Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Professional Scala: Combine object-oriented and functional programming to build high-performance applications
Professional Scala: Combine object-oriented and functional programming to build high-performance applications

If your application source code is overly verbose, it can be a nightmare to maintain. Write concise and expressive, type-safe code in an environment that lets you build for the JVM, browser, and more.

Key Features

  • Expert guidance that shows you to efficiently use both object-oriented and...
Practical Docker with Python: Build, Release and Distribute your Python App with Docker
Practical Docker with Python: Build, Release and Distribute your Python App with Docker
Learn the key differences between containers and virtual machines. Adopting a project based approach, this book introduces you to a simple Python application to be developed and containerized with Docker.

After an introduction to Containers and Docker you'll be guided through Docker installation and...
MongoDB 4 Quick Start Guide: Learn the skills you need to work with the world's most popular NoSQL database
MongoDB 4 Quick Start Guide: Learn the skills you need to work with the world's most popular NoSQL database

A fast paced guide that will help you to create, read, update and delete data using MongoDB

Key Features

  • Create secure databases with MongoDB
  • Manipulate and maintain your database
  • Model and use data in a No SQL environment with MongoDB

...

Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing

Learn how to hack systems like black hat hackers and secure them like security experts

Key Features

  • Understand how computer systems work and their vulnerabilities
  • Exploit weaknesses and hack into machines to test their security
  • Learn how to secure systems...
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

Understand malware analysis and its practical implementation

Key Features

  • Explore the key concepts of malware analysis and memory forensics using real-world examples
  • Learn the art of detecting, analyzing, and investigating malware threats
  • Understand...
Modern API Design with ASP.NET Core 2: Building Cross-Platform Back-End Systems
Modern API Design with ASP.NET Core 2: Building Cross-Platform Back-End Systems
Use ASP.NET Core 2 to create durable and cross-platform web APIs through a series of applied, practical scenarios. Examples in this book help you build APIs that are fast and scalable. You’ll progress from the basics of the framework through to solving the complex problems encountered in implementing secure RESTful services....
Hands-On Microservices with Rust: Build, test, and deploy scalable and reactive microservices with Rust 2018
Hands-On Microservices with Rust: Build, test, and deploy scalable and reactive microservices with Rust 2018

A comprehensive guide in developing and deploying high performance microservices with Rust

Key Features

  • Start your microservices journey and get a broader perspective on microservices development using RUST 2018,
  • Build, deploy, and test microservices using AWS
  • ...
Deep Learning Quick Reference: Useful hacks for training and optimizing deep neural networks with TensorFlow and Keras
Deep Learning Quick Reference: Useful hacks for training and optimizing deep neural networks with TensorFlow and Keras

Dive deeper into neural networks and get your models trained, optimized with this quick reference guide

Key Features

  • A quick reference to all important deep learning concepts and their implementations
  • Essential tips, tricks, and hacks to train a variety of deep learning...
Ethereum Projects for Beginners: Build blockchain-based cryptocurrencies, smart contracts, and DApps
Ethereum Projects for Beginners: Build blockchain-based cryptocurrencies, smart contracts, and DApps

Understand the Ethereum platform to build distributed applications that are secured and decentralized using blockchain technology

Key Features

  • Build your own decentralized applications using real-world blockchain examples
  • Implement Ethereum for building smart contracts and...
Principles of Package Design: Creating Reusable Software Components
Principles of Package Design: Creating Reusable Software Components
Apply design principles to your classes, preparing them for reuse. You will use package design principles to create packages that are just right in terms of cohesion and coupling, and are user- and maintainer-friendly at the same time.


The first part of this book walks you through the five SOLID principles
...
Modern Python Standard Library Cookbook: Over 100 recipes to fully leverage the features of the standard library in Python
Modern Python Standard Library Cookbook: Over 100 recipes to fully leverage the features of the standard library in Python

Build optimized applications in Python by smartly implementing the standard library

Key Features

  • Strategic recipes for effective application development in Python
  • Techniques to create GUIs and implement security through cryptography
  • Best practices for...
Result Page: 44 43 42 41 40 39 38 37 36 35 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy