|
|
|
|
Docker in Practice
Summary
An open source container system, Docker makes deploying applications painless and flexible. Docker is powerful and simple to use, and it makes life easier for developers and administrators alike providing shorter build times, fewer production bugs, and effortless application roll-out.
About... | | The Debugger's HandbookFocused on the best practices for writing code as well as on the methods to perform more effective debugging, The Debugger's Handbook promotes a natural debugging approach to writing code. The author begins by examining and concretely defining just what a bug is, what circumstances are more prone to producing bugs, and how to avoid them from the... | | Excel VBA Programming For Dummies
Take your data analysis and Excel programming skills to new heights
In order to take Excel to the next level, you need to understand and implement the power of Visual Basic for Applications (VBA). This 4th edition of Excel VBA Programming For Dummies introduces you to a wide array of new Excel options,... |
|
Working with Microsoft® Visual Studio® 2005 Team SystemLearn how to collaborate and streamline your development process using Visual Studio Team System.
This overview of Microsoft Visual Studio 2005 Team System offers practical information and role-based guidance to get key members of your software development team working together. With insights from the Visual Studio... | | Microsoft Forefront Security Administration GuideMicrosoft Forefront is a comprehensive suite of security products that will provide companies with multiple layers of defense against threats. Computer and Network Security is a paramount issue for companies in the global marketplace. Businesses can no longer afford for their systems to go down because of viruses, malware, bugs, trojans, or other... | | Steal This Computer Book 3: What They Won't Tell You About the InternetThis offbeat, non-technical book looks at what hackers do, how they do it, and how you can protect yourself. This edition also covers rootkits, spyware, web bugs, identity theft, hacktivism, wireless hacking (wardriving), biometrics, and firewalls.
WARNING: This book is not to be used for hacking into government computers, shutting... |
|
|
|
|
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 |