Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Migrating to Azure: Transforming Legacy Applications into Scalable Cloud-First Solutions
Migrating to Azure: Transforming Legacy Applications into Scalable Cloud-First Solutions

Design an enterprise solution from scratch that allows the migration of a legacy application. Begin with the planning and design phase and be guided through all the stages of selecting the architecture framework that fits your enterprise.

Join Microsoft MVP Josh Garverick as he addresses all major areas of design and...

DevOps in Python: Infrastructure as Python
DevOps in Python: Infrastructure as Python
Explore and apply best practices for efficient application deployment. This book draws upon author Moshe Zadka's years of Dev Ops experience and focuses on the parts of Python, and the Python ecosystem, that are relevant for DevOps engineers. 

You'll start by writing command-line scripts and
...
Post-Silicon Validation and Debug
Post-Silicon Validation and Debug

This book provides a comprehensive coverage of System-on-Chip (SoC) post-silicon validation and debug challenges and state-of-the-art solutions with contributions from SoC designers, academic researchers as well as SoC verification experts.  The readers will get a clear understanding of the existing debug infrastructure and how...

Advanced Microservices: A Hands-on Approach to Microservice Infrastructure and Tooling
Advanced Microservices: A Hands-on Approach to Microservice Infrastructure and Tooling

Use the many types of tools required to navigate and maintain a microservice ecosystem. This book examines what is normally a complex system of interconnected services and clarifies them one at a time, first examining theoretical requirements then looking at concrete tools, configuration, and workflows.

Building out these systems...

Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems

Implement defensive techniques in your ecosystem successfully with Python

Key Features

  • Identify and expose vulnerabilities in your infrastructure with Python
  • Learn custom exploit development
  • Make robust and powerful cybersecurity tools with Python
  • ...
Open Source Identity Management Patterns and Practices Using OpenAM 10.x
Open Source Identity Management Patterns and Practices Using OpenAM 10.x

An intuitive guide to learning OpenAM access management capabilities for web and application servers

Overview

  • Learn patterns, practices, and the terminology of Identity Management
  • Learn how to install OpenAM 10.x
  • Protect web and application servers using policy agents
  • ...
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Develop blockchain application with step-by-step instructions, working example and helpful recommendations

Key Features

  • Understanding the blockchain technology from the cybersecurity perspective
  • Developing cyber security solutions with Ethereum blockchain technology
  • ...
Jenkins: The Definitive Guide
Jenkins: The Definitive Guide

This book is aimed at relatively technical readers, though no prior experience with Continuous Integration is assumed. You may be new to Continuous Integration, and would like to learn about the benefits it can bring to your development team. Or, you might be using Jenkins or Hudson already, and want to discover how you can...

Data Warehousing in the Age of Big Data (The Morgan Kaufmann Series on Business Intelligence)
Data Warehousing in the Age of Big Data (The Morgan Kaufmann Series on Business Intelligence)

Web 2.0 has changed the way we conduct business, interact with customers, share information with friends and family, measure success in terms of business revenue and customer wallet share, and define brand management, and, most importantly, it has created a revenue channel like none other. Whether you plan your vacation, buy the newest...

Spring Security 3.1
Spring Security 3.1

Knowing that experienced hackers are itching to test your skills makes security one of the most difficult and high-pressure concerns of creating an application. The complexity of properly securing an application is compounded when you must also integrate this factor with existing code, new technologies, and other frameworks. Use this book to...

Docker for Data Science: Building Scalable and Extensible Data Infrastructure Around the Jupyter Notebook Server
Docker for Data Science: Building Scalable and Extensible Data Infrastructure Around the Jupyter Notebook Server
Learn Docker "infrastructure as code" technology to define a system for performing standard but non-trivial data tasks on medium- to large-scale data sets, using Jupyter as the master controller.

It is not uncommon for a real-world data set to fail to be easily managed. The set may not fit well into access memory or
...
Angular 6 for Enterprise-Ready Web Applications: Deliver production-ready and cloud-scale Angular web apps
Angular 6 for Enterprise-Ready Web Applications: Deliver production-ready and cloud-scale Angular web apps

A hands-on guide with a minimalist and flexible approach that enables quick learning and rapid delivery of cloud-ready enterprise applications with Angular 6

Key Features

  • Explore tools and techniques to push your web app to the next level
  • Master Angular app design and...
Result Page: 117 116 115 114 113 112 111 110 109 108 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy