Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Docker - Second Edition: Build, ship, and scale faster
Learning Docker - Second Edition: Build, ship, and scale faster

Docker lets you create, deploy, and manage your applications anywhere at anytime – flexibility is key so you can deploy stable, secure, and scalable app containers across a wide variety of platforms and delve into microservices architecture

About This Book

  • This up-to-date edition...
Honeypots and Routers: Collecting Internet Attacks
Honeypots and Routers: Collecting Internet Attacks

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...

Securing the Internet of Things
Securing the Internet of Things

Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues...

PHP Cookbook: Solutions & Examples for PHP Programmers
PHP Cookbook: Solutions & Examples for PHP Programmers

Want to understand a certain PHP programming technique? Or learn how to accomplish a particular task? This cookbook is the first place to look. With more than 350 code-rich recipes revised for PHP 5.4 and 5.5, this third edition provides updated solutions for generating dynamic web content—everything from using basic data types...

The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that...
Secure Java: For Web Application Development
Secure Java: For Web Application Development

Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure...

Django Design Patterns and Best Practices
Django Design Patterns and Best Practices

Easily build maintainable websites with powerful and relevant Django design patterns

About This Book

  • Unravel the common problems of web development in Django
  • Learn the current best practices while working in Django 1.7 and Python 3.4
  • Experience the challenges of working on...
ASP.NET MVC 4 and the Web API: Building a REST Service from Start to Finish
ASP.NET MVC 4 and the Web API: Building a REST Service from Start to Finish

This one hundred page book focuses exclusively on how you can best use the ASP.NET MVC 4 Framework to build world-class REST services using the Web API. It sets aside much of what the ASP.NET MVC Framework can do, and focuses exclusively on how the Web API can help you build web services. You will not find any help on CSS, HTML, JavaScript,...

ASP.NET Web API 2: Building a REST Service from Start to Finish
ASP.NET Web API 2: Building a REST Service from Start to Finish

The ASP.NET MVC Framework has always been a good platform on which to implement REST-based services, but the introduction of the ASP.NET Web API Framework raised the bar to a whole new level.

Now in release version 2.1, the Web API Framework has evolved into a powerful and refreshingly usable platform. This concise book provides...

Defensive Security Handbook: Best Practices for Securing Infrastructure
Defensive Security Handbook: Best Practices for Securing Infrastructure

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...

Native Docker Clustering with Swarm
Native Docker Clustering with Swarm

Key Features

  • Get to grips with Docker Swarm, one of the key components of the Docker ecosystem.
  • Optimize Swarm and SwarmKit features for scaling massive applications through containers.
  • Learn about Docker’s scheduling tricks, high availability, security, and platform scalability.
  • ...
2500 Keywords to Get You Hired
2500 Keywords to Get You Hired

Make that important first cut with a resume that packs a punch with 2500 Keywords to Get You Hired

What's in a word? When used effectively on your resume, the right words could land you your next job! 2500 Keywords to Get You Hired breaks down the buzz on buzzwords-those powerful little...

Result Page: 39 38 37 36 35 34 33 32 31 30 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy