Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Navigating Hybrid Scrum Environments: Understanding the Essentials, Avoiding the Pitfalls
Navigating Hybrid Scrum Environments: Understanding the Essentials, Avoiding the Pitfalls
Know the details of each part of Scrum so you can understand the purpose each part serves in the framework. Many books describe the “what” part of Scrum, but few explain the “why." Every part of the Scrum framework is important. You need to know the purpose behind each of the parts of the Scrum framework to reap...
PowerShell and Python Together: Targeting Digital Investigations
PowerShell and Python Together: Targeting Digital Investigations
Bring together the Python programming language and Microsoft’s PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.

You will learn how to join PowerShell's robust set of commands and access to the
...
Digital Forensics Basics: A Practical Guide Using Windows OS
Digital Forensics Basics: A Practical Guide Using Windows OS

Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner...

Practical UI Patterns for Design Systems: Fast-Track Interaction Design for a Seamless User Experience
Practical UI Patterns for Design Systems: Fast-Track Interaction Design for a Seamless User Experience

Understanding UI patterns is invaluable to anyone creating websites for the first time. It helps you make connections between which tools are right for which jobs, understand the processes, and think deeply about the context of a problem.  This is your concise guide to the tested and proven general mechanisms for solving...

Professional Red Teaming: Conducting Successful Cybersecurity Engagements
Professional Red Teaming: Conducting Successful Cybersecurity Engagements

Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools.

...

DevOps in Python: Infrastructure as Python
DevOps in Python: Infrastructure as Python
Explore and apply best practices for efficient application deployment. This book draws upon author Moshe Zadka's years of Dev Ops experience and focuses on the parts of Python, and the Python ecosystem, that are relevant for DevOps engineers. 

You'll start by writing command-line scripts and
...
Python Continuous Integration and Delivery: A Concise Guide with Examples
Python Continuous Integration and Delivery: A Concise Guide with Examples
Gain the techniques and tools that enable a smooth and efficient software development process in this quick and practical guide on Python continuous integration (CI) and continuous delivery (CD). Based on example applications, this book introduces various kinds of testing and shows you how to set up...
Pro DevOps with Google Cloud Platform: With Docker, Jenkins, and Kubernetes
Pro DevOps with Google Cloud Platform: With Docker, Jenkins, and Kubernetes
Use DevOps principles with Google Cloud Platform (GCP) to develop applications and services. This book builds chapter by chapter to a complete real-life scenario, explaining how to build, monitor, and maintain a complete application using DevOps in practice.

Starting with core DevOps concepts, continuous...
Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time
Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time
Apply a methodology and practical solutions for monitoring the behavior of the Internet of Things (IoT), industrial control systems (ICS), and other critical network devices with the inexpensive Raspberry Pi. With this book, you will master passive monitoring and detection of aberrant behavior, and learn how to generate early indications...
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents

Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support.

Surviving an incident, or a...

Developing Turn-Based Multiplayer Games: with GameMaker Studio 2 and NodeJS
Developing Turn-Based Multiplayer Games: with GameMaker Studio 2 and NodeJS
Create your first turn-based multiplayer game using GameMaker Studio 2’s built-in networking functions as well as using a simple NodeJS server. This book introduces you to the complexities of network programming and communication, where the focus will be on building the game from the ground up.  You will...
Practical Android: 14 Complete Projects on Advanced Techniques and Approaches
Practical Android: 14 Complete Projects on Advanced Techniques and Approaches
Choose the best approach for your app and implement your solution quickly by leveraging complete projects. This book is a collection of practical projects that use advanced Android techniques and approaches, written by Android instructor Mark Wickham. Mark has taught a series of popular classes at Android development conferences...
unlimited object storage image
Result Page: 225 224 223 222 221 220 219 218 217 216 215 214 213 212 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy