IT eBooks
Download, Read, Use
Linux Cookbook, 2nd Edition
Linux Cookbook, 2nd Edition

This handy cookbook teaches new-to-intermediate Linux users the essential skills necessary to manage a Linux system, using both graphical and command-line tools. Whether you run Linux in embedded, desktop, server, or cloud or virtual environments, the fundamental skills are the same. This book aims to get you up and running quickly, with copy-paste examples. Carla Schroder provides recipes that cover specific problems, with discussions that explain how each recipe works, as well as references for additional study. You'll learn how to: Use systemd, the new comprehensive service manager; Build simple or complex firewalls with firewalld; Set up secure network connections for Linux systems and mobile devices; Rescue nonbooting systems; Reset lost passwords on Linux and Windows; Use dnsmasq to simplify managing your LAN name services; Manage users and groups and control access to files; Probe your computer hardware and monitor hardware health; Manage the GRUB bootloader and multiboot ...
Data Science at the Command Line, 2nd Edition
Data Science at the Command Line, 2nd Edition

This thoroughly revised guide demonstrates how the flexibility of the command line can help you become a more efficient and productive data scientist. You'll learn how to combine small yet powerful command-line tools to quickly obtain, scrub, explore, and model your data. To get you started, author Jeroen Janssens provides a Docker image packed with over 100 Unix power tools-useful whether you work with Windows, macOS, or Linux. You'll quickly discover why the command line is an agile, scalable, and extensible technology. Even if you're comfortable processing data with Python or R, you'll learn how to greatly improve your data science workflow by leveraging the command line's power. This book is ideal for data scientists, analysts, engineers, system administrators, and researchers. Obtain data from websites, APIs, databases, and spreadsheets; Perform scrub operations on text, CSV, HTM, XML, and JSON files; Explore data, compute descriptive statistics, and create visualizations; M ...
Docker Succinctly
Docker Succinctly

Containers have revolutionized software development, allowing developers to bundle their applications with everything they need, from the operating system up, into a single package. Docker is one of the most popular platforms for containers, allowing them to be hosted on-premises or on the cloud, and to run on Linux, Windows, and Mac machines. With Docker Succinctly by Elton Stoneman, learn the basics of building Docker images, sharing them on the Docker Hub, orchestrating containers to deliver large applications, and much more. ...
Cloud Design Patterns
Cloud Design Patterns

Cloud applications have a unique set of characteristics. They run on commodity hardware, provide services to untrusted users, and deal with unpredictable workloads. These factors impose a range of problems that you, as a designer or developer, need to resolve. Your applications must be resilient so that they can recover from failures, secure to protect services from malicious attacks, and elastic in order to respond to an ever changing workload. This guide demonstrates design patterns that can help you to solve the problems you might encounter in many different areas of cloud application development. Each pattern discusses design considerations, and explains how you can implement it using the features of Windows Azure. The patterns are grouped into categories: availability, data management, design and implementation, messaging, performance and scalability, resilience, management and monitoring, and security. You will also see more general guidance related to these areas of concern. It ...
Ethical Hacking
Ethical Hacking

Ethical Hacking is a crash course in modern hacking techniques. It's already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you'll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst. You'll begin with the basics: capturing a victim's network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, you'll deploy reverse shells that let you remotely run commands on a victim's computer, encrypt files by writing your own ransomware in Python, and fake emails like the ones used in phishing attacks. In advanced chapters, you'll learn how to fuzz for new vulnerabilities, craft trojans and rootkits, exploit websites with SQL injection, and escalate your privileges to extract credentials, which you'll use to traverse a private network. You'll work with a wide range of professional penetration testing tools - and learn to write your own tools in Python - as you pra ...
Data Science on the Google Cloud Platform, 2nd Edition
Data Science on the Google Cloud Platform, 2nd Edition

Learn how easy it is to apply sophisticated statistical and machine learning methods to real-world problems when you build using Google Cloud Platform (GCP). This hands-on guide shows data engineers and data scientists how to implement an end-to-end data pipeline with cloud native tools on GCP. Throughout this updated second edition, you'll work through a sample business decision by employing a variety of data science approaches. Follow along by building a data pipeline in your own project on GCP, and discover how to solve data science problems in a transformative and more collaborative way. You'll learn how to: Employ best practices in building highly scalable data and ML pipelines on Google Cloud; Automate and schedule data ingest using Cloud Run; Create and populate a dashboard in Data Studio; Build a real-time analytics pipeline using Pub/Sub, Dataflow, and BigQuery; Conduct interactive data exploration with BigQuery; Create a Bayesian model with Spark on Cloud Dataproc; Fore ...
bash Idioms
bash Idioms

Shell scripts are everywhere, especially those written in bash-compatible syntax. But these scripts can be complex and obscure. Complexity is the enemy of security, but it's also the enemy of readability and understanding. With this practical book, you'll learn how to decipher old bash code and write new code that's as clear and readable as possible. Authors Carl Albing and JP Vossen show you how to use the power and flexibility of the shell to your advantage. You may know enough bash to get by, but this book will take your skills from manageable to magnificent. Whether you use Linux, Unix, Windows, or a Mac, you'll learn how to read and write scripts like an expert. Your future you will thank you. You'll explore the clear idioms to use and obscure ones to avoid, so that you can: Write useful, flexible, and readable bash code with style; Decode bash code such as ${MAKEMELC,,} and ${PATHNAME##*/}; Save time and ensure consistency when automating tasks; Discover how bash idioms can ...
Fundamentals of Computer Programming with C#
Fundamentals of Computer Programming with C#

This open book aims to provide novice programmers solid foundation of basic knowledge regardless of the programming language. This book covers the fundamentals of programming that have not changed significantly over the last 10 years. Educational content was developed by an authoritative author team led by Svetlin Nakov from the Software University (SoftUni) and covers topics such as variables conditional statements, loops and arrays, and more complex concepts such as data structures (lists, stacks, queues, trees, hash tables, etc.), and recursion recursive algorithms, object-oriented programming and high-quality code. From the book you will learn how to think as programmers and how to solve efficiently programming problems. You will master the fundamental principles of programming and basic data structures and algorithms, without which you can't become a software engineer. If you want to learn programming and software development and become a software engineer and start a job in a ...
Microsoft Excel VBA and Macros
Microsoft Excel VBA and Macros

Use this guide to automate virtually any routine Excel task: save yourself hours, days, maybe even weeks. Make Excel do things you thought were impossible, discover macro techniques you wont find anywhere else, and create automated reports that are amazingly powerful. Bill Jelen and Tracy Syrstad help you instantly visualize information to make it actionable; capture data from anywhere, and use it anywhere; and automate the best new features in Microsoft Excel. Youll find simple, step-by-step instructions, real-world case studies, and 50 workbooks packed with examples and complete, easy-to-adapt solutions. By reading this book, you will: Quickly master Excel macro development; Work more efficiently with ranges, cells, and formulas; Generate automated reports and quickly adapt them for new requirements; Learn to automate PivotTables to summarize, analyze, explore, and present data; Leverage more of Excel VBAs power with classes, collections, and Advanced Filter; Make the most of User ...
Microsoft Visual C# Step by Step, 10th Edition
Microsoft Visual C# Step by Step, 10th Edition

Expand your expertiseand teach yourself the fundamentals of programming the latest version of Visual C# with Visual Studio 2022. This book provides software developers all the guidance, exercises, and code needed to start building responsive, scalable, cloud-connected applications that can run almost anywhere. Discover how to: Quickly start creating Visual C# code and projects with Visual Studio; Work with variables, operators, expressions, methods, and program flow; Build more robust apps with error, exception, and resource management; Spot problems fast with the integrated Visual Studio 2022 debugger; Master new default interface methods, static local functions, async disposable types, and other enhancements; Make the most of the C# object model, and create functional data structures; Leverage advanced properties, indexers, generics, and collection classes; Create Windows 11 apps that share data, collaborate, and use cloud services; Use lightweight records to build immutable ref ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2026