Begin to Code with Python
Become a Python programmer–and have fun doing it!
Start writing software that solves real problems, even if you have absolutely no programming experience! This friendly, easy, full-color book puts you in total control of your own learning, empowering you to build...
Learning Docker - Second Edition: Build, ship, and scale faster
Docker lets you create, deploy, and manage your applications anywhere at anytime – flexibility is key so you can deploy stable, secure, and scalable app containers across a wide variety of platforms and delve into microservices architecture
About This Book
This up-to-date edition...
Big Data Visualization
Learn effective tools and techniques to separate big data into manageable and logical components for efficient data visualization About This Book This unique guide teaches you how to visualize your cluttered, huge amounts of big data with ease It is rich with ample options and solid use cases for big data visualization, and is a must-have book... Agile Model-Based Development Using UML-RSDS
This book describes the concepts and application of model-based development (MBD), model transformations, and Agile MBD to a wide range of software systems. It covers systems requirements engineering, system specification and design, verification, reuse, and system composition in the context of Agile MBD. Examples of applications in...
A Practical Introduction to Enterprise Network and Security Management
Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a solid ground for a successful...
Purchase of the print book includes a free eBook in PDF,...
Penetration Testing Basics: A Quick-Start Guide to Breaking into Systems
Learn how to break systems, networks, and software in order to determine where the bad guys might get in. Once the holes have been determined, this short book discusses how they can be fixed. Until they have been located, they are exposures to your organization. By reading Penetration Testing Basics
|Result Page: 749 748 747 746 745 744 743 742 741 740 |