Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Cybersecurity for Architects: Plan and design robust security architectures
Hands-On Cybersecurity for Architects: Plan and design robust security architectures

Gain practical experience of creating security solutions and designing secure, highly available, and dynamic infrastructure for your organization

Key Features

  • Architect complex security structures using standard practices and use cases
  • Integrate security with any...
Hands-On RESTful API Design Patterns and Best Practices: Design, develop, and deploy highly adaptable, scalable, and secure RESTful web APIs
Hands-On RESTful API Design Patterns and Best Practices: Design, develop, and deploy highly adaptable, scalable, and secure RESTful web APIs

Build effective RESTful APIs for enterprise with design patterns and REST framework's out-of-the-box capabilities

Key Features

  • Understand advanced topics such as API gateways, API securities, and cloud
  • Implement patterns programmatically with easy-to-follow...
Python Network Programming: Conquer all your networking challenges with the powerful Python language
Python Network Programming: Conquer all your networking challenges with the powerful Python language

Power up your network applications with Python programming

Key Features

  • Master Python skills to develop powerful network applications
  • Grasp the fundamentals and functionalities of SDN
  • Design multi-threaded, event-driven architectures for echo and chat...
Hands-On Recommendation Systems with Python: Start building powerful and personalized, recommendation engines with Python
Hands-On Recommendation Systems with Python: Start building powerful and personalized, recommendation engines with Python

With Hands-On Recommendation Systems with Python, learn the tools and techniques required in building various kinds of powerful recommendation systems (collaborative, knowledge and content based) and deploying them to the web

Key Features

  • Build industry-standard recommender systems
  • ...
Mastering Python Networking: Your one-stop solution to using Python for network automation, DevOps, and Test-Driven Development, 2nd Edition
Mastering Python Networking: Your one-stop solution to using Python for network automation, DevOps, and Test-Driven Development, 2nd Edition

Master the art of using Python for a diverse range of network engineering tasks

Key Features

  • Explore the power of Python libraries to tackle difficult network problems efficiently and effectively
  • Use Python for network device automation, DevOps, and software-defined...
Mastering Blockchain: Distributed ledger technology, decentralization, and smart contracts explained, 2nd Edition
Mastering Blockchain: Distributed ledger technology, decentralization, and smart contracts explained, 2nd Edition

Learn about cryptography and cryptocurrencies, so you can build highly secure, decentralized applications and conduct trusted in-app transactions.

Key Features

  • Get to grips with the underlying technical principles and implementations of blockchain
  • Build powerful...
Artificial Intelligence By Example: Develop machine intelligence from scratch using real artificial intelligence use cases
Artificial Intelligence By Example: Develop machine intelligence from scratch using real artificial intelligence use cases

Be an adaptive thinker that leads the way to Artificial Intelligence

Key Features

  • AI-based examples to guide you in designing and implementing machine intelligence
  • Develop your own method for future AI solutions
  • Acquire advanced AI, machine learning, and...
Internet of Things for Architects: Architecting IoT solutions by implementing sensors, communication infrastructure, edge computing, analytics, and security
Internet of Things for Architects: Architecting IoT solutions by implementing sensors, communication infrastructure, edge computing, analytics, and security

Learn to design, implement and secure your IoT infrastructure

Key Features

  • Build a complete IoT system that is the best fit for your organization
  • Learn about different concepts, technologies, and tradeoffs in the IoT architectural stack
  • Understand the...
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features

  • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • ...
Getting Started with Python for the Internet of Things: Leverage the full potential of Python to prototype and build IoT projects using the Raspberry Pi
Getting Started with Python for the Internet of Things: Leverage the full potential of Python to prototype and build IoT projects using the Raspberry Pi

Build clever, collaborative, and powerful automation systems with the Raspberry Pi and Python.

Key Features

  • Create your own Pi-Rover or Pi-Hexipod robots
  • Develop practical applications in Python using Raspberry Pi
  • Build your own Jarvis, a highly advanced...
Windows Server 2019 Automation with PowerShell Cookbook: Powerful ways to automate and manage Windows administrative tasks, 3rd Edition
Windows Server 2019 Automation with PowerShell Cookbook: Powerful ways to automate and manage Windows administrative tasks, 3rd Edition

A practical guide to Windows Server 2019 and PowerShell

Key Features

  • Use PowerShell to effectively configure and administer Windows Server 2019
  • Improve the performance of new features such as DevOps and containers using PowerShell
  • Enhance PowerShell's...
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Result Page: 335 334 333 332 331 330 329 328 327 326 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy