IT eBooks
Download, Read, Use
Learning Node.js
Learning Node.js

Node.js is an event-based, non-blocking, asynchronous I/O framework that uses Google's V8 JavaScript engine. It is used for developing applications that make heavy use of the ability to run JavaScript both on the client, as well as on server side and therefore benefit from the re-usability of code and the lack of context switching. It is open-source and cross-platform. Node.js applications are written in pure JavaScript and can be run within Node.js environment on Windows, Linux etc. It is an unofficial and free Node.js book created for educational purposes. All the content is extracted from Stack Overflow Documentation, which is written by many hardworking individuals at Stack Overflow. ...
Learning Microsoft SQL Server
Learning Microsoft SQL Server

Microsoft SQL Server is a relational database management system developed by Microsoft. It is an unofficial and free Microsoft SQL Server ebook created for educational purposes. All the content is extracted from Stack Overflow Documentation, which is written by many hardworking individuals at Stack Overflow. ...
Protecting SQL Server Data
Protecting SQL Server Data

In Protecting SQL Server Data, John Magnabosco demonstrates how sensitive data, stored in SQL Server, can be protected using an efficient and maintainable encryption-based data architecture. He explains how to assess and categorize data elements according to sensitivity, regulate access to the various categories of data using database roles, views and stored procedures, and then how to implement a secure data architecture using features such as cell-level encryption, transparent data encryption, one-way encryption, obfuscation, and more. The battle to secure personal and business data is a tough one, and the consequences of mishandling sensitive data can be severe. Even more damaging than the fines and lawsuits that can be result from non-compliance with regulations, is the loss of customer confidence that results when these breaches of security occur. Database Administrators must use every weapon and strategy at their disposal in the "war" to protect their sensitive data from ...
Microservices with Spring Boot and Spring Cloud, 2nd Edition
Microservices with Spring Boot and Spring Cloud, 2nd Edition

With this book, you'll learn how to efficiently build and deploy microservices. This new edition has been updated for the most recent versions of Spring, Java, Kubernetes, and Istio, demonstrating faster and simpler handling of Spring Boot, local Kubernetes clusters, and Istio installation. The expanded scope includes native compilation of Spring-based microservices, support for Mac and Windows with WSL2, and an introduction to Helm 3 for packaging and deployment. A revamped security chapter now follows the OAuth 2.1 specification and makes use of the newly launched Spring Authorization Server from the Spring team. Starting with a set of simple cooperating microservices, you'll add persistence and resilience, make your microservices reactive, and document their APIs using OpenAPI. You'll understand how fundamental design patterns are applied to add important functionality, such as service discovery with Netflix Eureka and edge servers with Spring Cloud Gateway. You'll learn how to ...
SQL Server on Kubernetes
SQL Server on Kubernetes

Build a modern data platform by deploying SQL Server in Kubernetes. Modern application deployment needs to be fast and consistent to keep up with business objectives and Kubernetes is quickly becoming the standard for deploying container-based applications, fast. This book introduces Kubernetes and its core concepts. Then it shows you how to build and interact with a Kubernetes cluster. Next, it goes deep into deploying and operationalizing SQL Server in Kubernetes, both on premises and in cloud environments such as the Azure Cloud. You will begin with container-based application fundamentals and then go into an architectural overview of a Kubernetes container and how it manages application state. Then you will learn the hands-on skill of building a production-ready cluster. With your cluster up and running, you will learn how to interact with your cluster and perform common administrative tasks. Once you can admin the cluster, you will learn how to deploy applications and SQL Serve ...
AI for Healthcare with Keras and Tensorflow 2.0
AI for Healthcare with Keras and Tensorflow 2.0

Learn how AI impacts the healthcare ecosystem through real-life case studies with TensorFlow 2.0 and other machine learning (ML) libraries. This book begins by explaining the dynamics of the healthcare market, including the role of stakeholders such as healthcare professionals, patients, and payers. Then it moves into the case studies. The case studies start with EHR data and how you can account for sub-populations using a multi-task setup when you are working on any downstream task. You also will try to predict ICD-9 codes using the same data. You will study transformer models. And you will be exposed to the challenges of applying modern ML techniques to highly sensitive data in healthcare using federated learning. You will look at semi-supervised approaches that are used in a low training data setting, a case very often observed in specialized domains such as healthcare. You will be introduced to applications of advanced topics such as the graph convolutional network and how you c ...
Beginning Windows Mixed Reality Programming
Beginning Windows Mixed Reality Programming

Develop applications and experiences for Microsoft's HoloLens 2 and other Windows mixed reality devices. This easy-to-follow guide removes the mystery behind creating amazing augmented reality and virtual reality experiences. Mixed reality development tools and resources are provided. Beginning Windows Mixed Reality Programming, 2nd edition clearly explains all the nuances of mixed reality software development. You will learn how to create 3D objects and holograms, interact with holograms using voice commands and hand gestures, use spatial mapping and 3D spatial sound, build with toolkits such as Microsoft's Mixed Reality Toolkit and Unity's AR Foundation and XR Platform, create intuitive user interfaces, and make truly awe-inspiring mixed reality experiences. This newly revised edition also includes updated content for HoloLens 2 development, including tutorials for new interactions such as hand tracking and eye tracking. Prototype ideas quickly for the HoloLens 2 and Windows mi ...
Mastering the Lightning Network
Mastering the Lightning Network

The Lightning Network (LN) is a rapidly growing second-layer payment protocol that works on top of Bitcoin to provide near-instantaneous transactions between two parties. With this practical guide, authors Andreas M. Antonopoulos, Olaoluwa Osuntokun, and Rene Pickhardt explain how this advancement will enable the next level of scale for Bitcoin, increasing speed and privacy while reducing fees. Ideal for developers, systems architects, investors, and entrepreneurs looking to gain a better understanding of LN, this book demonstrates why experts consider LN a critical solution to Bitcoin's scalability problem. You'll learn how LN has the potential to support far more transactions than today's financial networks. This book examines: How the Lightning Network addresses the challenge of blockchain scaling; The Basis of Lightning Technology (BOLT) standards documents; The five layers of the Lightning Network Protocol Suite; LN basics, including wallets, nodes, and how to operate one; L ...
SQL Server Metadata Succinctly
SQL Server Metadata Succinctly

SQL Server is a very complex and powerful product, but it provides tremendous amounts of data about itself. You can use this metadata to improve your database design, increase performance, review security, and more. Joseph D. Booth will show readers sample scripts and queries using information schema views as well as SQL Server-specific views in SQL Server Metadata Succinctly. ...
Ethical Hacking
Ethical Hacking

Ethical Hacking is a crash course in modern hacking techniques. It's already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you'll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst. You'll begin with the basics: capturing a victim's network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, you'll deploy reverse shells that let you remotely run commands on a victim's computer, encrypt files by writing your own ransomware in Python, and fake emails like the ones used in phishing attacks. In advanced chapters, you'll learn how to fuzz for new vulnerabilities, craft trojans and rootkits, exploit websites with SQL injection, and escalate your privileges to extract credentials, which you'll use to traverse a private network. You'll work with a wide range of professional penetration testing tools - and learn to write your own tools in Python - as you pra ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025