Home | Amazing | Today | Tags | Publishers | Years | Search 
DevOps for Digital Leaders: Reignite Business with a Modern DevOps-Enabled Software Factory
DevOps for Digital Leaders: Reignite Business with a Modern DevOps-Enabled Software Factory
Learn to design, implement, measure, and improve DevOps programs that are tailored to your organization. This concise guide assists leaders who are accountable for the rapid development of high-quality software applications.

In DevOps for Digital Leaders, deep collective experience on both...
Object-Oriented JavaScript: Learn everything you need to know about object-oriented JavaScript (OOJS), 3rd Edition
Object-Oriented JavaScript: Learn everything you need to know about object-oriented JavaScript (OOJS), 3rd Edition

Learn everything you need to know about object-oriented JavaScript with this comprehensive guide. Enter the world of cutting-edge development!

Key Features

  • This book has been updated to cover all the new object-oriented features introduced in ECMAScript 6
  • It makes object-oriented...
Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Meet the world's top ethical hackers and explore the tools of the trade

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat...

Reactive Design Patterns
Reactive Design Patterns

Summary

Reactive Design Patterns is a clearly written guide for building message-driven distributed systems that are resilient, responsive, and elastic. In this book you'll find patterns for messaging, flow control, resource management, and concurrency, along with practical issues like test-friendly...

The Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets
The Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets

You can't predict or prevent disasters. That's reality. But with The Disaster Recovery Handbook, you can create a plan to ensure your business will continue and your vital operations, facilities, and assets will be protected. Expect the best. Plan for the worst. Survey the headlines: superstorms, data breaches, pandemics, system...

Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

Cutting-edge techniques for finding and fixing critical security flaws

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s...

Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game
Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game

There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people's limiting factor in their ability to get better jobs is not technical skills or even the soft skills necessary to do well in a new job. It is that getting a job is a completely different skill set and...

Hacking Exposed Mobile: Security Secrets & Solutions
Hacking Exposed Mobile: Security Secrets & Solutions

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Proven security tactics for today's mobile apps,devices, and networks

"A great overview of the new threats created...

Flask Web Development: Developing Web Applications with Python
Flask Web Development: Developing Web Applications with Python

Take full creative control of your web applications with Flask, the Python-based microframework. With the second edition of this hands-on book, you’ll learn Flask from the ground up by developing a complete, real-world application created by author Miguel Grinberg. This refreshed edition accounts for important technology...

Warfare and Weaponry in Dynastic Egypt
Warfare and Weaponry in Dynastic Egypt

Defence. Attack. Symbolism. The development of warfare in any society provides an evocative glance into the lives (and deaths) of our predecessors. This is never more the case than with that most enticing of ancient civilizations, Ancient Egypt. Follow Rebecca Dean through the fascinating world of mysterious figures such as...

Hands-on DevOps: Explore the concept of continuous delivery and integrate it with data science concepts
Hands-on DevOps: Explore the concept of continuous delivery and integrate it with data science concepts

Transform yourself into a specialist in DevOps adoption for Big Data on cloud

Key Features

  • Learn the concepts of Bigdata and Devops and Implement them
  • Get Acquainted with DevOps Frameworks Methodologies and Tools
  • A practical approach to build and work efficiently with your...
Graph Theory, Combinatorics and Algorithms: Interdisciplinary Applications (Operations Research / Computer Science Interfaces Series)
Graph Theory, Combinatorics and Algorithms: Interdisciplinary Applications (Operations Research / Computer Science Interfaces Series)

Graph Theory, Combinatorics and Algorithms: Interdisciplinary Applications focuses on discrete mathematics and combinatorial algorithms interacting with real world problems in computer science, operations research, applied mathematics and engineering. The book contains eleven chapters written by...

Result Page: 134 133 132 131 130 129 128 127 126 125 124 123 122 121 120 119 118 117 116 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy