Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Software Engineering for Absolute Beginners: Your Guide to Creating Software Products
Software Engineering for Absolute Beginners: Your Guide to Creating Software Products

Start programming from scratch, no experience required. This beginners’ guide to software engineering starts with a discussion of the different editors used to create software and covers setting up a Docker environment. Next, you will learn about repositories and version control along with its uses. Now that you are ready to...

Software Architecture with C++: Design modern systems using effective architecture concepts, design patterns, and techniques with C++20
Software Architecture with C++: Design modern systems using effective architecture concepts, design patterns, and techniques with C++20

Apply business requirements to IT infrastructure and deliver a high-quality product by understanding architectures such as microservices, DevOps, and cloud-native using modern C++ standards and features

Key Features

  • Design scalable large-scale applications with the C++ programming...
Azure Arc-Enabled Data Services Revealed: Early First Edition Based on Public Preview
Azure Arc-Enabled Data Services Revealed: Early First Edition Based on Public Preview
For many years, major software companies like Microsoft and Oracle made previously unfathomable profits by selling enterprise software that companies would buy and operate in their own data centers. In the last 20 years, we have seen a gradual transition to a wide variety of software and services models – SaaS, IaaS, PaaS...
Authentication and Access Control: Practical Cryptography Methods and Tools
Authentication and Access Control: Practical Cryptography Methods and Tools
The advent of the Internet has allowed for many services and applications, most notably in communications between users, servers, and devices. Unfortunately, this has led to many security challenges and problems. Recent examples include password leakage on large social network sites and defacement of websites. It is, therefore,...
ASP.NET Core 5 and Angular: Full-stack web development with .NET 5 and Angular 11, 4th Edition
ASP.NET Core 5 and Angular: Full-stack web development with .NET 5 and Angular 11, 4th Edition

Build robust modern web applications using .NET 5, Entity Framework Core, and Angular 11

Key Features

  • Updated with the latest features and additions in ASP.NET Core 5 and Angular 11
  • Design, build, and deploy a Single Page Application or Progressive Web App
  • ...
Docker Cookbook: Over 100 practical and insightful recipes to build distributed applications with Docker , 2nd Edition
Docker Cookbook: Over 100 practical and insightful recipes to build distributed applications with Docker , 2nd Edition

Leverage Docker to deploying software at scale

Key Features

  • Leverage practical examples to manage containers efficiently
  • Integrate with orchestration tools such as Kubernetes for controlled deployments
  • Learn to implement best practices on improving...
Computer Programming for Beginners and Cybersecurity: The Ultimate Manual to Learn step by step how to Professionally Code and Protect Your Data. This Book includes: Python, Java, C++ & Cybersecurity
Computer Programming for Beginners and Cybersecurity: The Ultimate Manual to Learn step by step how to Professionally Code and Protect Your Data. This Book includes: Python, Java, C++ & Cybersecurity

Are you looking for the right Guide to improve your technical skills in programming and cybersecurity?

Would you like to start your own business or look for a job with better knowledge in computer programming and data protection?

Would you like to be sure to have in your hands a manual...

Pro Cryptography and Cryptanalysis with C++20: Creating and Programming Advanced Algorithms
Pro Cryptography and Cryptanalysis with C++20: Creating and Programming Advanced Algorithms
Knowledge is one of the most important aspects to consider when designing and implementing complex systems, such as companies, organizations, military operations, and so on. Information falling into the wrong hands can be a tragedy and can result in a huge loss of business or disastrous outcomes. To guarantee the security of...
Oracle PL/SQL for DBAs
Oracle PL/SQL for DBAs

PL/SQL, Oracle's powerful procedural language, has been the cornerstone of Oracle application development for nearly 15 years. Although primarily a tool for developers, PL/SQL has also become an essential tool for database administration, as DBAs take increasing responsibility for site performance and as the lines between...

Splunk Certified Study Guide: Prepare for the User, Power User, and Enterprise Admin Certifications
Splunk Certified Study Guide: Prepare for the User, Power User, and Enterprise Admin Certifications

Make your Splunk certification easier with this exam study guide that covers the User, Power User, and Enterprise Admin certifications. This book is divided into three parts. The first part focuses on the Splunk User and Power User certifications starting with how to install Splunk, Splunk Processing Language (SPL), field...

Mastering Docker
Mastering Docker

Rethink what's possible with Docker – become an expert in the innovative containerization tool to unlock new opportunities in the way you use and deploy software

About This Book

  • Create highly scalable applications and services using the Linux container virtualization paradigm
  • ...
Pro SQL Server 2012 Practices
Pro SQL Server 2012 Practices

Pro SQL Server 2012 Practices is an anthology of high-end wisdom from a group of accomplished database administrators who are quietly but relentlessly pushing the performance and feature envelope of Microsoft SQL Server 2012. With an emphasis upon performance—but also branching into release...

unlimited object storage image
Result Page: 388 387 386 385 384 383 382 381 380 379 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy