Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Getting Started with Containerization: Reduce the operational burden on your system by automating and managing your containers
Getting Started with Containerization: Reduce the operational burden on your system by automating and managing your containers

Choose the smarter way to learn about containerizing your applications and running them in production.

Key Features

  • Deploy and manage highly scalable, containerized applications with Kubernetes
  • Build high-availability Kubernetes clusters
  • Secure your...
Docker Cookbook: Over 100 practical and insightful recipes to build distributed applications with Docker , 2nd Edition
Docker Cookbook: Over 100 practical and insightful recipes to build distributed applications with Docker , 2nd Edition

Leverage Docker to deploying software at scale

Key Features

  • Leverage practical examples to manage containers efficiently
  • Integrate with orchestration tools such as Kubernetes for controlled deployments
  • Learn to implement best practices on improving...
Engineering and Operations of System of Systems
Engineering and Operations of System of Systems

Modern engineering systems are complex and multi-faceted, and must be flexible, adaptable, and fully integrated with the supply chain and other stakeholders to deliver an effective level of performance. Therefore, this book aims to create an operational view and new understanding of modern system design, commissioning, operation,...

Introduction to Probability Models
Introduction to Probability Models

Introduction to Probability Models, Twelfth Edition, is the latest version of Sheldon Ross's classic bestseller. This trusted book introduces the reader to elementary probability modelling and stochastic processes and shows how probability theory can be applied in fields such as engineering, computer science, management...

Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.
Key Features
  • Intelligence processes and procedures for response mechanisms
  • Master F3EAD to drive processes based on intelligence
  • Threat modeling and intelligent frameworks
  • ...
Learn SQL Server Administration in a Month of Lunches: Covers Microsoft SQL Server 2005-2014
Learn SQL Server Administration in a Month of Lunches: Covers Microsoft SQL Server 2005-2014

Summary

Learn SQL Server Administration in a Month of Lunches is the perfect way to get started with SQL Server operations, including maintenance, backup and recovery, high availability, and performance monitoring. In about an hour a day over a month, you'll learn exactly what you can do, and what you...

Microsoft Azure: Planning, Deploying, and Managing Your Data Center in the Cloud
Microsoft Azure: Planning, Deploying, and Managing Your Data Center in the Cloud

Written for IT and business professionals, this book provides the technical and business insight needed to plan, deploy and manage the services provided by the Microsoft Azure cloud. Find out how to integrate the infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) models with your existing business infrastructure while...

JavaScript Absolute Beginner's Guide
JavaScript Absolute Beginner's Guide

JavaScript Absolute Beginner's Guide

No experience necessary!

 

Make the most of JavaScript -- even if you've never programmed anything before. This book is the fastest way to learn JavaScript and use it...

Vector and Tensor Analysis with Applications
Vector and Tensor Analysis with Applications

Definition of vectors and discussion of algebraic operations on vectors leads to concept of tensor and algebraic operations on tensors. Also, systematic study of the differential and integral calculus of vector and tensor functions of space and time, more. Concise, eminently readable text. Worked out problems, solutions.

The...

A Probability Path (Modern Birkhäuser Classics)
A Probability Path (Modern Birkhäuser Classics)

Many probability books are written by mathematicians and have the built-in bias that the reader is assumed to be a mathematician coming to the material for its beauty. This textbook is geared towards beginning graduate students from a variety of disciplines whose primary focus is not necessarily mathematics for its own sake. Instead,...

Learn Bitcoin and Blockchain: Understanding blockchain and Bitcoin architecture to build decentralized applications
Learn Bitcoin and Blockchain: Understanding blockchain and Bitcoin architecture to build decentralized applications

Get up and running with the fundamentals of Bitcoin and blockchain

Key Features

  • Learn quick, effective, and easy ways to master blockchain and Bitcoin
  • Understand the impact of decentralization and discover ways to tackle it
  • Explore the future of Bitcoin...
unlimited object storage image
Result Page: 132 131 130 129 128 127 126 125 124 123 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy