Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.
Key Features
  • Intelligence processes and procedures for response mechanisms
  • Master F3EAD to drive processes based on intelligence
  • Threat modeling and intelligent frameworks
  • ...
Python Interviews: Discussions with Python Experts
Python Interviews: Discussions with Python Experts

Mike Driscoll takes you on a journey talking to a hall-of-fame list of truly remarkable Python experts. You'll be inspired every time by their passion for the Python language, as they share with you their experiences, contributions, and careers in Python.

Key Features

  • Hear from these...
PostgreSQL 10 High Performance: Expert techniques for query optimization, high availability, and efficient database maintenance
PostgreSQL 10 High Performance: Expert techniques for query optimization, high availability, and efficient database maintenance

Leverage the power of PostgreSQL 10 to design, administer and maintain a high-performance database solution

Key Features

  • Obtain optimal PostgreSQL 10 database performance, ranging from initial design to routine maintenance
  • Fine tune the performance of your queries and...
Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps
Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps

Protect your organization's security at all levels by introducing the latest strategies for securing DevOps

Key Features

  • Integrate security at each layer of the DevOps pipeline
  • Discover security practices to protect your cloud services by detecting fraud and...
Hands-On TypeScript for C# and .NET Core Developers: Transition from C# to TypeScript 3.1 and build applications with ASP.NET Core 2
Hands-On TypeScript for C# and .NET Core Developers: Transition from C# to TypeScript 3.1 and build applications with ASP.NET Core 2

Discover how TypeScript allows you to build modern client-rich applications, thanks to its object-oriented capabilities and third-party tools like Angular and Web APIs

Key Features

  • Make a seamless transition to using TypeScript 3.1 in your development stack
  • Work with...
Qt 5 Projects: Develop cross-platform applications with modern UIs using the powerful Qt framework
Qt 5 Projects: Develop cross-platform applications with modern UIs using the powerful Qt framework

Design, build, and deploy powerful applications with amazing user interfaces on embedded, mobile, and desktop platforms

Key Features

  • Easily compile, run, and debug your applications from the powerful Qt Creator IDE
  • Future-proof your applications with Qt Test and modern...
101 UX Principles: A Definitive Design Guide
101 UX Principles: A Definitive Design Guide

The most important things you need to know about creating successful user experiences

We want our UX to be brilliant. We want to create stunning user experiences. We want our UX to drive the success of our business with useful and usable software products. This book draws on the wisdom and training of Jakob...

Identity with Windows Server 2016: Microsoft 70-742 MCSA Exam Guide: Deploy, configure, and troubleshoot identity services and Group Policy in Windows Server 2016
Identity with Windows Server 2016: Microsoft 70-742 MCSA Exam Guide: Deploy, configure, and troubleshoot identity services and Group Policy in Windows Server 2016

Equip yourself with the most complete and comprehensive preparation experience for Identity with Windows Server 2016: Microsoft 70-742 exam.

Key Features

  • Helps you demonstrate real-world mastery of Windows Server 2016 identity features and functionality and prepare for 70-742
  • ...
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
Learning Python Networking: A complete guide to build and deploy strong networking capabilities using Python 3.7 and Ansible , 2nd Edition
Learning Python Networking: A complete guide to build and deploy strong networking capabilities using Python 3.7 and Ansible , 2nd Edition

Achieve improved network programmability and automation by leveraging powerful network programming concepts, algorithms, and tools

Key Features

  • Deal with remote network servers using SSH, FTP, SNMP and LDAP protocols.
  • Design multi threaded and event-driven architectures...
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
Django RESTful Web Services: The easiest way to build Python RESTful APIs and web services with Django
Django RESTful Web Services: The easiest way to build Python RESTful APIs and web services with Django

Design, build and test RESTful web services with the Django framework and Python

Key Features

  • Create efficient real-world RESTful web services with the latest Django framework
  • Authenticate, secure, and integrate third-party packages efficiently in your Web Services
  • ...
unlimited object storage image
Result Page: 218 217 216 215 214 213 212 211 210 209 208 207 206 205 204 203 202 201 200 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy