Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical DevOps
Practical DevOps

Key Features

  • Get to know the background of DevOps so you understand the collaboration between different aspects of an IT organization and a software developer
  • Improve your organization's performance to ensure smooth production of software and services
  • Deploy top-quality software and...
Java 9 Revealed: For Early Adoption and Migration
Java 9 Revealed: For Early Adoption and Migration
Explore the new Java 9 modules, SDK, JDK, JVM, JShell and more in this comprehensive book that covers what’s new in Java 9 and how to use these new features. Java 9 Revealed is for experienced Java programmers looking to migrate to Java 9.  Author Kishori Sharan begins by covering how to develop Java...
Microservices Deployment Cookbook
Microservices Deployment Cookbook

Key Features

  • Adopt microservices-based architecture and deploy it at scale
  • Build your complete microservice architecture using different recipes for different solutions
  • Identify specific tools for specific scenarios and deliver immediate business results, correlate use cases, and adopt them...
Troubleshooting Windows Server with PowerShell
Troubleshooting Windows Server with PowerShell

This book shows you how to use PowerShell to quickly pinpoint, diagnose, and solve problems with your Windows Server environment, reducing the need for external tools, and ensuring you stay up-to-date with PowerShell as it quickly becomes one of the most useful tools in an administrator’s toolkit.

Authors Derek Schauland and...

Beyond Bullets: Creative Journaling Ideas to Customize Your Personal Productivity System
Beyond Bullets: Creative Journaling Ideas to Customize Your Personal Productivity System

FUN, COLORFUL, AND CREATIVE SUGGESTIONS FOR THE NEWEST PRODUCTIVITY PHENOMENON.

Going beyond basic tools, this book offers tips, tricks and creative ways to transform your notebook into a treasured life companion, including:

• Ornamental lettering
• Personalized habit trackers...

Microsoft Exchange Server PowerShell Cookbook - Third Edition
Microsoft Exchange Server PowerShell Cookbook - Third Edition

Over 120 recipes to help you manage and administrate Exchange Server 2013 Service Pack 1 with PowerShell 5

About This Book

  • Explore the new features and capabilities of PowerShell 5 and its integration with Exchange Server 2013
  • Learn how to write scripts and functions, schedule scripts to...
Practical Linux Security Cookbook
Practical Linux Security Cookbook

Key Features

  • This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
  • More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
  • Enhance file system security and local and remote...
Microservices with Docker on Microsoft Azure (includes Content Update Program) (Addison-Wesley Microsoft Technology)
Microservices with Docker on Microsoft Azure (includes Content Update Program) (Addison-Wesley Microsoft Technology)

Book + Content Update Program

“Beyond just describing the basics, this book dives into best practices every aspiring microservices developer or architect should know.”
—Foreword by Corey Sanders, Partner Director of Program Management, Azure

Microservice-based
...

Python for Secret Agents - Second Edition
Python for Secret Agents - Second Edition

Gather, analyze, and decode data to reveal hidden facts using Python, the perfect tool for all aspiring secret agents

About This Book

  • Discover the essential features of Python programming: statements, variables, expressions, and many of the built-in data types
  • Use Python's standard...
Docker Cookbook
Docker Cookbook

80 hands-on recipes to efficiently work with the Docker 1.6 environment on Linux About This Book Provides practical techniques and knowledge of various emerging and developing APIs to help you create scalable services Create, manage, and automate production-quality services while dealing with inherent issues. Each recipe is carefully...

Microsoft Windows 2000 Scripting Guide
Microsoft Windows 2000 Scripting Guide

Welcome to the Microsoft® Windows® 2000 Scripting Guide.

As computers and computer networks continue to grow larger and more complex, system administrators continue to face new challenges. Not all that long ago, system administration was limited to managing a...

Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

Result Page: 11 10 9 8 7 6 5 4 3 2 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy