Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Pro Android with Kotlin: Developing Modern Mobile Apps
Pro Android with Kotlin: Developing Modern Mobile Apps

Develop Android apps with Kotlin to create more elegant programs than the Java equivalent. This book covers the various aspects of a modern Android app that professionals are expected to encounter. There are chapters dealing with all the important aspects of the Android platform, including GUI design, file- and...

Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats

Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful...

Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring...
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
Decoupled Drupal in Practice: Architect and Implement Decoupled Drupal Architectures Across the Stack
Decoupled Drupal in Practice: Architect and Implement Decoupled Drupal Architectures Across the Stack

Gain a clear understanding of the most important concepts in the decoupled CMS landscape. You will learn how to architect and implement decoupled Drupal architectures across the stack?from building the back end and designing APIs to integrating with front-end technologies.  You'll also review presenting data through consumer...

DevOps for SharePoint: With Packer, Terraform, Ansible, and Vagrant
DevOps for SharePoint: With Packer, Terraform, Ansible, and Vagrant
Deploy a SharePoint farm in a repeatable, predictable, and reliable fashion using Infrastructure as Code (IaC) techniques to automate provisioning. Savvy IT pros will learn how to use DevOps practices and open source tools to greatly reduce costs, and streamline management operations for SharePoint farms deployed via Amazon Web Services...
Building Your Online Store With WordPress and WooCommerce: Learn to Leverage the Critical Role E-commerce Plays in Today’s Competitive Marketplace
Building Your Online Store With WordPress and WooCommerce: Learn to Leverage the Critical Role E-commerce Plays in Today’s Competitive Marketplace

Teaches you all about e-commerce and how to create your own online shop using WordPress and WooCommerce. Regardless of a business’s size, e-commerce helps level the playing field, increases a business’s exposure, allows companies to reach customers globally, and streamlines the fulfillment process. In the past, e-commerce...

Pro Angular 6
Pro Angular 6

Best-selling author Adam Freeman shows you how to use Angular in your projects, starting from the nuts and bolts and building up to the most advanced and sophisticated features, going in-depth to give you the knowledge you need. Chapters include common problems and how to avoid them. Additionally, this book...

Deep Belief Nets in C++ and CUDA C: Volume 3: Convolutional Nets
Deep Belief Nets in C++ and CUDA C: Volume 3: Convolutional Nets
Discover the essential building blocks of a common and powerful form of deep belief network: convolutional nets. This book shows you how the structure of these elegant models is much closer to that of human brains than traditional neural networks; they have a ‘thought process’ that is capable of learning abstract...
Securing Office 365: Masterminding MDM and Compliance in the Cloud
Securing Office 365: Masterminding MDM and Compliance in the Cloud
Understand common security pitfalls and discover weak points in your organization’s data security, and what you can do to combat them. This book includes the best approaches to managing mobile devices both on your local network and outside the office.

Data breaches, compliance fines,  and
...
Visual Studio Code Distilled: Evolved Code Editing for Windows, macOS, and Linux
Visual Studio Code Distilled: Evolved Code Editing for Windows, macOS, and Linux

Use Visual Studio Code to write and debug code quickly and efficiently on any platform, for any device, using any programming language, and on the operating system of your choice.

Visual Studio Code is an open source and cross-platform development tool that focuses on code editing across a variety of development...

unlimited object storage image
Result Page: 225 224 223 222 221 220 219 218 217 216 215 214 213 212 211 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy