Create generic pipelines to reduce your overall DevOps workload and allow your team to deliver faster. This book helps you get up to speed on the pros and cons of generic pipeline methodology, and learn to combine shell scripts and Docker to build generic pipelines.
Become an effective cyber forensics investigator and gain a collection of practical, efficient techniques to get the job done. Diving straight into a discussion of anti-forensic techniques, this book shows you the many ways to effectively detect them. Now that you know what you are looking for, you’ll shift your focus to...
Implement natural language processing applications with Python using a problem-solution approach. This book has numerous coding exercises that will help you to quickly deploy natural language processing techniques, such as text classification, parts of speech identification,...
The role of the business analyst sits at the intersection of business operations, technology, and change management. The job requires a plethora of both soft skills and technical skills, as it must translate the needs of business users into action items for functional applications. On top of this, in-demand technologies...
From American Grit co-star, former Marine Gunnery Sergeant Tee Marie Hanible comes the story of how she became a warrior...and how you can do it, too.
In The Warrior Code, entrepreneur, philanthropist, reality star, and retired Gunnery Sergeant Tee Marie Hanible serves up eleven principles to awaken...
Believe it or not, there is a striking similarity between medieval castle design and how we protect networks and data in the 21st century. By examining how our ancestors fought off invading armies, it becomes much easier to understand the latest strategies for keeping hackers at-bay. This book is designed for anyone who wants to understand how...
This book examines issues related to the alignment of business strategies and analytics. Vast amounts of data are being generated, collected, stored, processed, analyzed, distributed and used at an ever-increasing rate by organizations. Simultaneously, managers must rapidly and thoroughly understand the factors driving their business....
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs.
Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of...
Explore the designs of the Spring MVC and WebFlux frameworks, and apply similar designs and techniques to your own code. Along with detailed analysis of the code and functionality, this book includes numerous tips and tricks to help you get the most out of Spring MVC, WebFlux, and Java-based web application development in general...
Harness the untapped potential of combining a decentralized Internet of Things (IoT) with the ability to make predictions on real-world fuzzy data. This book covers the theory behind machine learning models and shows you how to program and assemble a voice-controlled security.