 |
|
|
 Defensive Security Handbook: Best Practices for Securing Infrastructure
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook... |  |  Learning Behavior-driven Development with JavaScript
Create powerful yet simple-to-code BDD test suites in JavaScript using the most popular tools in the community
About This Book
-
Master the most popular testing tools in the JavaScript ecosystem, such as CucumberJS, Mocha, SinonJS, and more.
-
Learn how Behavior-driven development can help...
|  |  Microservices From Day One: Build robust and scalable software from the start
Learn what a microservices architecture is, its advantages, and why you should consider using one when starting a new application. The book describes how taking a microservices approach from the start helps avoid the complexity and expense of moving to a service-oriented approach after applications reach a critical code base size or... |
|
 Stack Frames: A Look From Inside
Teaches you exactly how program memory content and organization is vital for computer security, especially Unix-like operating systems. You will learn how it is manipulated to take control of a computer system, as well as the countermeasures that system designers set up to avoid this. Neither a guide for hackers nor an all-out theory book,... |  |  Creating Blogs with Jekyll
Learn to create your own blog using the Jekyll static site generator. You’ll start with a simple template, add new features to it, automate any maintenance, attach social sharing, and begin writing. By the end of Creating Blogs with Jekyll, you will be able to create custom blogs with Jekyll, update the content with ease, and... |  |  Oracle Application Express Administration: For DBAs and Developers
Succeed in managing Oracle Application Express (APEX) environments. This book focuses on creating the right combination of scalability, high-availability, backup and recovery, integrity, and resource control. The book covers everything from simple to enterprise-class deployments, with emphasis on enterprise-level requirements and coverage of... |
|
|
Result Page: 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 |