Home | Amazing | Today | Tags | Publishers | Years | Search 
Practical Docker with Python: Build, Release and Distribute your Python App with Docker
Practical Docker with Python: Build, Release and Distribute your Python App with Docker
Learn the key differences between containers and virtual machines. Adopting a project based approach, this book introduces you to a simple Python application to be developed and containerized with Docker.

After an introduction to Containers and Docker you'll be guided through Docker installation and...
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing

Learn how to hack systems like black hat hackers and secure them like security experts

Key Features

  • Understand how computer systems work and their vulnerabilities
  • Exploit weaknesses and hack into machines to test their security
  • Learn how to secure systems...
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

PostgreSQL 11 Server Side Programming Quick Start Guide: Effective database programming and interaction
PostgreSQL 11 Server Side Programming Quick Start Guide: Effective database programming and interaction

Extend PostgreSQL using PostgreSQL server programming to create, test, debug, and optimize a range of user-defined functions in your favorite programming language

Key Features

  • Learn the concepts of PostgreSQL 11 with lots of real-world datasets and examples
  • Learn queries,...
Agile Project Management with Azure DevOps: Concepts, Templates, and Metrics
Agile Project Management with Azure DevOps: Concepts, Templates, and Metrics

Roll up your sleeves and jump into Agile project management to use and customize Microsoft Azure DevOps. Organizations adopt Agile practices because they are a key enabler to run better projects, get more successful end results, and achieve an overall higher quality output. To benefit the most from Agile, you need an Application Life...

Understand, Manage, and Prevent Algorithmic Bias: A Guide for Business Users and Data Scientists
Understand, Manage, and Prevent Algorithmic Bias: A Guide for Business Users and Data Scientists

Are algorithms friend or foe?

The human mind is evolutionarily designed to take shortcuts in order to survive. We jump to conclusions because our brains want to keep us safe. A majority of our biases work in our favor, such as when we feel a car speeding in our direction is dangerous and we instantly move, or when we...

C++17 Standard Library Quick Reference: A Pocket Guide to Data Structures, Algorithms, and Functions
C++17 Standard Library Quick Reference: A Pocket Guide to Data Structures, Algorithms, and Functions
This quick reference is a condensed guide to the essential data structures, algorithms, and functions provided by the C++17 Standard Library. It does not explain the C++ language or syntax, but is accessible to anyone with basic C++ knowledge or programming experience. Even the most experienced C++ programmer will learn a thing or two...
The C++ Programming Language: Special Edition (3rd Edition)
The C++ Programming Language: Special Edition (3rd Edition)

More than three-quarters of a million programmers have benefited from this book in all of its editions

 

Written by Bjarne Stroustrup, the creator of C++, this is the world's most trusted and widely read book on C++.

 

...
Probabilistic Databases (Synthesis Lectures on Data Management)
Probabilistic Databases (Synthesis Lectures on Data Management)
Probabilistic databases are databases where the value of some attributes or the presence of some records are uncertain and known only with some probability. Applications in many areas such as information extraction, RFID and scientific data management, data cleaning, data integration, and financial risk assessment produce large volumes of...
Strontium Contamination in the Environment (The Handbook of Environmental Chemistry)
Strontium Contamination in the Environment (The Handbook of Environmental Chemistry)

This book provides an authoritative review of the origin and extraction of strontium and its impact on the environment. It also presents the latest strontium decontamination and remediation strategies. Around the globe, nuclear power is being recognized as a major source of energy and is expected to play a crucial role in...

Pediatric Primary Care: Practice Guidelines for Nurses
Pediatric Primary Care: Practice Guidelines for Nurses
Pediatric Primary Care: Practice Guidelines for Nurses, Fourth Edition is a comprehensive resource for well-child management and acute care management of childhood illnesses in a primary care setting. Written by practicing experts, this text is intended for advanced practice nursing students as a quick reference guide once they enter...
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
The only official study guide for the new CCSP exam

(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you...

Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy