Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced API Security: OAuth 2.0 and Beyond
Advanced API Security: OAuth 2.0 and Beyond
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs.
Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of
...
DevOps with Kubernetes: Accelerating software delivery with container orchestrators
DevOps with Kubernetes: Accelerating software delivery with container orchestrators

Learn to implement DevOps using Docker & Kubernetes.

About This Book

  • Learning DevOps, container, and Kubernetes within one book.
  • Leverage Kubernetes as a platform to deploy, scale, and run containers efficiently.
  • A practical guide towards container management and...
Forecasting With The Theta Method: Theory and Applications
Forecasting With The Theta Method: Theory and Applications

The first book to be published on the Theta method, outlining under what conditions the method outperforms other forecasting methods

This book is the first to detail the Theta method of forecasting – one of the most difficult-to-beat forecasting benchmarks, which topped the biggest forecasting...

LabVIEW Graphical Programming
LabVIEW Graphical Programming
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

LabVIEW is an award-winning programming language that allows engineers to create "virtual" instruments on their...

Practice Makes Perfect: Basic English, Premium Third Edition
Practice Makes Perfect: Basic English, Premium Third Edition
Get the skills you need to read and speak English with confidence!


Learn how to read and speak English with this easy-to-use workbook. Dozens of manageable, bite-sized lessons take you through the basics of the English language. Three-page units cover each subject, which can be completed in just 20
...
Deep Learning with TensorFlow: Explore neural networks and build intelligent systems with Python, 2nd Edition
Deep Learning with TensorFlow: Explore neural networks and build intelligent systems with Python, 2nd Edition

Delve into neural networks, implement deep learning algorithms, and explore layers of data abstraction with the help of TensorFlow.

Key Features

  • Learn how to implement advanced techniques in deep learning with Google's brainchild, TensorFlow
  • Explore deep neural...
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it
Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it

Understanding the concept Dark Web and Dark Net to utilize it for effective cybersecurity

Key Features

  • Understand the concept of Dark Net and Deep Web
  • Use Tor to extract data and maintain anonymity
  • Develop a security framework using Deep web evidences
  • ...
Practical SQL: A Beginner's Guide to Storytelling with Data
Practical SQL: A Beginner's Guide to Storytelling with Data

Practical SQL is an approachable and fast-paced guide to SQL (Structured Query Language), the standard programming language for defining, organizing, and exploring data in relational databases. The book focuses on using SQL to find the story your data tells, with the popular open-source database PostgreSQL and the pgAdmin interface as...

CORS in Action: Creating and consuming cross-origin APIs
CORS in Action: Creating and consuming cross-origin APIs

Summary

CORS in Action introduces Cross-Origin Resource Sharing (CORS) from both the server and the client perspective. It starts with the basics: how to make CORS requests and how to implement CORS on the server. It then explores key details such as performance, debugging, and security. API authors will...

Spectrum-Aware Mobile Computing: Convergence of Cloud Computing and Cognitive Networking (Signals and Communication Technology)
Spectrum-Aware Mobile Computing: Convergence of Cloud Computing and Cognitive Networking (Signals and Communication Technology)

This book presents solutions to the problems arising in two trends in mobile computing and their intersection: increased mobile traffic driven mainly by sophisticated smart phone applications; and the issue of user demand for lighter phones, which cause more battery power constrained handhelds to offload computations to resource...

When Can Oil Economies Be Deemed Sustainable? (The Political Economy of the Middle East)
When Can Oil Economies Be Deemed Sustainable? (The Political Economy of the Middle East)
This open access book questions the stereotype depicting all Gulf (GCC) economies as not sustainable, and starts a critical discussion of what these economies and polities should do to guarantee themselves a relatively stable future.

Volatile international oil markets and the acceleration
...
unlimited object storage image
Result Page: 350 349 348 347 346 345 344 343 342 341 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy