Home | Amazing | Today | Tags | Publishers | Years | Search 
Rust Standard Library Cookbook: Over 75 recipes to leverage the power of Rust
Rust Standard Library Cookbook: Over 75 recipes to leverage the power of Rust

Explore the Rust Standard library and compose algorithms with minimal dependency on external libraries

Key Features

  • Develop high-quality, fast, and portable applications by leveraging the power of Rust's Standard library.
  • Practical recipes that will help you work with...
Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats
Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats

A comprehensive guide to mastering the art of preventing your Linux system from getting compromised.

Key Features

  • Leverage this guide to confidently deliver a system that reduces the risk of being hacked
  • Perform a number of advanced Linux security techniques such as...
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software

Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack.

The most common culprit of...

Let’s Build a Multiplayer Phaser Game: With TypeScript, Socket.IO, and Phaser
Let’s Build a Multiplayer Phaser Game: With TypeScript, Socket.IO, and Phaser

Create a fully working multiplayer game from scratch using TypeScript, Socket.IO, and the community edition of Phaser.js. You will achieve amazing feats in the browser without having to install any software. This book teaches you how to use the Phaser game engine APIs to tap into physics, and how to utilize HUD information and...

Fundamentals of Data Visualization: A Primer on Making Informative and Compelling Figures
Fundamentals of Data Visualization: A Primer on Making Informative and Compelling Figures

Effective visualization is the best way to communicate information from the increasingly large and complex datasets in the natural and social sciences. But with the increasing power of visualization software today, scientists, engineers, and business analysts often have to navigate a bewildering array of visualization...

Learn FileMaker Pro 19: The Comprehensive Guide to Building Custom Databases
Learn FileMaker Pro 19: The Comprehensive Guide to Building Custom Databases

Discover how easy it is to create multi-user, cross-platform custom solutions with FileMaker Pro, the relational database platform published by Apple subsidiary Claris International, Inc. Meticulously rewritten with clearer lessons, more real-world examples and updated to include feature changes introduced in recent versions, this...

Linux: Linux Command Lines and Shell Scripting
Linux: Linux Command Lines and Shell Scripting
When you search for a book on Linux programming, you are aiming to get the best deal. In a technological world that is progressing quickly, you need to understand Linux. The question is whether you can carve out enough time to read lengthy books on Linux that are filled to the brim with a lot of unnecessary details and jargon and take a...
Hands-on Kubernetes on Azure: Use Azure Kubernetes Service to automate management, scaling, and deployment of containerized applications, 3rd Edition
Hands-on Kubernetes on Azure: Use Azure Kubernetes Service to automate management, scaling, and deployment of containerized applications, 3rd Edition

Understand the fundamentals of Kubernetes deployment on Azure with a learn-by-doing approach

Key Features

  • Get to grips with the fundamentals of containers and Kubernetes
  • Deploy containerized applications using the Kubernetes platform
  • Learn how you can...
Python Web Penetration Testing Cookbook
Python Web Penetration Testing Cookbook

Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing

About This Book

  • Get useful guidance on writing Python scripts and using libraries to put websites and web apps through their paces
  • Find the script you need to deal with any...
1,000 Type Treatments: From Script to Serif, Letterforms Used to Perfection
Pro Microsoft Hyper-V 2019: Practical Guidance and Hands-On Labs
Pro Microsoft Hyper-V 2019: Practical Guidance and Hands-On Labs
Successfully create and manage your Hyper-V environment without any of the marketing fluff. This book's lab-driven, hands-on approach will get you up and running as quickly and efficiently as possible.

Virtualization is the cornerstone of today’s data center.  As a modern-day IT pro, you are required...
Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy