Home | Amazing | Today | Tags | Publishers | Years | Search 
Accelerating Development Velocity Using Docker: Docker Across Microservices
Accelerating Development Velocity Using Docker: Docker Across Microservices

Discover how a software engineer can leverage Docker in order to expedite development velocity. This book focuses on the fundamental concepts this program is built upon and explores how it can help you get your services up and running inside Docker containers. You'll also review tips on how to debug microservices applications...

System Center 2016 Virtual Machine Manager Cookbook - Third Edition: Design, configure, and manage an efficient virtual infrastructure with VMM in System Center 2016
System Center 2016 Virtual Machine Manager Cookbook - Third Edition: Design, configure, and manage an efficient virtual infrastructure with VMM in System Center 2016

Maximize your administration skills effectively and efficiently

Key Features

  • Implement cost-effective virtualization solutions for your organization with actionable recipes
  • Explore the concepts of VMM with real-world use cases
  • Use the latest features with...
Hands-On Neural Networks with Keras: Design and create neural networks using deep learning and artificial intelligence principles
Hands-On Neural Networks with Keras: Design and create neural networks using deep learning and artificial intelligence principles

Your one-stop guide to learning and implementing artificial neural networks with Keras effectively

Key Features

  • Design and create neural network architectures on different domains using Keras
  • Integrate neural network models in your applications using this highly practical...
Beginning Serverless Computing: Developing with Amazon Web Services, Microsoft Azure, and Google Cloud
Beginning Serverless Computing: Developing with Amazon Web Services, Microsoft Azure, and Google Cloud
Learn the basics of serverless computing and how to develop event-driven architectures with the three major cloud platforms: Amazon Web Services, Microsoft Azure, and Google Cloud. This hands-on guide dives into the foundations of serverless computing, its use cases, and how to apply it using developer tools such as Node.js, Visual...
Hands-On Cybersecurity for Architects: Plan and design robust security architectures
Hands-On Cybersecurity for Architects: Plan and design robust security architectures

Gain practical experience of creating security solutions and designing secure, highly available, and dynamic infrastructure for your organization

Key Features

  • Architect complex security structures using standard practices and use cases
  • Integrate security with any...
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features

  • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • ...
Git Version Control Cookbook: Leverage version control to transform your development workflow and boost productivity, 2nd Edition
Git Version Control Cookbook: Leverage version control to transform your development workflow and boost productivity, 2nd Edition

A series of practical recipes to simplify the Git learning experience and increase your productivity when using Git version control

Key Features

  • Explore practical recipes to use Git's most advanced features
  • Learn how Git references its objects and how history is...
Mastering Machine Learning Algorithms: Expert techniques to implement popular machine learning algorithms and fine-tune your models
Mastering Machine Learning Algorithms: Expert techniques to implement popular machine learning algorithms and fine-tune your models

Explore and master the most important algorithms for solving complex machine learning problems.

Key Features

  • Discover high-performing machine learning algorithms and understand how they work in depth
  • One-stop solution to mastering supervised, unsupervised, and...
Artificial Intelligence By Example: Develop machine intelligence from scratch using real artificial intelligence use cases
Artificial Intelligence By Example: Develop machine intelligence from scratch using real artificial intelligence use cases

Be an adaptive thinker that leads the way to Artificial Intelligence

Key Features

  • AI-based examples to guide you in designing and implementing machine intelligence
  • Develop your own method for future AI solutions
  • Acquire advanced AI, machine learning, and...
Mastering Reverse Engineering: Re-engineer your ethical hacking skills
Mastering Reverse Engineering: Re-engineer your ethical hacking skills

Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses.

Key Features

  • Analyze and improvise software and hardware with real-world examples
  • Learn advanced debugging and patching...
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python

Become a master at penetration testing using machine learning with Python

Key Features

  • Identify ambiguities and breach intelligent security systems
  • Perform unique cyber attacks to breach robust systems
  • Learn to leverage machine learning algorithms
  • ...
Burp Suite Cookbook: Practical recipes to help you master web penetration testing with Burp Suite
Burp Suite Cookbook: Practical recipes to help you master web penetration testing with Burp Suite

Get hands-on experience of using Burp Suite to execute attacks and perform web assessments

Key Features

  • Use tools in Burp Suite to meet your web infrastructure security demands
  • Configure Burp to fine-tune the suite of tools specific to the target
  • Use Burp...
Result Page: 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy