Learning Docker - Second Edition: Build, ship, and scale faster
Docker lets you create, deploy, and manage your applications anywhere at anytime – flexibility is key so you can deploy stable, secure, and scalable app containers across a wide variety of platforms and delve into microservices architecture
About This Book
This up-to-date edition...
Honeypots and Routers: Collecting Internet Attacks
As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...
Securing the Internet of Things
Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues...
Django Design Patterns and Best Practices
Easily build maintainable websites with powerful and relevant Django design patterns
About This Book
Unravel the common problems of web development in Django
Learn the current best practices while working in Django 1.7 and Python 3.4
Experience the challenges of working on...
ASP.NET MVC 4 and the Web API: Building a REST Service from Start to Finish
ASP.NET Web API 2: Building a REST Service from Start to Finish
The ASP.NET MVC Framework has always been a good platform on which to implement REST-based services, but the introduction of the ASP.NET Web API Framework raised the bar to a whole new level.
Now in release version 2.1, the Web API Framework has evolved into a powerful and refreshingly usable platform. This concise book provides...
Defensive Security Handbook: Best Practices for Securing Infrastructure
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...
Native Docker Clustering with Swarm
Get to grips with Docker Swarm, one of the key components of the Docker ecosystem.
Optimize Swarm and SwarmKit features for scaling massive applications through containers.
Learn about Docker’s scheduling tricks, high availability, security, and platform scalability.
2500 Keywords to Get You Hired
Make that important first cut with a resume that packs a punch with 2500 Keywords to Get You Hired
What's in a word? When used effectively on your resume, the right words could land you your next job! 2500 Keywords to Get You Hired breaks down the buzz on buzzwords-those powerful little...
|Result Page: 39 38 37 36 35 34 33 32 31 30 |