Home | Amazing | Today | Tags | Publishers | Years | Search 
Complete Vue.js 2 Web Development: Practical guide to building end-to-end web development solutions with Vue.js 2
Complete Vue.js 2 Web Development: Practical guide to building end-to-end web development solutions with Vue.js 2

Become a pro in creating modern interactive web applications using this JavaScript framework

Key Features

  • Explore the exciting features of Vue.js 2 through interesting examples and practical recipes
  • Craft highly modular applications using design patterns and the component...
Oracle Incident Response and Forensics: Preparing for and Responding to Data Breaches
Oracle Incident Response and Forensics: Preparing for and Responding to Data Breaches
Take the right steps when a breach of your Oracle Database environment becomes known or suspected. You will learn techniques for discerning how an attacker got in, what data they saw, and what else they might have done. 

This book helps you understand forensics in relation to Oracle Database, and the tools and
...
Artificial Intelligence and Machine Learning Fundamentals: Develop real-world applications powered by the latest AI advances
Artificial Intelligence and Machine Learning Fundamentals: Develop real-world applications powered by the latest AI advances

Create AI applications in Python and lay the foundations for your career in data science

Key Features

  • Practical examples that explain key machine learning algorithms
  • Explore neural networks in detail with interesting examples
  • Master core AI concepts with...
IoT, AI, and Blockchain for .NET: Building a Next-Generation Application from the Ground Up
IoT, AI, and Blockchain for .NET: Building a Next-Generation Application from the Ground Up
Create applications using Industry 4.0. Discover how artificial intelligence (AI) and machine learning (ML) capabilities can be enhanced using the Internet of things (IoT) and secured using Blockchain, so your latest app can be not just smarter but also more connected and more secure than ever before. This book covers the latest...
Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps
Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps

Protect your organization's security at all levels by introducing the latest strategies for securing DevOps

Key Features

  • Integrate security at each layer of the DevOps pipeline
  • Discover security practices to protect your cloud services by detecting fraud and...
Dynamic SQL: Applications, Performance, and Security in Microsoft SQL Server
Dynamic SQL: Applications, Performance, and Security in Microsoft SQL Server

Take a deep dive into the many uses of dynamic SQL in Microsoft SQL Server. This edition has been updated to use the newest features in SQL Server 2016 and SQL Server 2017 as well as incorporating the changing landscape of analytics and database administration. Code examples have been updated with new system objects and functions to...

Networking Fundamentals
Networking Fundamentals

A clear and concise resource on Windows networking, perfect for IT beginners

Did you know that nearly 85% of IT support roles require a good understanding of networking concepts? If you are looking to advance your IT career, you will need a foundational understanding of Windows networking. Network...

CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
The only official study guide for the new CCSP exam

(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you...

Hiding in Plain Sight: Deceptive Tactics and the Criminal Victimization Process
Hiding in Plain Sight: Deceptive Tactics and the Criminal Victimization Process
This book examines the role of deceptive tactics in the criminal victimization process, showing how various forms of manipulative aggression can help disguise dangerous advances. The author approaches crime victimization as the final stage in a purposeful, predictable, dynamic, and progressively dangerous process involving...
Software Project Estimation: Intelligent Forecasting, Project Control, and Client Relationship Management
Software Project Estimation: Intelligent Forecasting, Project Control, and Client Relationship Management
Have you been on projects where halfway down the road it seems increasingly unlikely that you will finish as desired, but you can’t put your finger on it and simply push through with a growing resentment? Have you been in meetings where scope discussions get increasingly difficult and depressing, ultimately sucking the...
Get Your Life Together(ish): A No-Pressure Guide for Real-Life Self-Growth
Get Your Life Together(ish): A No-Pressure Guide for Real-Life Self-Growth
Achieve your goals—no matter how big or small—with these 50 simple challenges that actually fit into your life, using this accessible and self-paced approach to self-improvement.

Looking to improve your relationships? Be more confident at work? Eat less sugar? However you want to be better, Get Your
...
Belonging: Feeling Loved, Comfortable, and Safe
Belonging: Feeling Loved, Comfortable, and Safe
Personal connections that leave people feeling a sense of being cared about and valued, with a true sense of belonging and being wanted, is something most of us include when listing the kinds of things that lead to feeling happy and fulfilled. Yet many of us don't have the kinds of close relationships that leave us feeling deeply cared about...
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy