Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning DevOps with Docker: Automate the deployment of your environment with the power of the Docker toolchain
Beginning DevOps with Docker: Automate the deployment of your environment with the power of the Docker toolchain
It can be tough to roll out a pre-configured environment if you don't know what you're doing. We'll show you how to streamline your service options with Docker, so that you can scale in an agile and responsive manner.
Key Features
  • Learn how to structure your own Docker containers
  • ...
Progressive Web Application Development by Example: Develop fast, reliable, and engaging user experiences for the web
Progressive Web Application Development by Example: Develop fast, reliable, and engaging user experiences for the web

Leverage the full potential of the web to make your web sites better than native applications for every platform.

Key Features

  • Explore different models and patterns required to develop progressive web applications
  • Create applications requiring shorter runtime for...
Software Architecture with Spring 5.0: Design and architect highly scalable, robust, and high-performance Java applications
Software Architecture with Spring 5.0: Design and architect highly scalable, robust, and high-performance Java applications

Discover how different software architectural models can help you solve problems, and learn best practices for the software development cycle

Key Features

  • Learn concepts related to software architecture and embrace them using the latest features of Spring 5
  • Discover...
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human...

Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools
Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools

Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance...

Blender 2.6 Cycles:Materials and Textures Cookbook
Blender 2.6 Cycles:Materials and Textures Cookbook

With this book you'll be able to explore and master all that the Cycles rendering engine is capable of. From the basics right through to refining, this is a must-read if you're serious about the realism of your materials and textures.

Overview

  • Create naturalistic materials and textures - such as...
SQL Queries for Mere Mortals(R): A Hands-On Guide to Data Manipulation in SQL (2nd Edition)
SQL Queries for Mere Mortals(R): A Hands-On Guide to Data Manipulation in SQL (2nd Edition)
Unless you are working at a very advanced level, this is the only SQL book you will ever need. The authors have taken the mystery out of complex queries and explained principles and techniques with such clarity that a "Mere Mortal" will indeed be empowered to perform the superhuman. Do not walk past this book!
Handbook of Electrical Design Details (Handbook)
Handbook of Electrical Design Details (Handbook)
A COMPREHENSIVE SOURCE OF TECHNICAL DETAILS ON ELECTRICAL POWER FROM GENERATION TO PRACTICAL APPLICATIONS

Reliable, low-cost electric power is a fundamental requirement for modern society, making possible such vital services as lighting, HVAC, transportation, communication, and data processing, in addition to driving motors of...

Advanced Simulation and Test Methodologies for VLSI Design
Advanced Simulation and Test Methodologies for VLSI Design

With the advent of LSI and subsequently VLSI, technology has never witnessed such an unprecedented growth in the use of electronic systems in a wide range of applications. Although the ability to integrate several hundreds of thousands of transistors into a monolithic integrated circuit offers many advantages, a major concern in the...

The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)

Actionable guidance and expert perspective for real-world cybersecurity

The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world...

Principles of Constraint Programming
Principles of Constraint Programming

This book is about constraint programming, an alternative approach to programming which relies on a combination of techniques that deal with reasoning and computing. It has been successfully applied in a number of fields including molecular biology, electrical engineering, operations research and numerical analysis. The central notion is that...

Getting Started with Grunt: The JavaScript Task Runner
Getting Started with Grunt: The JavaScript Task Runner

A hands-on approach to mastering the fundamentals of Grunt

Overview

  • Gain insight on the core concepts of Grunt, Node.js and npm to get started with Grunt.
  • Learn how to install, configure, run, and customize Grunt
  • Example-driven and filled with tips to help you create custom...
Result Page: 21 20 19 18 17 16 15 14 13 12 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy