 |
|
 Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.
Personal Cybersecurity addresses the needs of individual users at work and at home. This book... |  |  Using Docker: Developing and Deploying Software with Containers
Docker containers offer simpler, faster, and more robust methods for developing, distributing, and running software than previously available. With this hands-on guide, you’ll learn why containers are so important, what you’ll gain by adopting Docker, and how to make it part of your development... |  |  Mastering Embedded Linux Programming
Key Features
-
Create efficient and secure embedded devices using Linux
-
Minimize project costs by using open source tools and programs
-
Explore each component technology in depth, using sample implementations as a guide
Book Description
Mastering Embedded Linux... |
|
|
|
|
| Result Page: 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 |