Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Kubernetes on Azure: Run your applications securely and at scale on the most widely adopted orchestration platform
Hands-On Kubernetes on Azure: Run your applications securely and at scale on the most widely adopted orchestration platform

Efficiently deploy and manage Kubernetes clusters on a cloud

Key Features

  • Deploy highly scalable applications with Kubernetes on Azure
  • Leverage AKS to deploy, manage, and operations of Kubernetes
  • Gain best practices from this guide to increase efficiency...
Securing SQL Server: DBAs Defending the Database
Securing SQL Server: DBAs Defending the Database
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database enterprise. This new edition covers threat analysis, common attacks and countermeasures, and provides an introduction to compliance that is useful for meeting regulatory requirements such as the GDPR. The...
Building Microservices with Go
Building Microservices with Go

Key Features

  • This short, concise, and practical guide is packed with real-world examples of building microservices with Go
  • It is easy to read and will benefit smaller teams who want to extend the functionality of their existing systems
  • Using this practical approach will save your money in...
Mastering VMware vSphere 6.7: Effectively deploy, manage, and monitor your virtual datacenter with VMware vSphere 6.7, 2nd Edition
Mastering VMware vSphere 6.7: Effectively deploy, manage, and monitor your virtual datacenter with VMware vSphere 6.7, 2nd Edition

Unleash the power of VMware vSphere 6.7 to develop a powerful, flexible, and secure digital infrastructure

Key Features

  • Explore management, security, scalability, and availability with vSphere 6.7
  • Design, deploy, and manage VMware vSphere virtual datacenters
  • ...
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Develop blockchain application with step-by-step instructions, working example and helpful recommendations

Key Features

  • Understanding the blockchain technology from the cybersecurity perspective
  • Developing cyber security solutions with Ethereum blockchain technology
  • ...
PostgreSQL Administration Cookbook, 9.5/9.6 Edition
PostgreSQL Administration Cookbook, 9.5/9.6 Edition

Over 150 recipes to help you administer your PostgreSQL database more efficiently

About This Book

  • Get to grips with the capabilities of PostgreSQL 9.6 to administer your database more efficiently
  • Monitor, tune, secure and protect your database
  • A step-by-step, recipe-based...
Pro Power BI Architecture: Sharing, Security, and Deployment Options for Microsoft Power BI Solutions
Pro Power BI Architecture: Sharing, Security, and Deployment Options for Microsoft Power BI Solutions
Architect and deploy a Power BI solution. This book will help you understand the many available options and choose the best combination for hosting, developing, sharing, and deploying a Power BI solution within your organization.

Pro Power BI Architecture provides detailed examples and explains...
Secure Java: For Web Application Development
Secure Java: For Web Application Development

Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure...

Jira 8 Administration Cookbook: Over 90 recipes to administer, customize, and extend Jira Core and Jira Service Desk, 3rd Edition
Jira 8 Administration Cookbook: Over 90 recipes to administer, customize, and extend Jira Core and Jira Service Desk, 3rd Edition

Build customized solutions that fulfil your business requirements using the latest features of Jira 8

Key Features

  • Learn how to customize Jira applications to suit your organizational requirements
  • Extend Jira's capabilities for custom integrations with other products...
Venture Capital Funding: A Practical Guide to Raising Finance
Venture Capital Funding: A Practical Guide to Raising Finance
After the problems caused by the dot com boom, there is now renewed interest in venture capital: private equity funds are reporting significantly increased levels of activity both in the UK and worldwide. The Bank of England regards assisting firms to become "investment ready" as the single most important task facing financial...
Defensive Security Handbook: Best Practices for Securing Infrastructure
Defensive Security Handbook: Best Practices for Securing Infrastructure

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...

Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names
Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names

This book will give you an all encompassing view of the domain name ecosystem combined with a comprehensive set of operations strategies.

Key Features

  • Manage infrastructure, risk, and management of DNS name servers. Get hands-on with factors like types of name servers, DNS queries and and...
Result Page: 42 41 40 39 38 37 36 35 34 33 32 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy