Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Amazon S3 Cookbook
Amazon S3 Cookbook

Over 30 hands-on recipes that will get you up and running with Amazon Simple Storage Service (S3) efficiently

About This Book

  • Learn how to store, manage, and access your data with AWS SDKs
  • Study the Amazon S3 pricing model and learn how to calculate costs by simulating practical...
Amazon Web Services for Mobile Developers: Building Apps with AWS
Amazon Web Services for Mobile Developers: Building Apps with AWS

A practical, real-world introduction to AWS tools and concepts

Amazon Web Services for Mobile Developers: Building Apps with AWS presents a professional view of cloud computing and AWS for experienced iOS/Android developers and technical/solution architects. Cloud computing is a rapidly expanding ecosystem, and...

IT Auditing: Using Controls to Protect Information Assets
IT Auditing: Using Controls to Protect Information Assets

Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and...

Pro PowerShell for Amazon Web Services: DevOps for the AWS Cloud
Pro PowerShell for Amazon Web Services: DevOps for the AWS Cloud

Pro PowerShell for Amazon Web Services is written specifically for Windows professionals who already know PowerShell and want to learn to host Windows workloads in the Amazon Elastic Cloud Compute (EC2) cloud service. The cloud offers information technology workers significant cost savings and agility unimaginable even just a few...

CISSP For Dummies (Computer/Tech)
CISSP For Dummies (Computer/Tech)

Cramming for the CISSP exam? This friendly test-prep guide makes studying a snap! Prepared by two CISSP-certified experts, it gets you up to speed on the latest changes to the exam and gives you proven test-taking tips. You’ll find complete coverage of all ten domains of the (ISC)2 Common Body of Knowledge to help you pass with flying...

Google Cloud Platform for Developers: Build highly scalable cloud solutions with the power of Google Cloud Platform
Google Cloud Platform for Developers: Build highly scalable cloud solutions with the power of Google Cloud Platform

Develop, deploy, and scale your applications with Google Cloud Platform

Key Features

  • Create and deploy your applications on Google Cloud Platform
  • Store and manage source code and debug Cloud-hosted apps with plugins and IDEs
  • Streamline developer workflows...
The Power of Impossible Thinking: Transform the Business of Your Life and the Life of Your Business
The Power of Impossible Thinking: Transform the Business of Your Life and the Life of Your Business

50,000 copies sold, now in paperback... If you can think impossible thoughts, then you can do impossible things!!

  • The power of change: create new thinking for new solutions!
  • Includes a new introduction demonstrating the "power of impossible thinking," plus access to exclusive book...
Learning AWS OpsWorks
Learning AWS OpsWorks

Learn how to exploit advanced technologies to deploy and auto-scale web stacks

Overview

  • Discover how a DevOps cloud management solution can accelerate your path to delivering highly scalable infrastructure and applications
  • Learn about infrastructure automation, auto-scaling, and distributed...
Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting (Networking Technology)
Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting (Networking Technology)
When most information security professionals think about threats to their networks, they think about the threat of attackers from the outside. However, in recent years the number of computer security incidents occurring from trusted users within a company has equaled those occurring from external threats. The difference is, external threats are...
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
A one-stop source of information covering everything you’ll need to know in order to pass the CISSP examination

The CISSP Prep Guide

From stolen intellectual proprietary and denial of service attacks to unauthorized use of critical resources and computer viruses, e-business companies face numerous threats each day that can...

CISSP Exam Cram 2
CISSP Exam Cram 2

Learn what you need to know to master the CISSP security technology and the certification exam with the CISSP Exam Cram 2. A perfect compliment to larger study guides, the CISSP Exam Cram 2 is a great way to find out exactly what will be expected of you during...

Network Security Assessment: Know Your Network
Network Security Assessment: Know Your Network
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this...
unlimited object storage image
Result Page: 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy