Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Docker - Second Edition: Build, ship, and scale faster
Learning Docker - Second Edition: Build, ship, and scale faster

Docker lets you create, deploy, and manage your applications anywhere at anytime – flexibility is key so you can deploy stable, secure, and scalable app containers across a wide variety of platforms and delve into microservices architecture

About This Book

  • This up-to-date edition...
Securing Linux: A Survival Guide for Linux Security
Securing Linux: A Survival Guide for Linux Security
Increase the security of your Linux system with this handy, definitive guide. It presents the latest and best practices for securing a Linux system on both workstations and many server setups.

As the Linux operating system has matured and grown in popularity, security risks have increased. SANS is pleased to announce publication of
...
The Craft of System Security
The Craft of System Security

"I believe The Craft of System Security is one of the best software security books on the market today. It has not only breadth, but depth, covering topics ranging from cryptography, networking, and operating systems--to the Web, computer-human interaction, and how...

Organizational Behavior: Securing Competitive Advantage
Organizational Behavior: Securing Competitive Advantage

In today’s business environment, competition arises when other organizations seek to do what your company does, only better. Advantage is gained when you can do something your competitors find difficult to duplicate. Competitive advantage is further secured when competitors cannot duplicate your company’s special ability at all.

...
Microsoft SQL Server 2012 Security Cookbook
Microsoft SQL Server 2012 Security Cookbook
Microsoft SQL Server is becoming a more mature, more feature-rich, and more secure database management system with each new version. SQL Server 2012 is an enterprise-class relational database server. Sometimes, it might not look like it to the staff whose responsibilities are to deploy it, to create databases and write T-SQL code, and to...
Developing Middleware in Java EE 8: Build robust middleware solutions using the latest technologies and trends
Developing Middleware in Java EE 8: Build robust middleware solutions using the latest technologies and trends

Use Java features such as JAX-RS, EJBs, and JPAs to build powerful middleware for newer architectures such as the cloud

Key Features

  • Explore EJBs to build middleware solutions for enterprise and distributed applications
  • Understand middleware designs such as event-based and...
Architecting Microsoft Azure Solutions – Exam Guide 70-535: A complete guide to passing the 70-535 Architecting Microsoft Azure Solutions exam
Architecting Microsoft Azure Solutions – Exam Guide 70-535: A complete guide to passing the 70-535 Architecting Microsoft Azure Solutions exam

Get certified as an Azure architect by acing the 70-535 Architecting Microsoft Solutions (70-535) exam using this comprehensive guide with full coverage of the exam objectives

Key Features

  • Learn to successfully design and architect powerful solutions on the Azure Cloud platform
  • ...
Pro ASP.NET Web API Security: Securing ASP.NET Web API
Pro ASP.NET Web API Security: Securing ASP.NET Web API

ASP.NET Web API is a key part of ASP.NET MVC 4 and the platform of choice for building RESTful services that can be accessed by a wide range of devices. Everything from JavaScript libraries to RIA plugins, RFID readers to smart phones can consume your services using platform-agnostic HTTP.

With such wide accessibility,
...

ASP.NET Web API 2 Recipes: A Problem-Solution Approach
ASP.NET Web API 2 Recipes: A Problem-Solution Approach

ASP.NET Web API 2 Recipes provides you with the code to solve a full range of Web API problems and question marks that you might face when developing line-of-business applications. ASP.NET Web API 2 Recipes gives you an in-depth explanation for each of these scenarios and shows you how to use Web API with a vast array of...

Microsoft Forefront Security Administration Guide
Microsoft Forefront Security Administration Guide
Microsoft Forefront is a comprehensive suite of security products that will provide companies with multiple layers of defense against threats. Computer and Network Security is a paramount issue for companies in the global marketplace. Businesses can no longer afford for their systems to go down because of viruses, malware, bugs, trojans, or other...
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

Must-have guide for professionals responsible for securing credit and debit card transactions

As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking...

Professional ASP.NET 1.1 (Programmer to Programmer)
Professional ASP.NET 1.1 (Programmer to Programmer)

Written by a high-profile team of ASP.NET experts, this fully updated Professional guide enables you to take full advantage of the power and possibilities of ASP.NET 1.1. You will travel beyond the basics of ASP.NET Web pages, server controls, and data management to a complete understanding of Web services, debugging, performance, migration, and...

unlimited object storage image
Result Page: 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy