Home | Amazing | Today | Tags | Publishers | Years | Search 
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Beginning DevOps with Docker: Automate the deployment of your environment with the power of the Docker toolchain
Beginning DevOps with Docker: Automate the deployment of your environment with the power of the Docker toolchain
It can be tough to roll out a pre-configured environment if you don't know what you're doing. We'll show you how to streamline your service options with Docker, so that you can scale in an agile and responsive manner.
Key Features
  • Learn how to structure your own Docker containers
  • ...
Mastering Elixir: Build and scale concurrent, distributed, and fault-tolerant applications
Mastering Elixir: Build and scale concurrent, distributed, and fault-tolerant applications

Leverage the power of Elixir programming language to solve practical problems associated with scalability, concurrency, fault tolerance, and high availability.

Key Features

  • Enhance your Elixir programming skills using its powerful tools and abstractions
  • Discover how to...
Next.js Quick Start Guide: Server-side rendering done right
Next.js Quick Start Guide: Server-side rendering done right

Create, build and deploy universal JavaScript applications using Next.js

Key Features

  • Work with the entire tool-chain for developing universal Javascript applications with Next.js
  • A straightforward guide to implementing server-side rendering
  • Use Next.js to...
Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names
Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names

This book will give you an all encompassing view of the domain name ecosystem combined with a comprehensive set of operations strategies.

Key Features

  • Manage infrastructure, risk, and management of DNS name servers. Get hands-on with factors like types of name servers, DNS queries and and...
Blockchain for Enterprise: Build scalable blockchain applications with privacy, interoperability, and permissioned features
Blockchain for Enterprise: Build scalable blockchain applications with privacy, interoperability, and permissioned features

Implement blockchain principles in your choice of domain using Ethereum

Key Features

  • Build permissioned enterprise-grade blockchain applications from scratch
  • Implement Blockchain-as-a-Service to enterprises in terms of deployment and security
  • Achieve...
Python Deep Learning Projects: 9 projects demystifying neural network and deep learning models for building intelligent systems
Python Deep Learning Projects: 9 projects demystifying neural network and deep learning models for building intelligent systems

Insightful projects to master deep learning and neural network architectures using Python and Keras

Key Features

  • Explore deep learning across computer vision, natural language processing (NLP), and image processing
  • Discover best practices for the training of deep neural...
Computer Vision with OpenCV 3 and Qt5: Build visually appealing, multithreaded, cross-platform computer vision applications
Computer Vision with OpenCV 3 and Qt5: Build visually appealing, multithreaded, cross-platform computer vision applications

Blend the power of Qt with OpenCV to build cross-platform computer vision applications

Key Features

  • Start creating robust applications with the power of OpenCV and Qt combined
  • Learn from scratch how to develop cross-platform computer vision applications
  • ...
Practical Guide to Salesforce Communities: Building, Enhancing, and Managing an Online Community with Salesforce Community Cloud
Practical Guide to Salesforce Communities: Building, Enhancing, and Managing an Online Community with Salesforce Community Cloud

Whether you are brand new to the world of Salesforce communities or you are looking to take your Community Cloud knowledge to the next level, this detailed guide will help you to build and manage a Salesforce community by leveraging the declarative power of the platform with clicks, not code.

Each Salesforce community is...

Internet of Things for Architects: Architecting IoT solutions by implementing sensors, communication infrastructure, edge computing, analytics, and security
Internet of Things for Architects: Architecting IoT solutions by implementing sensors, communication infrastructure, edge computing, analytics, and security

Learn to design, implement and secure your IoT infrastructure

Key Features

  • Build a complete IoT system that is the best fit for your organization
  • Learn about different concepts, technologies, and tradeoffs in the IoT architectural stack
  • Understand the...
Odoo 11 Development Cookbook: Over 120 unique recipes to build effective enterprise and business applications
Odoo 11 Development Cookbook: Over 120 unique recipes to build effective enterprise and business applications

Create fast and efficient server-side applications using the latest features of Odoo v11

Key Features

  • Get the most up-to-date guide on Odoo 11 to create custom and reusable modules
  • Interconnect your application with other systems by implementing web APIs
  • ...
Cloud Native Architectures: Design high-availability and cost-effective applications for the cloud
Cloud Native Architectures: Design high-availability and cost-effective applications for the cloud

Learn and understand the need to architect cloud applications and migrate your business to cloud efficiently

Key Features

  • Understand the core design elements required to build scalable systems
  • Plan resources and technology stacks effectively for high security and fault...
Result Page: 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy