Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced API Security: OAuth 2.0 and Beyond
Advanced API Security: OAuth 2.0 and Beyond
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs.
Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of
...
Kubernetes: Preparing for the CKA and CKAD Certifications
Kubernetes: Preparing for the CKA and CKAD Certifications
Kubernetes is a recent platform, based on more than ten years of experience in cloud computing by big companies like Google, its creator. It is considered complex as it includes all the concepts to run diverse applications in a large variety of environments.

This book, based on the curricula of the two Kubernetes
...
Angular for Material Design: Leverage Angular Material and TypeScript to Build a Rich User Interface for Web Apps
Angular for Material Design: Leverage Angular Material and TypeScript to Build a Rich User Interface for Web Apps

Build Angular applications faster and better with TypeScript and Material Design. You will learn how to build a web interface and use Google's open source Angular Material library of ready-made and easy-to-use components.

This book uses Angular with TypeScript (a superset to JavaScript) to enable use of data types...

Building Progressive Web Applications with Vue.js: Reliable, Fast, and Engaging Apps with Vue.js
Building Progressive Web Applications with Vue.js: Reliable, Fast, and Engaging Apps with Vue.js
Obtain all the necessary tools for developing a progressive web application (PWA) with Vue.js, a modern JavaScript framework. You’ll see how PWAs behave like a regular responsive website and have a similar structure to that of a web application, but feel like a native mobile app. Along the way you’ll take advantage of Vue.js...
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

The Blockchain Developer: A Practical Guide for Designing, Implementing, Publishing, Testing, and Securing Distributed Blockchain-based Projects
The Blockchain Developer: A Practical Guide for Designing, Implementing, Publishing, Testing, and Securing Distributed Blockchain-based Projects

Become a Blockchain developer and design, build, publish, test, maintain and secure scalable decentralized Blockchain projects using Bitcoin, Ethereum, NEO, EOS and Hyperledger.  

This book helps you understand Blockchain beyond development and crypto to better harness its power and capability. You will learn...

Pro React 16
Pro React 16

Use the enormously popular React framework to build dynamic JavaScript applications that take advantage of the capabilities of modern browsers and devices. You will learn how React brings the power of strong architecture and responsive data to the client, providing the foundation for complex and rich user interfaces.

...

Practical Node.js: Building Real-World Scalable Web Apps
Practical Node.js: Building Real-World Scalable Web Apps

Learn how to build a wide range of scalable real-world web applications using a professional development toolkit. If you already know the basics of Node.js, now is the time to discover how to bring it to production level by leveraging its vast ecosystem of packages.With this book, you'll work with a varied collection of standards...

Beginning Blockchain: A Beginner's Guide to Building Blockchain Solutions
Beginning Blockchain: A Beginner's Guide to Building Blockchain Solutions

Understand the nuts and bolts of Blockchain, its different flavors with simple use cases, and cryptographic fundamentals. You will also learn some design considerations that can help you build custom solutions.

Beginning Blockchain is a beginner’s guide to understanding the core concepts of...

Practical Information Security Management: A Complete Guide to Planning and Implementation
Practical Information Security Management: A Complete Guide to Planning and Implementation

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information...

Blockchain Basics: A Non-Technical Introduction in 25 Steps
Blockchain Basics: A Non-Technical Introduction in 25 Steps

In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, mathematics, programming, or cryptography is required. Terminology is explained through pictures, analogies, and metaphors.

This book...

Protective Security: Creating Military-Grade Defenses for Your Digital Business
Protective Security: Creating Military-Grade Defenses for Your Digital Business

This book shows you how military counter-intelligence principles and objectives are applied. It provides you with valuable advice and guidance to help your business understand threat vectors and the measures needed to reduce the risks and impacts to your organization. You will know how business-critical assets are compromised:...

unlimited object storage image
Result Page: 221 220 219 218 217 216 215 214 213 212 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy