Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Docker in Practice
Docker in Practice

Summary

An open source container system, Docker makes deploying applications painless and flexible. Docker is powerful and simple to use, and it makes life easier for developers and administrators alike providing shorter build times, fewer production bugs, and effortless application roll-out.

About...

Advanced Microservices: A Hands-on Approach to Microservice Infrastructure and Tooling
Advanced Microservices: A Hands-on Approach to Microservice Infrastructure and Tooling

Use the many types of tools required to navigate and maintain a microservice ecosystem. This book examines what is normally a complex system of interconnected services and clarifies them one at a time, first examining theoretical requirements then looking at concrete tools, configuration, and workflows.

Building out these systems...

Pro Python Best Practices: Debugging, Testing and Maintenance
Pro Python Best Practices: Debugging, Testing and Maintenance

Learn software engineering and coding best practices to write Python code right and error free. In this book you’ll see how to properly debug, organize, test, and maintain your code, all of which leads to better, more efficient coding.

Software engineering is difficult. Programs of any substantial length are...

Angular Test-Driven Development - Second Edition
Angular Test-Driven Development - Second Edition

Enhance your testing skills to build powerful and fault-free applications in Angular v4

About This Book

  • Learn test-driven development (TDD) for JavaScript
  • Improve your Karma and Protractor expertise by setting up an Angular test suite
  • A wide range of testing techniques for...
Steal This Computer Book 3: What They Won't Tell You About the Internet
Steal This Computer Book 3: What They Won't Tell You About the Internet
This offbeat, non-technical book looks at what hackers do, how they do it, and how you can protect yourself. This edition also covers rootkits, spyware, web bugs, identity theft, hacktivism, wireless hacking (wardriving), biometrics, and firewalls.

WARNING: This book is not to be used for hacking into government computers, shutting...

Simplifying JavaScript: Writing Modern JavaScript with ES5, ES6, and Beyond
Simplifying JavaScript: Writing Modern JavaScript with ES5, ES6, and Beyond

The best modern JavaScript is simple, readable, and predictable. Learn to write modern JavaScript not by memorizing a list of new syntax, but with practical examples of how syntax changes can make code more expressive. Starting from variable declarations that communicate intention clearly, see how modern principles can improve all...

The Essential Guide to CSS and HTML Web Design
The Essential Guide to CSS and HTML Web Design
The Essential Guide to CSS and HTML Web Design is a special book—it will tell you all you need to know to design great web sites that are standards compliant, usable, and look great, but not overwhelm you with waffle, theory, and obscure details. It is designed to be invaluable to you, whatever stage you are at in your...
The Annotated Build-It-Yourself Science Laboratory: Build Over 200 Pieces of Science Equipment! (Make)
The Annotated Build-It-Yourself Science Laboratory: Build Over 200 Pieces of Science Equipment! (Make)

In this book, you will learn how to make some amazing things: a carbon arc furnace, cloud chamber, mechanical stroboscope, radiometer, optical micrometer, electromagnet, microtome, spectroscope, and so many others. You will blow glass, catch bugs, and cut the ends off of power cords. You will learn how acids and alkalis taste, what lands of...

Jenkins Essentials
Jenkins Essentials

Continuous Integration – setting up the stage for a DevOps culture

About This Book

  • Explore continuous integration and automation, along with how to manage and configure Jenkins
  • Discover the process of using Jenkins to build, test, and package Java applications
  • Learn...
Compilers: Principles, Techniques, and Tools (2nd Edition)
Compilers: Principles, Techniques, and Tools (2nd Edition)

In the time since the 1986 edition of this book, the world of compiler design has changed significantly. Programming languages have evolved to present new compilation problems. Computer architectures offer a variety of resources of which the compiler designer must take advantage. Perhaps most interestingly, the venerable technology of...

Going to War: Creating Computer War Games
Going to War: Creating Computer War Games

Do you want to learn how to create computer war games, but don't know how to get started or don't have any experience with game programming? "Going to War: Creating Computer War Games" shows you how to use the drag-and-drop game engine, Multimedia Fusion 2, to make your very own computer war games to play and share. After an...

Buffer Overflow Attacks
Buffer Overflow Attacks
Buffer overflows. In most information technology circles these days, the term buffer overflows has become synonymous with vulnerabilities or in some cases, exploits. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly, and have...
Result Page: 18 17 16 15 14 13 12 11 10 9 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy