Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Flask Web Development: Build enterprise-grade, scalable Python web applications, 2nd Edition
Mastering Flask Web Development: Build enterprise-grade, scalable Python web applications, 2nd Edition

Learn to build modern, secure, highly available web MVC applications and API's using Python`s Flask framework.

Key Features

  • Create production-ready MVC and REST API with the dynamic features of Flask
  • Utilize the various extensions like Flask-JWT and Flask-SQLAlchemy to...
How to Cheat at Securing Linux
How to Cheat at Securing Linux
Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system for the majority of their servers designed for medium to large size businesses. As with any technologies, increased...
CompTIA A+ Exam Prep (Exams A+ Essentials, 220-602, 220-603, 220-604)
CompTIA A+ Exam Prep (Exams A+ Essentials, 220-602, 220-603, 220-604)
This book covers every skill measured by the latest A+ Exams including:
  • Understanding all essential PC terminology, concepts, internal components, and peripherals
  • Installing, upgrading, configuring, and optimizing PC components
  • Troubleshooting hardware and performing essential preventive maintenance
  • ...
Pro ASP.NET 4.5 in C#
Pro ASP.NET 4.5 in C#

ASP.NET 4.5 remains Microsoft's preferred technology for creating dynamic websites, providing developers with unrivaled power and flexibility.

Pro ASP.NET 4.5 in C# is the most complete reference to ASP.NET that you will find. This comprehensively revised fifth edition will teach you everything you need to know in...

Elastix Unified Communications Server Cookbook
Elastix Unified Communications Server Cookbook

More than 140 real-life, hands-on recipes and tips to install, deploy, administer, and maintain any VoIP/Unified Communications solution based on Elastix

About This Book

  • Enable a full cost-effective unified communications server solution
  • Go from a single server configuration to a...
Professional ASP.NET 2.0 Security, Membership, and Role Management (Wrox Professional Guides)
Professional ASP.NET 2.0 Security, Membership, and Role Management (Wrox Professional Guides)
ASP.Net security covers a broad range of subjects. Concepts such as Web security features, developing in partial trust, forms authentication, and securing configuration - just to name a few p are all integral components to helping developers ensure reliable security. Addressing the ASP.NET security features from the developer's point of view, this...
Getting an Information Security Job For Dummies
Getting an Information Security Job For Dummies

Get prepared for your Information Security job search! Do you want to equip yourself with the knowledge necessary to succeed in the Information Security job market? If so, you've come to the right place. Packed with the latest and most effective strategies for landing a lucrative job in this popular and quickly-growing field, Getting an...

Securing Web Services with WS-Security : Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
Securing Web Services with WS-Security : Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption

The most up to date, comprehensive, and practical guide to Web services security, and the first to cover the final release of new standards SAML 1.1 and WS-Security.>

  • Comprehensive coverage and practical examples of the industry...

Securing the Internet of Things
Securing the Internet of Things

Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues...

Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux: A Guide to Open Source Security is designed to help you deploy a Linux system on the Internet in a variety of security roles.This book provides practical instructions and pointers concerning the open source security tools that we use every day.

First, we show you how to obtain
...
Docker Cookbook: Over 100 practical and insightful recipes to build distributed applications with Docker , 2nd Edition
Docker Cookbook: Over 100 practical and insightful recipes to build distributed applications with Docker , 2nd Edition

Leverage Docker to deploying software at scale

Key Features

  • Leverage practical examples to manage containers efficiently
  • Integrate with orchestration tools such as Kubernetes for controlled deployments
  • Learn to implement best practices on improving...
Securing Windows Server 2008: Prevent Attacks from Outside and Inside Your Organization
Securing Windows Server 2008: Prevent Attacks from Outside and Inside Your Organization
With the introduction of new revisions to Microsoft products—for example, Windows, Exchange, and Communications Server—we have seen a trend toward “roles” within each product, as opposed to the various products being an all-in-one type of solution (as with Exchange 2007), or being additional features that work as a snap-in,...
unlimited object storage image
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy