Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Be online without leaving a trace.

Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.

In this explosive yet practical book,
...
Windows 10 All-In-One For Dummies
Windows 10 All-In-One For Dummies
The most comprehensive guide to Windows 10, updated with the latest enhancements

If you're new to Windows 10 and want an authoritative and accessible guide to the basics of the widely used operating system, Windows 10 All-in-One For Dummies is the book for you. Written by trusted Windows expert Woody Leonhard,...

Mastering Windows Server 2016
Mastering Windows Server 2016
The IT pro's must-have guide to Windows Server 2016

Mastering Windows Server 2016 is a complete resource for IT professionals needing to get quickly up to date on the latest release. Designed to provide comprehensive information in the context of real-world usage, this book offers expert guidance through the new...

Mastering Windows Server 2016 Hyper-V
Mastering Windows Server 2016 Hyper-V

Build a seamless, flexible, full-service datacenter solution

Microsoft Windows Server 2016 Hyper-V is the IT administrator's guide to this rising datacenter solution. Hyper-V has already surpassed VMWare in datacenter management, identity service for multiple devices, and more; this book shows you how to harness...

Mastering Kubernetes: Large scale container deployment and management
Mastering Kubernetes: Large scale container deployment and management

Master the art of container management utilizing the power of Kubernetes.

About This Book

  • This practical guide demystifies Kubernetes and ensures that your clusters are always available, scalable, and up to date
  • Discover new features such as autoscaling, rolling updates, resource quotas,...
Instant Nokogiri
Instant Nokogiri

Learning data scraping and parsing in Ruby using the Nokogiri gem

Overview

  • Learn something new in an Instant! A short, fast, focused guide delivering immediate results
  • Master Nokogiri with the use of clear, step-by-step instructions and real world examples
  • ...
OAuth 2.0 Identity and Access Management Patterns
OAuth 2.0 Identity and Access Management Patterns

Want to learn the world’s most widely used authorization framework? This tutorial will have you implementing secure Oauth 2.0 grant flows without delay. Written for practical application and clear instruction, it’s the complete guide.

Overview

  • Build web, client-side, desktop, and server-side...
Oppenheimer: The Tragic Intellect
Oppenheimer: The Tragic Intellect
At a time when the Manhattan Project was synonymous with large-scale science, physicist J. Robert Oppenheimer (1904–67) represented the new sociocultural power of the American intellectual. Catapulted to fame as director of the Los Alamos atomic weapons laboratory, Oppenheimer occupied a key position in the compact between science and the...
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

Cryptography and Network Security: Principles and Practice (5th Edition)
Cryptography and Network Security: Principles and Practice (5th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Pro PowerShell for Microsoft Azure
Pro PowerShell for Microsoft Azure

This book is written for Windows professionals who are familiar with PowerShell and want to learn to build, operate, and administer their Windows workloads in the Microsoft cloud. Pro PowerShell for Microsoft Azure is packed with practical examples and scripts, with easy-to-follow explanations for a wide range of day-to-day...

Creating a Brand Identity: A Guide for Designers
Creating a Brand Identity: A Guide for Designers

Creating A Brand Identity is a complex challenge for the graphic designer. It requires practical design skills and creative drive as well as an understanding of marketing and consumer behaviour. This practical handbook is a comprehensive introduction to this creative process.

Exercises and examples highlight the key
...

Result Page: 31 30 29 28 27 26 25 24 23 22 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy