Home | Amazing | Today | Tags | Publishers | Years | Search 
Linux Administration Cookbook: Insightful recipes to work with system administration tasks on Linux
Linux Administration Cookbook: Insightful recipes to work with system administration tasks on Linux

Over 100 recipes to get up and running with the modern Linux administration ecosystem

Key Features

  • Understand and implement the core system administration tasks in Linux
  • Discover tools and techniques to troubleshoot your Linux system
  • Maintain a healthy...
Network Analysis Using Wireshark 2 Cookbook: Practical recipes to analyze and secure your network using Wireshark 2, 2nd Edition
Network Analysis Using Wireshark 2 Cookbook: Practical recipes to analyze and secure your network using Wireshark 2, 2nd Edition

Over 100 recipes to analyze and troubleshoot network problems using Wireshark 2

Key Features

  • Place Wireshark 2 in your network and configure it for effective network analysis
  • Deep dive into the enhanced functionalities of Wireshark 2 and protect your network with ease
  • ...
The Definitive Guide to AdonisJs: Building Node.js Applications with JavaScript
The Definitive Guide to AdonisJs: Building Node.js Applications with JavaScript

Learn everything you need to master the AdonisJs framework, including topics such as interacting with a database, rendering templates, writing asynchronous code, and hosting sites with SSL. Along the way, you’ll see how to build a commerce application, which lists products and allows shoppers to register and purchase those...

Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats
Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats

A comprehensive guide to mastering the art of preventing your Linux system from getting compromised.

Key Features

  • Leverage this guide to confidently deliver a system that reduces the risk of being hacked
  • Perform a number of advanced Linux security techniques such as...
Hands-On Kubernetes on Azure: Run your applications securely and at scale on the most widely adopted orchestration platform
Hands-On Kubernetes on Azure: Run your applications securely and at scale on the most widely adopted orchestration platform

Efficiently deploy and manage Kubernetes clusters on a cloud

Key Features

  • Deploy highly scalable applications with Kubernetes on Azure
  • Leverage AKS to deploy, manage, and operations of Kubernetes
  • Gain best practices from this guide to increase efficiency...
Python Reinforcement Learning Projects: Eight hands-on projects exploring reinforcement learning algorithms using TensorFlow
Python Reinforcement Learning Projects: Eight hands-on projects exploring reinforcement learning algorithms using TensorFlow

Implement state-of-the-art deep reinforcement learning algorithms using Python and its powerful libraries

Key Features

  • Implement Q-learning and Markov models with Python and OpenAI
  • Explore the power of TensorFlow to build self-learning models
  • Eight AI...
Mastering C++ Game Development: Create professional and realistic 3D games using C++ 17
Mastering C++ Game Development: Create professional and realistic 3D games using C++ 17

High-end game development with advanced C++ 17 programming techniques

Key Features

  • Make the best use of object-oriented capabilities of C++ to develop high-end games
  • Create reusable C++ libraries and editor tools for your game
  • Series of example projects...
Mastering Blockchain: Distributed ledger technology, decentralization, and smart contracts explained, 2nd Edition
Mastering Blockchain: Distributed ledger technology, decentralization, and smart contracts explained, 2nd Edition

Learn about cryptography and cryptocurrencies, so you can build highly secure, decentralized applications and conduct trusted in-app transactions.

Key Features

  • Get to grips with the underlying technical principles and implementations of blockchain
  • Build powerful...
Information Retrieval and Mining in Distributed Environments (Studies in Computational Intelligence)
Information Retrieval and Mining in Distributed Environments (Studies in Computational Intelligence)

At DART'09, held in conjunction with the 2009 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2009) and Intelligent Agent Technology (IAT 2009) in Milan (Italy), practitioners and researchers working on pervasive and intelligent access to web services and distributed information retrieval met to compare their work ad...

Practical Forensic Imaging: Securing Digital Evidence with Linux Tools
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools

Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.

Practical
...

Dark Web: Exploring and Data Mining the Dark Side of the Web (Integrated Series in Information Systems)
Dark Web: Exploring and Data Mining the Dark Side of the Web (Integrated Series in Information Systems)

The University of Arizona Artificial Intelligence Lab (AI Lab) Dark Web project is a long-term scientific research program that aims to study and understand the international terrorism (Jihadist) phenomena via a computational, data-centric approach. We aim to collect "ALL" web content generated by international terrorist groups,...

Beginning C++17: From Novice to Professional
Beginning C++17: From Novice to Professional

Learn how to program using the updated C++17 language. You'll start with the basics and progress through step-by-step examples to become a working C++ programmer. All you need are Beginning C++17 and any recent C++ compiler and you'll soon be writing real C++ programs. There is no assumption of prior programming knowledge.
...

Result Page: 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy