time and ensure consistency when automating tasks; Discover how bash idioms can ...
Practical Doomsday
Practical Doomsday

As a leading security engineer, Michal Zalewski has spent his career methodically anticipating and planning for cyberattacks. In Practical Doomsday, Zalewski applies the same thoughtful, rational approach to preparing for disasters of all kinds. By sharing his research, advice, and a healthy dose of common sense, he'll help you rest easy knowing you have a plan for the worst - even if the worst never comes. The book outlines a level-headed model for evaluating risks, one that weighs the probability of scenarios against the cost of preparing for them. You'll learn to apply that model to the whole spectrum of potential crises, from personal hardships like job loss or a kitchen fire, to large-scale natural disasters and industrial accidents, to recurring pop-culture fears like all-out nuclear war. You'll then explore how basic lifestyle adjustments, such as maintaining a robust rainy-day fund, protecting yourself online, and fostering good relationships with your neighbors, can boost y ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025