Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cloud Computing Basics: A Non-Technical Introduction
Cloud Computing Basics: A Non-Technical Introduction

Ever since my childhood I had a fascination with clouds. Real clouds up in the sky, white and fluffy or gray and gloomy, afforded an ever-present drama unfolding above for the curious spectator looking toward the heavens, as inquisitive children are wont to do. Maybe it was because of ample exposure to the perennial cloudiness of my native...

Pro Cryptography and Cryptanalysis with C++20: Creating and Programming Advanced Algorithms
Pro Cryptography and Cryptanalysis with C++20: Creating and Programming Advanced Algorithms
Knowledge is one of the most important aspects to consider when designing and implementing complex systems, such as companies, organizations, military operations, and so on. Information falling into the wrong hands can be a tragedy and can result in a huge loss of business or disastrous outcomes. To guarantee the security of...
How Open Source Ate Software: Understand the Open Source Movement and So Much More
How Open Source Ate Software: Understand the Open Source Movement and So Much More

Learn how free software became open source and how you can sell open source software. This book provides a historical context of how open source has thoroughly transformed how we write software, how we cooperate, how we communicate, how we organize, and, ultimately, how we think about business values.

This fully updated...

Beginning Entity Framework Core 5: From Novice to Professional
Beginning Entity Framework Core 5: From Novice to Professional

Eric Vogel

is a seasoned contributor to Visual Studio Magazine and Senior Software Developer at Red Cedar Solutions Group. He has been developing .NET Framework web and desktop solutions for 13 years. He holds a Bachelor of Science degree in computer science from Michigan State University. He is Acting President of the
...

Protective Security: Creating Military-Grade Defenses for Your Digital Business
Protective Security: Creating Military-Grade Defenses for Your Digital Business

This book shows you how military counter-intelligence principles and objectives are applied. It provides you with valuable advice and guidance to help your business understand threat vectors and the measures needed to reduce the risks and impacts to your organization. You will know how business-critical assets are compromised:...

Practical WebDriverIO: Learn to Automate Effectively Using WebDriverIO APIs
Practical WebDriverIO: Learn to Automate Effectively Using WebDriverIO APIs

Learn how to quickly set up the test automation tool WebdriverIO, one of the major Node.js-based test frameworks. Software testing is here to stay, and an integral part of this is test automation. Dive into the amazing possibilities that WebDriverIO offers to automate browser interactions for a user of any web application. 

...
Advanced API Security: OAuth 2.0 and Beyond
Advanced API Security: OAuth 2.0 and Beyond
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs.
Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of
...
Kubernetes: Preparing for the CKA and CKAD Certifications
Kubernetes: Preparing for the CKA and CKAD Certifications
Kubernetes is a recent platform, based on more than ten years of experience in cloud computing by big companies like Google, its creator. It is considered complex as it includes all the concepts to run diverse applications in a large variety of environments.

This book, based on the curricula of the two Kubernetes
...
Experiment-Driven Product Development: How to Use a Data-Informed Approach to Learn, Iterate, and Succeed Faster
Experiment-Driven Product Development: How to Use a Data-Informed Approach to Learn, Iterate, and Succeed Faster

Improving your craft is a key skill for product and user experience professionals working in the digital era. There are many established methods of product development to inspire and focus teams—Sprint, Lean, Agile, Kanban—all of which focus on solutions to customer and business problems. Enter XDPD, or Experiment-Driven...

PolyBase Revealed: Data Virtualization with SQL Server, Hadoop, Apache Spark, and Beyond
PolyBase Revealed: Data Virtualization with SQL Server, Hadoop, Apache Spark, and Beyond

Harness the power of PolyBase data virtualization software to make data from a variety of sources easily accessible through SQL queries while using the T-SQL skills you already know and have mastered.

PolyBase Revealed shows you how to use the PolyBase feature of SQL Server 2019 to...

Game Programming with Code Angel: Learn how to code in Python on Raspberry Pi or PC
Game Programming with Code Angel: Learn how to code in Python on Raspberry Pi or PC

Program in Python on a Raspberry Pi or PC by developing six computer games. Each game project is split into several chapters of the book. Rather than taking you through programming techniques as standalone concepts, this book explains concepts as they are used within a game.

You'll learn about variables; integer,...

Angular for Material Design: Leverage Angular Material and TypeScript to Build a Rich User Interface for Web Apps
Angular for Material Design: Leverage Angular Material and TypeScript to Build a Rich User Interface for Web Apps

Build Angular applications faster and better with TypeScript and Material Design. You will learn how to build a web interface and use Google's open source Angular Material library of ready-made and easy-to-use components.

This book uses Angular with TypeScript (a superset to JavaScript) to enable use of data types...

unlimited object storage image
Result Page: 225 224 223 222 221 220 219 218 217 216 215 214 213 212 211 210 209 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy