Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Docker in Practice
Docker in Practice

Summary

An open source container system, Docker makes deploying applications painless and flexible. Docker is powerful and simple to use, and it makes life easier for developers and administrators alike providing shorter build times, fewer production bugs, and effortless application roll-out.

About...

Ethereum Projects for Beginners: Build blockchain-based cryptocurrencies, smart contracts, and DApps
Ethereum Projects for Beginners: Build blockchain-based cryptocurrencies, smart contracts, and DApps

Understand the Ethereum platform to build distributed applications that are secured and decentralized using blockchain technology

Key Features

  • Build your own decentralized applications using real-world blockchain examples
  • Implement Ethereum for building smart contracts and...
RESTful Web API Design with Node.JS - Second Edition
RESTful Web API Design with Node.JS - Second Edition

Key Features

  • Create a fully featured RESTful API solution from scratch.
  • Learn how to leverage Node.JS, Express, MongoDB and NoSQL datastores to give an extra edge to your REST API design.
  • Use this practical guide to integrate MongoDB in your Node.js application.

Book...

Human-Friendly Robotics 2020: 13th International Workshop (Springer Proceedings in Advanced Robotics, 18)
Human-Friendly Robotics 2020: 13th International Workshop (Springer Proceedings in Advanced Robotics, 18)

This book presents recent methodological, technological, and experimental developments concerning human-friendly robots and their introduction into everyday life.

The book contains a selection of 10 papers presented at the 13th edition of the International Workshop on Human-Friendly Robotics (HFR).

...

Tame Your Anxiety: Rewiring Your Brain for Happiness
Tame Your Anxiety: Rewiring Your Brain for Happiness

Anxiety is natural. Calm is learned.

If you didn’t learn yesterday, you can learn today.

It’s not easy, of course. Once your natural alarm system is triggered, it’s hard to find the off switch. Indeed, you don’t have an off switch until you build one....

Blazor Revealed: Building Web Applications in .NET
Blazor Revealed: Building Web Applications in .NET
Build web applications in Microsoft .NET that run in any modern browser, helping you to transfer your .NET experience and skills to a new environment and build browser-based applications using a robust and type-safe language and runtime. Developing a web site with rich client-side behavior means most developers need to learn a...
Bitcoin for the Befuddled
Bitcoin for the Befuddled

Unless you've been living under a rock for the last couple of years, you've probably heard of Bitcoin—the game-changing digital currency used by millions worldwide.

But Bitcoin isn't just another way to buy stuff. It's an anonymous, revolutionary, cryptographically secure currency that functions...

Modern API Design with ASP.NET Core 2: Building Cross-Platform Back-End Systems
Modern API Design with ASP.NET Core 2: Building Cross-Platform Back-End Systems
Use ASP.NET Core 2 to create durable and cross-platform web APIs through a series of applied, practical scenarios. Examples in this book help you build APIs that are fast and scalable. You’ll progress from the basics of the framework through to solving the complex problems encountered in implementing secure RESTful services....
Consciousness Medicine: Indigenous Wisdom, Entheogens, and Expanded States of Consciousness for Healing and Growth
Consciousness Medicine: Indigenous Wisdom, Entheogens, and Expanded States of Consciousness for Healing and Growth
"Françoise Bourzat has written an authoritative book on guided psychedelic therapy with important lessons for anyone thinking of either guiding or being guided.” —Michael Pollan via Twitter

A comprehensive guide to the safe and ethical application of expanded states of
...
Pro iOS Security and Forensics: Enterprise iPhone and iPad Safety
Pro iOS Security and Forensics: Enterprise iPhone and iPad Safety
Examine how to keep iOS devices safe in the physical world, including creating company policies for iPhones; assessing and defending against cyber vulnerabilities and attacks; working with preinstalled as well as third party tools; and strategies for keeping your data safe including backing up and screen locks.

...
CORS in Action: Creating and consuming cross-origin APIs
CORS in Action: Creating and consuming cross-origin APIs

Summary

CORS in Action introduces Cross-Origin Resource Sharing (CORS) from both the server and the client perspective. It starts with the basics: how to make CORS requests and how to implement CORS on the server. It then explores key details such as performance, debugging, and security. API authors will...

Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Ever wonder how easy it is to hack into someone’s bank account info while surfing the net at your local Starbucks? Learning how to hack is one of the best preventative measures you can take when protecting yourself from other hackers. Hacking is often misunderstood and that is for good reason. Many people use hacking as...
unlimited object storage image
Result Page: 47 46 45 44 43 42 41 40 39 38 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy