Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On RESTful API Design Patterns and Best Practices: Design, develop, and deploy highly adaptable, scalable, and secure RESTful web APIs
Hands-On RESTful API Design Patterns and Best Practices: Design, develop, and deploy highly adaptable, scalable, and secure RESTful web APIs

Build effective RESTful APIs for enterprise with design patterns and REST framework's out-of-the-box capabilities

Key Features

  • Understand advanced topics such as API gateways, API securities, and cloud
  • Implement patterns programmatically with easy-to-follow...
Hands-On Cybersecurity for Architects: Plan and design robust security architectures
Hands-On Cybersecurity for Architects: Plan and design robust security architectures

Gain practical experience of creating security solutions and designing secure, highly available, and dynamic infrastructure for your organization

Key Features

  • Architect complex security structures using standard practices and use cases
  • Integrate security with any...
Python Network Programming: Conquer all your networking challenges with the powerful Python language
Python Network Programming: Conquer all your networking challenges with the powerful Python language

Power up your network applications with Python programming

Key Features

  • Master Python skills to develop powerful network applications
  • Grasp the fundamentals and functionalities of SDN
  • Design multi-threaded, event-driven architectures for echo and chat...
Mastering Python Networking: Your one-stop solution to using Python for network automation, DevOps, and Test-Driven Development, 2nd Edition
Mastering Python Networking: Your one-stop solution to using Python for network automation, DevOps, and Test-Driven Development, 2nd Edition

Master the art of using Python for a diverse range of network engineering tasks

Key Features

  • Explore the power of Python libraries to tackle difficult network problems efficiently and effectively
  • Use Python for network device automation, DevOps, and software-defined...
Blockchain By Example: A developer's guide to creating decentralized applications using Bitcoin, Ethereum, and Hyperledger
Blockchain By Example: A developer's guide to creating decentralized applications using Bitcoin, Ethereum, and Hyperledger

Implement decentralized blockchain applications to build scalable Dapps

Key Features

  • Understand the blockchain ecosystem and its terminologies
  • Implement smart contracts, wallets, and consensus protocols
  • Design and develop decentralized applications using...
DevOps for Serverless Applications: Design, deploy, and monitor your serverless applications using DevOps practices
DevOps for Serverless Applications: Design, deploy, and monitor your serverless applications using DevOps practices

Set up complete CI and CD pipelines for your serverless applications using DevOps principles

Key Features

  • Understand various services for designing serverless architecture
  • Build CD pipelines using various cloud providers for your serverless applications
  • ...
Kotlin Programming Cookbook: Explore more than 100 recipes that show how to build robust mobile and web applications with Kotlin, Spring Boot, and Android
Kotlin Programming Cookbook: Explore more than 100 recipes that show how to build robust mobile and web applications with Kotlin, Spring Boot, and Android

Discover Android programming and web development by understanding the concepts of Kotlin Programming

Key Features

  • Practical solutions to your common programming problems with Kotlin 1.1
  • Leverage the functional power of Kotlin to ease your Android application...
DevOps: Continuous Delivery, Integration, and Deployment with DevOps: Dive into the core DevOps strategies
DevOps: Continuous Delivery, Integration, and Deployment with DevOps: Dive into the core DevOps strategies

Explore the high-in demand core DevOps strategies with powerful DevOps tools such as Ansible, Jenkins, and Chef

Key Features

  • Get acquainted with methodologies and tools of the DevOps framework
  • Perform continuous integration, delivery, deployment, and monitoring using...
Getting Started with Python for the Internet of Things: Leverage the full potential of Python to prototype and build IoT projects using the Raspberry Pi
Getting Started with Python for the Internet of Things: Leverage the full potential of Python to prototype and build IoT projects using the Raspberry Pi

Build clever, collaborative, and powerful automation systems with the Raspberry Pi and Python.

Key Features

  • Create your own Pi-Rover or Pi-Hexipod robots
  • Develop practical applications in Python using Raspberry Pi
  • Build your own Jarvis, a highly advanced...
Java EE 8 Design Patterns and Best Practices: Build enterprise-ready scalable applications with architectural design patterns
Java EE 8 Design Patterns and Best Practices: Build enterprise-ready scalable applications with architectural design patterns

Get the deep insights you need to master efficient architectural design considerations and solve common design problems in your enterprise applications.

Key Features

  • The benefits and applicability of using different design patterns in JAVA EE
  • Learn best practices to solve...
pytest Quick Start Guide: Write better Python code with simple and maintainable tests
pytest Quick Start Guide: Write better Python code with simple and maintainable tests

Learn the pytest way to write simple tests which can also be used to write complex tests

Key Features

  • Become proficient with pytest from day one by solving real-world testing problems
  • Use pytest to write tests more efficiently
  • Scale from simple to complex...
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features

  • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • ...
Result Page: 172 171 170 169 168 167 166 165 164 163 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy