Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Docker - Second Edition: Build, ship, and scale faster
Learning Docker - Second Edition: Build, ship, and scale faster

Docker lets you create, deploy, and manage your applications anywhere at anytime – flexibility is key so you can deploy stable, secure, and scalable app containers across a wide variety of platforms and delve into microservices architecture

About This Book

  • This up-to-date edition...
Securing Linux: A Survival Guide for Linux Security
Securing Linux: A Survival Guide for Linux Security
Increase the security of your Linux system with this handy, definitive guide. It presents the latest and best practices for securing a Linux system on both workstations and many server setups.

As the Linux operating system has matured and grown in popularity, security risks have increased. SANS is pleased to announce publication of
...
MCSA/MCSE 70-291 Exam Cram: Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (2nd Edition)
MCSA/MCSE 70-291 Exam Cram: Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (2nd Edition)

MCSA/MCSE 70-291 Exam Cram, Second Edition is the #1 quick-study guide to passing the MCSA/MCSE 70-291 exam. This book covers all exam objectives, including how to maintain a DHCP server, manage name resolution with DNS, secure networks using IPSec, troubleshoot network and Internet connectivity, and monitor network...

The Craft of System Security
The Craft of System Security

"I believe The Craft of System Security is one of the best software security books on the market today. It has not only breadth, but depth, covering topics ranging from cryptography, networking, and operating systems--to the Web, computer-human interaction, and how...

Organizational Behavior: Securing Competitive Advantage
Organizational Behavior: Securing Competitive Advantage

In today’s business environment, competition arises when other organizations seek to do what your company does, only better. Advantage is gained when you can do something your competitors find difficult to duplicate. Competitive advantage is further secured when competitors cannot duplicate your company’s special ability at all.

...
Documentum 6.5 Content Management Foundations
Documentum 6.5 Content Management Foundations

EMC Documentum is a leading Enterprise Content Management technology platform that helps enterprises to streamline the capture, processing, and distribution of business information including documents, records, e-mails, web content, images, reports, and digital assets. EMC Proven Professional is an exam-based certification program, which...

Microsoft SQL Server 2012 Security Cookbook
Microsoft SQL Server 2012 Security Cookbook
Microsoft SQL Server is becoming a more mature, more feature-rich, and more secure database management system with each new version. SQL Server 2012 is an enterprise-class relational database server. Sometimes, it might not look like it to the staff whose responsibilities are to deploy it, to create databases and write T-SQL code, and to...
Security Awareness: Applying Practical Security in Your World
Security Awareness: Applying Practical Security in Your World

For most students and computer users, practical computer security poses some daunting challenges: What type of attacks will antivirus software prevent? How do I set up a firewall? How can I test my computer to be sure that attackers cannot reach it through the Internet? When and how should I install Windows patches? SECURITY AWARENESS:...

Beginning Ubuntu for Windows and Mac Users
Beginning Ubuntu for Windows and Mac Users

Beginning Ubuntu for Windows and Mac Users is your comprehensive guide to using Ubuntu. You already know how to use a computer running Windows or OS X, but learning a new operating system can feel daunting. If you've been afraid to try Ubuntu because you don't know where to start, this book will show you how to get the...

Seamless and Secure Communications over Heterogeneous Wireless Networks (SpringerBriefs in Computer Science)
Seamless and Secure Communications over Heterogeneous Wireless Networks (SpringerBriefs in Computer Science)

This brief provides an overview of the requirements, challenges, design issues and major techniques for seamless and secure communications over heterogeneous wireless networks. It summarizes and provides detailed insights into the latest research on handoff management, mobility management, fast authentication and security management to...

Developing Middleware in Java EE 8: Build robust middleware solutions using the latest technologies and trends
Developing Middleware in Java EE 8: Build robust middleware solutions using the latest technologies and trends

Use Java features such as JAX-RS, EJBs, and JPAs to build powerful middleware for newer architectures such as the cloud

Key Features

  • Explore EJBs to build middleware solutions for enterprise and distributed applications
  • Understand middleware designs such as event-based and...
PHP and MySQL Web Development
PHP and MySQL Web Development
PHP & MySQL Web Development teaches the reader to develop dynamic, secure e-commerce Web sites and Web applications. The book shows how to integrate and implement these technologies by following real-world examples and working sample projects. It also covers the related technologies needed to build a commercial...
unlimited object storage image
Result Page: 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 95 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy