Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats

Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful...

Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps
Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps

Protect your organization's security at all levels by introducing the latest strategies for securing DevOps

Key Features

  • Integrate security at each layer of the DevOps pipeline
  • Discover security practices to protect your cloud services by detecting fraud and...
Learn to Program with Python 3: A Step-by-Step Guide to Programming
Learn to Program with Python 3: A Step-by-Step Guide to Programming

Move from zero knowledge of programming to comfortably writing small to medium-sized programs in Python. Fully updated for Python 3, with code and examples throughout, the book explains Python coding with an accessible, step-by-step approach designed to bring you comfortably into the world of software development.

...
Building Intelligent Systems: A Guide to Machine Learning Engineering
Building Intelligent Systems: A Guide to Machine Learning Engineering
Produce a fully functioning Intelligent System that leverages machine learning and data from user interactions to improve over time and achieve success.


This book teaches you how to build an Intelligent System from end to end and leverage machine learning in practice. You will understand how to apply your
...
Practical C++ Design: From Programming to Architecture
Practical C++ Design: From Programming to Architecture
Go from competent C++ developer to skilled designer or architect using this book as your C++ design master class. This title will guide you through the design and implementation of a fun, engaging case study. Starting with a quick exploration of the requirements for building the application, you'll delve into selecting an...
Learn Robotics Programming: Build and control autonomous robots using Raspberry Pi 3 and Python
Learn Robotics Programming: Build and control autonomous robots using Raspberry Pi 3 and Python

Gain experience of building a next-generation collaboration robot

Key Features

  • Get up and running with the fundamentals of robotic programming
  • Program a robot using Python and the Raspberry Pi 3
  • Learn to build a smart robot with interactive and AI-enabled...
Professional Scala: Combine object-oriented and functional programming to build high-performance applications
Professional Scala: Combine object-oriented and functional programming to build high-performance applications

If your application source code is overly verbose, it can be a nightmare to maintain. Write concise and expressive, type-safe code in an environment that lets you build for the JVM, browser, and more.

Key Features

  • Expert guidance that shows you to efficiently use both object-oriented and...
Learn JavaScript with p5.js: Coding for Visual Learners
Learn JavaScript with p5.js: Coding for Visual Learners
Learn coding from scratch in a highly engaging and visual manner using the vastly popular JavaScript with the programming library p5.js. The skills you will acquire from this book are highly transferable to a myriad of industries and can be used towards building web applications, programmable robots, or generative art. 
...
Bad Programming Practices 101: Become a Better Coder by Learning How (Not) to Program
Bad Programming Practices 101: Become a Better Coder by Learning How (Not) to Program
This book takes a humorous slant on the programming practice manual by reversing the usual approach: under the pretence of teaching you how to become the world’s worst programmer who generally causes chaos, the book teaches you how to avoid the kind of bad habits that introduce bugs or cause code contributions to be rejected....
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
Practical Contiki-NG: Programming for Wireless Sensor Networks
Practical Contiki-NG: Programming for Wireless Sensor Networks
Explore how to develop and implement wireless server networks (WSN) using Contiki-NG, branded as the operating system for the IoT. The book explains Contiki-NG’s advantages in sensing, communication, and energy optimization and enables you to begin solving problems in automation with WSN.

Practical...
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.
Key Features
  • Intelligence processes and procedures for response mechanisms
  • Master F3EAD to drive processes based on intelligence
  • Threat modeling and intelligent frameworks
  • ...
Result Page: 304 303 302 301 300 299 298 297 296 295 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy