Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced API Security: OAuth 2.0 and Beyond
Advanced API Security: OAuth 2.0 and Beyond
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs.
Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of
...
Docker on Windows: From 101 to production with Docker on Windows, 2nd Edition
Docker on Windows: From 101 to production with Docker on Windows, 2nd Edition

Learn how to run new and old applications in Docker containers on Windows - modernizing the architecture, improving security and maximizing efficiency.

Key Features

  • Run .NET Framework and .NET Core apps in Docker containers for efficiency, security and portability
  • Design...
Angular 6 for Enterprise-Ready Web Applications: Deliver production-ready and cloud-scale Angular web apps
Angular 6 for Enterprise-Ready Web Applications: Deliver production-ready and cloud-scale Angular web apps

A hands-on guide with a minimalist and flexible approach that enables quick learning and rapid delivery of cloud-ready enterprise applications with Angular 6

Key Features

  • Explore tools and techniques to push your web app to the next level
  • Master Angular app design and...
Blockchain Quick Reference: A guide to exploring decentralized Blockchain application development
Blockchain Quick Reference: A guide to exploring decentralized Blockchain application development

Understand the Blockchain revolution and get to grips with Ethereum, Hyperledger Fabric, and Corda.

Key Features

  • Resolve common challenges and problems faced in the Blockchain domain
  • Study architecture, concepts, terminologies, and Dapps
  • Make smart choices...
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

Aligning Business Strategies and Analytics: Bridging Between Theory and Practice (Advances in Analytics and Data Science, 1)
Aligning Business Strategies and Analytics: Bridging Between Theory and Practice (Advances in Analytics and Data Science, 1)
This book examines issues related to the alignment of business strategies and analytics. Vast amounts of data are being generated, collected, stored, processed, analyzed, distributed and used at an ever-increasing rate by organizations. Simultaneously, managers must rapidly and thoroughly understand the factors driving their business....
Building Django 2.0 Web Applications: Create enterprise-grade, scalable Python web applications easily with Django 2.0
Building Django 2.0 Web Applications: Create enterprise-grade, scalable Python web applications easily with Django 2.0

Go from the initial idea to a production-deployed web app using Django 2.0.

Key Features

  • A beginners guide to learning python's most popular framework, Django
  • Build fully featured web projects in Django 2.0 through examples.
  • Deploy web applications in...
Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer
Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer

Leverage the power of Hyperledger Fabric to develop Blockchain-based distributed ledgers with ease

Key Features

  • Write your own chaincode/smart contracts using Golang on hyperledger network
  • Build and deploy decentralized applications (DApps)
  • Dive into real...
CCIE Self-Study: CCIE Security Exam Certification Guide, Second Edition
CCIE Self-Study: CCIE Security Exam Certification Guide, Second Edition
The Cisco authorized self-study test preparation guide for CCIE Security 2.0 350-018 written exam The only official, Cisco endorsed study guide for the CCIE Security 2.0 written exam Includes best-of-breed self-assessment series features, including a CD-ROM test engine, "Do I Know This Already?" quizzes, topic lists/foundation...
Building Modern Web Applications Using Angular
Building Modern Web Applications Using Angular

Key Features

  • Learn about the core building blocks of Angular
  • Build and architect high performance web applications
  • Implement the latest JavaScript concepts in ECMAScript 2015, ECMAScript 2016, and TypeScript
  • Leverage the latest Angular features to get the most out of your web...
MPLS Fundamentals
MPLS Fundamentals
As an escalation engineer, I experienced the boom of Multiprotocol Label Switching (MPLS) networking first hand. I saw the first trials of MPLS in service provider networks and saw MPLS successfully expanding further into enterprise networks. In addition, I witnessed new MPLS technologies coming into existence, which the networking industry...
Professional Cross-Platform Mobile Development in C#
Professional Cross-Platform Mobile Development in C#

PEOPLE TAKE UP MOBILE DEVELOPMENT these days for a lot of reasons. For some it is all about learning something new, but for many it comes out of necessity of a job or career. Perhaps you see mobile development as the next big thing, just like client-server development was in the 1990s, or web development became in the 2000s. Maybe...

unlimited object storage image
Result Page: 228 227 226 225 224 223 222 221 220 219 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy