Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats

Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful...

Learning Python Networking: A complete guide to build and deploy strong networking capabilities using Python 3.7 and Ansible , 2nd Edition
Learning Python Networking: A complete guide to build and deploy strong networking capabilities using Python 3.7 and Ansible , 2nd Edition

Achieve improved network programmability and automation by leveraging powerful network programming concepts, algorithms, and tools

Key Features

  • Deal with remote network servers using SSH, FTP, SNMP and LDAP protocols.
  • Design multi threaded and event-driven architectures...
Beginning Jenkins Blue Ocean: Create Elegant Pipelines With Ease
Beginning Jenkins Blue Ocean: Create Elegant Pipelines With Ease
Dive deep into Jenkins Blue Ocean and discover how easy creating a pipeline can be. You’ll see how Blue Ocean provides a better user experience when designing, running, and visualizing pipelines. This book shows you its intuitive user interface and its powerful pipeline editor and how this makes it a tool for everyone....
Python Requests Essentials
Python Requests Essentials

Learn how to integrate your applications seamlessly with web services using Python Requests

About This Book

  • A fast-paced guide that demonstrates the use of Python Requests with the help of examples
  • Learn web scraping with Beautiful Soup and Python Requests libraries
  • ...
Learning Python Web Penetration Testing: Automate web penetration testing activities using Python
Learning Python Web Penetration Testing: Automate web penetration testing activities using Python

Leverage the simplicity of Python and available libraries to build web security testing tools for your application

Key Features

  • Understand the web application penetration testing methodology and toolkit using Python
  • Write a web crawler/spider with the Scrapy library
  • ...
Pro ASP.NET MVC 4
Pro ASP.NET MVC 4

The ASP.NET MVC 4 Framework is the latest evolution of Microsoft’s ASP.NET web platform. It provides a high-productivity programming model that promotes cleaner code architecture, test-driven development, and powerful extensibility, combined with all the benefits of ASP.NET.

ASP.NET MVC 4 contains a number of significant...

Teach Yourself Cgi Programming With Perl in a Week (Sams Teach Yourself)
Teach Yourself Cgi Programming With Perl in a Week (Sams Teach Yourself)
From there, you will learn about the basic client/server architecture of the server, and you will get a detailed description of the HTTP request/response headers. You will learn the client/server model in straightforward and simple terms, and throughout the book, you will learn about several methods for keeping track of the state of...
Introduction to JavaScript Object Notation: A To-the-Point Guide to JSON
Introduction to JavaScript Object Notation: A To-the-Point Guide to JSON

What is JavaScript Object Notation (JSON) and how can you put it to work? This concise guide helps busy IT professionals get up and running quickly with this popular data interchange format, and provides a deep understanding of how JSON works. Author Lindsay Bassett begins with an overview of JSON syntax, data types, formatting, and...

Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux
Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux

Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holes

Key Features

  • Know how to set up your lab with Kali Linux
  • Discover the core concepts of web penetration testing
  • ...
Introduction to Tornado
Introduction to Tornado

Walk through the basics of Tornado, the high-performance web server known for its speed, simplicity, and scalability on projects large and small. With this hands-on guide, you’ll learn how to use Tornado’s acclaimed features by working with several example applications. You also get best practices for using Tornado in the...

Cloud-Native Applications in Java: Build microservice-based cloud-native applications that dynamically scale
Cloud-Native Applications in Java: Build microservice-based cloud-native applications that dynamically scale

Highly available microservice-based web apps for Cloud with Java

Key Features

  • Take advantage of the simplicity of Spring to build a full-fledged application
  • Let your applications run faster while generating smaller cloud service bills
  • Integrate your...
Cosmos DB for MongoDB Developers: Migrating to Azure Cosmos DB and Using the MongoDB API
Cosmos DB for MongoDB Developers: Migrating to Azure Cosmos DB and Using the MongoDB API
Learn Azure Cosmos DB and its MongoDB API with hands-on samples and advanced features such as the multi-homing API, geo-replication, custom indexing, TTL, request units (RU), consistency levels, partitioning, and much more. Each chapter explains Azure Cosmos DB’s features and functionalities by...
Result Page: 17 16 15 14 13 12 11 10 9 8 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy