Home | Amazing | Today | Tags | Publishers | Years | Search 
Modern Python Standard Library Cookbook: Over 100 recipes to fully leverage the features of the standard library in Python
Modern Python Standard Library Cookbook: Over 100 recipes to fully leverage the features of the standard library in Python

Build optimized applications in Python by smartly implementing the standard library

Key Features

  • Strategic recipes for effective application development in Python
  • Techniques to create GUIs and implement security through cryptography
  • Best practices for...
Beginning DAX with Power BI: The SQL Pro’s Guide to Better Business Intelligence
Beginning DAX with Power BI: The SQL Pro’s Guide to Better Business Intelligence
Attention all SQL Pros, DAX is not just for writing Excel-based formulas! Get hands-on learning and expert advice on how to use the vast capabilities of the DAX language to solve common data modeling challenges.

Beginning DAX with Power BI teaches key concepts such as mapping techniques from SQL to DAX, filtering,...

Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
Pro Power BI Architecture: Sharing, Security, and Deployment Options for Microsoft Power BI Solutions
Pro Power BI Architecture: Sharing, Security, and Deployment Options for Microsoft Power BI Solutions
Architect and deploy a Power BI solution. This book will help you understand the many available options and choose the best combination for hosting, developing, sharing, and deploying a Power BI solution within your organization.

Pro Power BI Architecture provides detailed examples and explains...
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
Introducing InnoDB Cluster: Learning the MySQL High Availability Stack
Introducing InnoDB Cluster: Learning the MySQL High Availability Stack
Set up, manage, and configure the new InnoDB Cluster feature in MySQL from Oracle. If you are growing your MySQL installation and want to explore making your servers highly available, this book provides what you need to know about high availability and the new tools that are available in MySQL 8.0.11 and later. 

...
Advanced Raspberry Pi: Raspbian Linux and GPIO Integration
Advanced Raspberry Pi: Raspbian Linux and GPIO Integration

Jump right into the pro-level guts of the Raspberry Pi with complete schematics and detailed hardware explanations as your guide. You'll tinker with runlevels, reporting voltages and temperatures, and work on a variety of project examples that you can tune for your own project ideas.. 

This book is fully updated...

DevOps for Serverless Applications: Design, deploy, and monitor your serverless applications using DevOps practices
DevOps for Serverless Applications: Design, deploy, and monitor your serverless applications using DevOps practices

Set up complete CI and CD pipelines for your serverless applications using DevOps principles

Key Features

  • Understand various services for designing serverless architecture
  • Build CD pipelines using various cloud providers for your serverless applications
  • ...
Mastering Microsoft Power BI: Expert techniques for effective data analytics and business intelligence
Mastering Microsoft Power BI: Expert techniques for effective data analytics and business intelligence

Design, create and manage robust Power BI solutions to gain meaningful business insights

Key Features

  • Master all the dashboarding and reporting features of Microsoft Power BI
  • Combine data from multiple sources, create stunning visualizations and publish your reports across...
Burp Suite Cookbook: Practical recipes to help you master web penetration testing with Burp Suite
Burp Suite Cookbook: Practical recipes to help you master web penetration testing with Burp Suite

Get hands-on experience of using Burp Suite to execute attacks and perform web assessments

Key Features

  • Use tools in Burp Suite to meet your web infrastructure security demands
  • Configure Burp to fine-tune the suite of tools specific to the target
  • Use Burp...
SAS Programming and Data Visualization Techniques: A Power User's Guide
SAS Programming and Data Visualization Techniques: A Power User's Guide

SAS Programming and Data Visualization Techniques: A Power User’s Guide brings together a wealth of ideas about strategic and tactical solutions to everyday situations experienced when transferring, extracting, processing, analyzing, and reporting the valuable data you have at your fingertips. Best, you can achieve most of the...

Business Process Automation with ProcessMaker 3.1: A Beginner’s Guide
Business Process Automation with ProcessMaker 3.1: A Beginner’s Guide

Use this practical, hands-on guide to get started with ProcessMaker. The book provides clear steps for you to walk through and set up ProcessMaker on your own system and make processes run faster and smarter. You will model and build a complete business process for requesting, approving, and reporting expenses.

In the...

Result Page: 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy