Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Continuous Integration and Delivery: Build and release quality software at scale with Jenkins, Travis CI, and CircleCI
Hands-On Continuous Integration and Delivery: Build and release quality software at scale with Jenkins, Travis CI, and CircleCI

Understand various tools and practices for building a continuous integration and delivery pipeline effectively

Key Features

  • Get up and running with the patterns of continuous integration
  • Learn Jenkins UI for developing plugins and build an effective Jenkins pipeline
  • ...
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID

Protect your network with Snort: the high-performance, open source IDS

Snort gives network administrators an open source intrusion detection system that outperforms proprietary alternatives. Now, Rafeeq Ur Rehman explains and simplifies every aspect of deploying and managing Snort in your network. You'll discover how to monitor all...

Advanced Microservices: A Hands-on Approach to Microservice Infrastructure and Tooling
Advanced Microservices: A Hands-on Approach to Microservice Infrastructure and Tooling

Use the many types of tools required to navigate and maintain a microservice ecosystem. This book examines what is normally a complex system of interconnected services and clarifies them one at a time, first examining theoretical requirements then looking at concrete tools, configuration, and workflows.

Building out these systems...

DevOps with Kubernetes: Accelerating software delivery with container orchestrators
DevOps with Kubernetes: Accelerating software delivery with container orchestrators

Learn to implement DevOps using Docker & Kubernetes.

About This Book

  • Learning DevOps, container, and Kubernetes within one book.
  • Leverage Kubernetes as a platform to deploy, scale, and run containers efficiently.
  • A practical guide towards container management and...
Beginning Django: Web Application Development and Deployment with Python
Beginning Django: Web Application Development and Deployment with Python
Discover the Django web application framework and get started building Python-based web applications. This book takes you from the basics of Django all the way through to cutting-edge topics such as creating RESTful applications. Beginning Django also covers ancillary, but essential, development topics, including...
Microsoft SharePoint 2010 Administrator's Pocket Consultant
Microsoft SharePoint 2010 Administrator's Pocket Consultant

Portable and precise, this pocket-sized guide delivers ready answers for the day-to-day administration of SharePoint 2010. Featuring easy-to-scan tables, step-by-step instructions, and handy lists, this book offers the streamlined, straightforward information you need to solve problems and get the job done-whether at your desk or in...

Learning Cython Programming
Learning Cython Programming

Developers who like C/C++ will love the added dynamism of Cython. This practical guide gives you everything you need to start programming with Cython and enhancing your existing applications. It could change your working life.

Overview

  • Extend C applications with pure Python code
  • Expand...
Cisco Security Professional's Guide to Secure Intrusion Detection Systems
Cisco Security Professional's Guide to Secure Intrusion Detection Systems

This book presents a combination of intrusion detection systems (IDS) and security theory, Cisco security models, and detailed information regarding specific Cisco-based IDS solutions. Cisco Security Professional’s Guide to Secure Intrusion Detection Systems also serves as a guide for security administrators studying for the Cisco...

The DevOps 2.0 Toolkit: Automating the Continuous Deployment Pipeline with Containerized Microservices
The DevOps 2.0 Toolkit: Automating the Continuous Deployment Pipeline with Containerized Microservices

This book is about different techniques that help us architect software in a better and more efficient way with microservices packed as immutable containers, tested and deployed continuously to servers that are automatically provisioned with configuration management tools. It's about fast, reliable and continuous deployments with...

Defensive Security Handbook: Best Practices for Securing Infrastructure
Defensive Security Handbook: Best Practices for Securing Infrastructure

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...

Professional C# 2008 (Wrox Professional Guides)
Professional C# 2008 (Wrox Professional Guides)
Professional C# 2008

Updated for .NET 3.5 and Visual Studio® 2008, this book is the ultimate guide to C# 2008 and its environment. Beginning with a look into the architecture and methodology of .NET, the team of superlative authors explains why the C# language cannot be viewed in isolation, but rather, must be...

Network Security Fundamentals
Network Security Fundamentals

Companies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to acquire the proper expertise...

Result Page: 17 16 15 14 13 12 11 10 9 8 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy