 |
|
 Using Docker: Developing and Deploying Software with Containers
Docker containers offer simpler, faster, and more robust methods for developing, distributing, and running software than previously available. With this hands-on guide, you’ll learn why containers are so important, what you’ll gain by adopting Docker, and how to make it part of your development... |  |  Medical Malpractice: A Physician's Sourcebook
Books such as this one are deceptively difficult to create. The general subject is neither happy, nor easy, nor most anyone’s idea of fun. M- practice litigation, however, has become a central fact of existence in the practice of medicine today. This tsunami of lawsuits has led to a high volume of irreconcilable rhetoric and ultimately... |  |  Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.
Personal Cybersecurity addresses the needs of individual users at work and at home. This book... |
|
 Digital Privacy and Security Using Windows: A Practical Guide
Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques.
This book teaches you how to secure your online identity and personal... |  |  CEH v9: Certified Ethical Hacker Version 9 Study Guide
The ultimate preparation guide for the unique CEH exam.
The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using concise,... |  |  Nutrition and AIDS, Second Edition (Modern Nutrition)
Evidence shows that nutritional supports can help maintain health in the HIV-infected patient by replacing lost nutrients, compensating for nutritional damage done by the retrovirus-induced immunodeficiency, and stimulating the remaining immune system and cells for better host defenses.
This new edition of Nutrition and AIDS... |
|
|
|
Result Page: 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 |