Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit
Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit

Add cybersecurity to your value proposition and protect your company from cyberattacks

Cybersecurity is now a requirement for every company in the world regardless of size or industry. Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit covers everything a founder, entrepreneur and...

Kubernetes: Preparing for the CKA and CKAD Certifications
Kubernetes: Preparing for the CKA and CKAD Certifications
Kubernetes is a recent platform, based on more than ten years of experience in cloud computing by big companies like Google, its creator. It is considered complex as it includes all the concepts to run diverse applications in a large variety of environments.

This book, based on the curricula of the two Kubernetes
...
C# Game Programming Cookbook for Unity 3D
C# Game Programming Cookbook for Unity 3D

This second edition of C# Game Programming Cookbook for Unity 3D expounds upon the first with more details and techniques. With a fresh array of chapters, updated C# code and examples, Jeff W. Murray’s book will help the reader understand structured game development in Unity unlike ever before.

New to this...

TABLEAU FOR BUSINESS USERS: A hands-on approach
TABLEAU FOR BUSINESS USERS: A hands-on approach
Data-Driven decision making is no longer a "nice to have" in today's context but an absolute must. Unfortunately, most business users don't necessarily have the right tools and the skills to question the data and derive meaningful insights. This is where Tableau, as a data visualization tool, shines and provides an...
Python: Beginner's Guide to Artificial Intelligence: Build applications to intelligently interact with the world around you using Python
Python: Beginner's Guide to Artificial Intelligence: Build applications to intelligently interact with the world around you using Python

Develop real-world applications powered by the latest advances in intelligent systems

Key Features

  • Gain real-world contextualization using deep learning problems concerning research and application
  • Get to know the best practices to improve and optimize your machine...
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
Effective Digital Learning: Transforming Traditional Learning Models to a Virtual World
Effective Digital Learning: Transforming Traditional Learning Models to a Virtual World

Traditional learning as we know it has evolved. Gone are the days when students need to travel to a physical location to learn. With the increase of mobile devices and broadband Internet services, learning can take place anywhere at any time. Effective Digital Learning is here to help you make the paradigm shift with...

Introduction to Finite Element Analysis Using MATLAB® and Abaqus
Introduction to Finite Element Analysis Using MATLAB® and Abaqus

There are some books that target the theory of the finite element, while others focus on the programming side of things. Introduction to Finite Element Analysis Using MATLAB® and Abaqus accomplishes both. This book teaches the first principles of the finite element method. It presents the theory of the finite...

Design Concepts with Code: An Approach for Developers
Design Concepts with Code: An Approach for Developers

This book is all about getting developers to realize good, solid interface design for their products by considering a reasonable set of design axioms. Design Concepts with Code: An Approach for Developers shows how you can create design through code by using technologies such as SVG, XHTML, XML, XSLT, and XSL-FO. It explores how, by...

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Ansi/Iso C++ Professional Programmer's Handbook (Que Professional Series)
Ansi/Iso C++ Professional Programmer's Handbook (Que Professional Series)
By that time, hundreds of thousands of people were using the language. C++ compilers were available
for almost every platform. New C++-based frameworks, such as MFC and OWL, had emerged. The
committee had to face enormous pressure from several directions. Some organizations were advocating
new features and extensions to the language
...
MCSA/MCSE Managing and Maintaining a Windows Server 2003 Environment: Exam 70-290 Study Guide and DVD Training System
MCSA/MCSE Managing and Maintaining a Windows Server 2003 Environment: Exam 70-290 Study Guide and DVD Training System
This book’s primary goal is to help you prepare to take and pass Microsoft’s exam number
70-290, Managing and Maintaining a Microsoft Windows Server 2003 Environment. Our secondary
purpose in writing this book is to provide exam candidates with knowledge and
skills that go beyond the minimum requirements for passing the
...
unlimited object storage image
Result Page: 62 61 60 59 58 57 56 55 54 53 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy