Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Docker Cookbook: Over 100 practical and insightful recipes to build distributed applications with Docker , 2nd Edition
Docker Cookbook: Over 100 practical and insightful recipes to build distributed applications with Docker , 2nd Edition

Leverage Docker to deploying software at scale

Key Features

  • Leverage practical examples to manage containers efficiently
  • Integrate with orchestration tools such as Kubernetes for controlled deployments
  • Learn to implement best practices on improving...
Blockchain for Business 2019: A user-friendly introduction to blockchain technology and its business applications
Blockchain for Business 2019: A user-friendly introduction to blockchain technology and its business applications

Your one-stop guide to blockchain technology and its business applications

Key Features

  • Assimilate blockchain services such as Ethereum and Hyperledger to transform industrial applications
  • Know in and out of blockchain technology to understand various business use...
Ethereum Smart Contract Development: Build blockchain-based decentralized applications using solidity
Ethereum Smart Contract Development: Build blockchain-based decentralized applications using solidity

Become an Ethereum Blockchain developer using a blend of concepts and hands-on implementations

Key Features

  • Understand the Ethereum Ecosystem and its differences from its rich cousin Bitcoin
  • Explore the Solidity programming language and smart contract optimizations
  • ...
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Our self-published version of Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187) has been retired. For the current version of this title, which includes a new cover and introduction, please look for Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) available from...
SQL Server 2019 AlwaysOn: Supporting 24x7 Applications with Continuous Uptime
SQL Server 2019 AlwaysOn: Supporting 24x7 Applications with Continuous Uptime
SQL Server 2019 AlwaysOn is intended to be a quick start guide for DBAs who need to implement high availability and disaster recovery for their SQL Server workloads.

The book begins with a discussion of high availability concepts and methodologies, before a high-level overview of HA/DR technologies. Then, it’s
...
UML Distilled: A Brief Guide to the Standard Object Modeling Language (2nd Edition)
UML Distilled: A Brief Guide to the Standard Object Modeling Language (2nd Edition)
Now widely adopted as the de facto industry standard and sanctioned by the
Object Management Group, the Unified Modeling Language (UML) is a notation
all software developers need to know and understand. However, the UML is a big
language, and not all of it is equally important. The award-winning first edition of
UML Distilled
...
Database Access with Visual Basic® .NET, Third Edition
Database Access with Visual Basic® .NET, Third Edition
Database Access with Visual Basic .NET continues to use techniques developed by Jeffrey McManus that provide solutions to problems faced by developers every day. Since data access is the most used feature in corporate development, it is important for developers to understand the most effective and efficient way...
Introduction to Electrical Circuit Analysis
Introduction to Electrical Circuit Analysis

A concise and original presentation of the fundamentals for ‘new to the subject’ electrical engineers

This book has been written for students on electrical engineering courses who don’t necessarily possess prior knowledge of electrical circuits.  Based on the author’s own teaching experience, it...

Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features

  • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • ...
DevOps for Serverless Applications: Design, deploy, and monitor your serverless applications using DevOps practices
DevOps for Serverless Applications: Design, deploy, and monitor your serverless applications using DevOps practices

Set up complete CI and CD pipelines for your serverless applications using DevOps principles

Key Features

  • Understand various services for designing serverless architecture
  • Build CD pipelines using various cloud providers for your serverless applications
  • ...
Leading Transformative Change Collectively
Leading Transformative Change Collectively

This book directly helps decision-makers and change agents in companies, NGOs, and government bodies become more proficient in transformative, collaborative change in realizing the SDGs.

This practitioner’s handbook translates a systemic – and enlivening – approach to collaboration into day-to-day work...

iOS 6 Recipes: A Problem-Solution Approach
iOS 6 Recipes: A Problem-Solution Approach

iOS 6 Recipes: A Problem-Solution Approach is your code reference and guide to developing solutions on iPad, iPhone, and other iOS 6 SDK devices and platforms. This book provides in-depth code samples and discussions for scenarios that developers face every day. You'll find numerous examples of real-world cases...

unlimited object storage image
Result Page: 117 116 115 114 113 112 111 110 109 108 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy