Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

Docker Cookbook: Over 100 practical and insightful recipes to build distributed applications with Docker , 2nd Edition
Docker Cookbook: Over 100 practical and insightful recipes to build distributed applications with Docker , 2nd Edition

Leverage Docker to deploying software at scale

Key Features

  • Leverage practical examples to manage containers efficiently
  • Integrate with orchestration tools such as Kubernetes for controlled deployments
  • Learn to implement best practices on improving...
eThekwini’s Green and Ecological Infrastructure Policy Landscape: Towards a Deeper Understanding
eThekwini’s Green and Ecological Infrastructure Policy Landscape: Towards a Deeper Understanding
This book offers the reader a deeper understanding of the eThekwini Metropolitan Municipality’s green and ecological infrastructure policy landscape. The author utilises the PULSE3 analytical framework to conduct an in-depth examination and to show how experts frame and implement the municipality’s green and ecological infrastructure...
Blockchain for Business 2019: A user-friendly introduction to blockchain technology and its business applications
Blockchain for Business 2019: A user-friendly introduction to blockchain technology and its business applications

Your one-stop guide to blockchain technology and its business applications

Key Features

  • Assimilate blockchain services such as Ethereum and Hyperledger to transform industrial applications
  • Know in and out of blockchain technology to understand various business use...
AngularJS Deployment Essentials
AngularJS Deployment Essentials

Learn how to optimally deploy your AngularJS applications to today's top hosting environments

About This Book

  • Build your own real-time AngularJS application using a modern tool stack and implement a clever deployment strategy
  • Deploy your application into production environments such...
Beginning Object-Oriented Programming with C# (Wrox Programmer to Programmer)
Beginning Object-Oriented Programming with C# (Wrox Programmer to Programmer)
OVER THE PAST 30 YEARS I’VE WRITTEN 18 BOOKS on various programming topics. You might wonder, why so many…? Didn’t I get it right the fi rst time? Well, no, I didn’t…not really. When I wrote my fi rst book more than 30 years ago, object-oriented programming (OOP) was obscure at best and unknown to...
Ajax Starter Kit
Ajax Starter Kit

Ajax Programmer’s Toolkit with all the technologies you need to set up an Ajax development and testing environment on your Windows, Mac, or Linux computer.

 

Quick Start Guide teaches you the basics of Ajax programming in 21 short, easy-to-read...

The Mathematics of Coding Theory
The Mathematics of Coding Theory

This book is intended to be accessible to undergraduate students with two years of typical mathematics experience, most likely meaning calculus with a little linear algebra and differential equations. Thus, specifically, there is no assumption oLa background inabstr&;t algebra or number theory, nor of probability, nor of linear...

Computational Geometry: Algorithms and Applications
Computational Geometry: Algorithms and Applications
Computational geometry emerged from the field of algorithms design and analysis in the late 1970s. It has grown into a recognized discipline with its own journals, conferences, and a large community of active researchers. The success of the field as a research discipline can on the one hand be explained from the beauty of the...
Practical Quantum Computing for Developers: Programming Quantum Rigs in the Cloud using Python, Quantum Assembly Language and IBM QExperience
Practical Quantum Computing for Developers: Programming Quantum Rigs in the Cloud using Python, Quantum Assembly Language and IBM QExperience
Write algorithms and program in the new field of quantum computing. This book covers major topics such as the physical components of a quantum computer: qubits, entanglement, logic gates, circuits, and how they differ from a traditional computer. Also, Practical Quantum Computing for Developers...
Home Networking Demystified
Home Networking Demystified
No need to be intimidated by home networking! With a very readable and easy to understand writing style, this book takes the anxiety out of learning how to build or expand a home network. Read a home networking book organised like a fun and painless self-teaching guide. Use the 8-page, 2-colour visual instruction insert to see how to set up a home...
Biometric Image Discrimination Technologies (Computational Intelligence and Its Applications Series)
Biometric Image Discrimination Technologies (Computational Intelligence and Its Applications Series)
Personal identification and verification both play a critical role in our society.
Today, more and more business activities and work practices are computerized. Ecommerce
applications, such as e-banking, or security applications, such as building
access, demand fast, real-time and accurate personal identification. Traditional
...
unlimited object storage image
Result Page: 112 111 110 109 108 107 106 105 104 103 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy