A Couple of Free eBooks from Microsoft Press

Microsoft Press has provided access to a number of eBooks for free. These are posted to the Microsoft Virtual Academy site. The MVA site is worth a few minutes of time if you’ve never been there. In addition to the eBooks I list below, it also provides a number of educational courses on a variety of topics.MS Press eBook

Of course, if eBooks are what you want, there are several. Most are on IT, but there are a few on development topics. The two that were available at the time of this posting were:

  • Programming Windows Store Apps with HTML, CSS, and JavaScript, Second Edition (Second Preview) (download).
  • .NET Technology Guide for Business Applications (download)

A few of the other books that were on the page include:

  • Introducing Microsoft Windows Server 2012 R2
  • Introducing Windows Azure for IT Professionals
  • Rethinking Enterprise Storage: A Hybrid Cloud Model
  • Introducing Windows 8.1 for IT Professionals

You can find links to the PDFs and source files (when appropriate) on the VMA site.



Blog Categories

Blog Archives

Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Live Event Date: May 18, 2015 @ 1:00 p.m. ET / 10:00 a.m. PT While the idea of using facial and or gesture recognitions to create a modern, intuitive game seems attractive, some developers may want to leverage Unity 3D as a way to accelerate their development. There are many different ways in which Intel and Unity Technologies have been working together to helps speed the develop of games with the Intel® RealSense™ SDK (Software Developer Kit), so come hear from a panel of experts on what we've done …

  • Live Event Date: May 13, 2105 @ 1:00 p.m. ET / 10:00 a.m. PT Your data is a valuable asset that can quickly transform into a liability when breached. Organizations often become hung up on combating external breaches, while the insider threat doesn't get the attention it deserves. To manage both external and internal threats, new approaches to security are required, particularly in regards to authorized internal users who have legitimate access to sensitive information. Join TITUS and a guest speaker from …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date