Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microservices for the Enterprise: Designing, Developing, and Deploying
Microservices for the Enterprise: Designing, Developing, and Deploying
Understand the key challenges and solutions around building microservices in the enterprise application environment. This book provides a comprehensive understanding of microservices architectural principles and how to use microservices in real-world scenarios.

Architectural challenges using microservices with service
...
Software Architect's Handbook: Become a successful software architect by implementing effective architecture concepts
Software Architect's Handbook: Become a successful software architect by implementing effective architecture concepts

A comprehensive guide to exploring software architecture concepts and implementing best practices

Key Features

  • Enhance your skills to grow your career as a software architect
  • Design efficient software architectures using patterns and best practices
  • Learn...
Complete Guide to Test Automation: Techniques, Practices, and Patterns for Building and Maintaining Effective Software Projects
Complete Guide to Test Automation: Techniques, Practices, and Patterns for Building and Maintaining Effective Software Projects
Rely on this robust and thorough guide to build and maintain successful test automation. As the software industry shifts from traditional waterfall paradigms into more agile ones, test automation becomes a highly important tool that allows your development teams to deliver software at an ever-increasing pace without compromising...
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring...
Docker on Windows: From 101 to production with Docker on Windows, 2nd Edition
Docker on Windows: From 101 to production with Docker on Windows, 2nd Edition

Learn how to run new and old applications in Docker containers on Windows - modernizing the architecture, improving security and maximizing efficiency.

Key Features

  • Run .NET Framework and .NET Core apps in Docker containers for efficiency, security and portability
  • Design...
How to Kill the Scrum Monster: Quick Start to Agile Scrum Methodology and the Scrum Master Role
How to Kill the Scrum Monster: Quick Start to Agile Scrum Methodology and the Scrum Master Role

Implement Scrum or improve how Scrum works in your team or organization using this concise, sharp, and programmatic book. You will quickly learn what you need to know without getting confused with unnecessary details.

What You'll Learn

  • Become familiar with Agile concepts and understand...
Enterprise DevOps Framework: Transforming IT Operations
Enterprise DevOps Framework: Transforming IT Operations

Transform your IT organization from one weighed down by set practices to one with a DevOps culture and a cloud-first strategy that is optimized by automation and other lean practices. In this engaging read, you will discover the opportunities, challenges, lessons, and rewards that CA Technologies encountered when making their agile...

Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
MicroStrategy Quick Start Guide: Data analytics and visualizations for Business Intelligence
MicroStrategy Quick Start Guide: Data analytics and visualizations for Business Intelligence

Build reporting applications and dashboards using the different MicroStrategy objects

Key Features

  • Learn the fundamentals of MicroStrategy
  • Use MicroStrategy to get actionable insights from your business data
  • Create visualizations and build intuitive...
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
Pro Power BI Architecture: Sharing, Security, and Deployment Options for Microsoft Power BI Solutions
Pro Power BI Architecture: Sharing, Security, and Deployment Options for Microsoft Power BI Solutions
Architect and deploy a Power BI solution. This book will help you understand the many available options and choose the best combination for hosting, developing, sharing, and deploying a Power BI solution within your organization.

Pro Power BI Architecture provides detailed examples and explains...
UX Optimization: Combining Behavioral UX and Usability Testing Data to Optimize Websites
UX Optimization: Combining Behavioral UX and Usability Testing Data to Optimize Websites
Combine two typically separate sources of data?behavioral quantitative data and usability testing qualitative data?into a powerful single tool that helps improve your organization’s website by increasing conversion and ROI. The combination of the what is happening data of website activity, coupled with the...
Result Page: 185 184 183 182 181 180 179 178 177 176 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy