Home | Amazing | Today | Tags | Publishers | Years | Search 
Pro Microsoft Hyper-V 2019: Practical Guidance and Hands-On Labs
Pro Microsoft Hyper-V 2019: Practical Guidance and Hands-On Labs
Successfully create and manage your Hyper-V environment without any of the marketing fluff. This book's lab-driven, hands-on approach will get you up and running as quickly and efficiently as possible.

Virtualization is the cornerstone of today’s data center.  As a modern-day IT pro, you are required...
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks

Know how to set up, defend, and attack computer networks with this revised and expanded second edition.

You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more...

Machine Learning with Microsoft Technologies: Selecting the Right Architecture and Tools for Your Project
Machine Learning with Microsoft Technologies: Selecting the Right Architecture and Tools for Your Project

Know how to do machine learning with Microsoft technologies. This book teaches you to do predictive, descriptive, and prescriptive analyses with Microsoft Power BI, Azure Data Lake, SQL Server, Stream Analytics, Azure Databricks, HD Insight, and more.

The ability to analyze massive amounts of real-time data and predict...

Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats
Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats

A comprehensive guide to mastering the art of preventing your Linux system from getting compromised.

Key Features

  • Leverage this guide to confidently deliver a system that reduces the risk of being hacked
  • Perform a number of advanced Linux security techniques such as...
Mastering Blockchain: Distributed ledger technology, decentralization, and smart contracts explained, 2nd Edition
Mastering Blockchain: Distributed ledger technology, decentralization, and smart contracts explained, 2nd Edition

Learn about cryptography and cryptocurrencies, so you can build highly secure, decentralized applications and conduct trusted in-app transactions.

Key Features

  • Get to grips with the underlying technical principles and implementations of blockchain
  • Build powerful...
Mastering C++ Game Development: Create professional and realistic 3D games using C++ 17
Mastering C++ Game Development: Create professional and realistic 3D games using C++ 17

High-end game development with advanced C++ 17 programming techniques

Key Features

  • Make the best use of object-oriented capabilities of C++ to develop high-end games
  • Create reusable C++ libraries and editor tools for your game
  • Series of example projects...
Python Reinforcement Learning Projects: Eight hands-on projects exploring reinforcement learning algorithms using TensorFlow
Python Reinforcement Learning Projects: Eight hands-on projects exploring reinforcement learning algorithms using TensorFlow

Implement state-of-the-art deep reinforcement learning algorithms using Python and its powerful libraries

Key Features

  • Implement Q-learning and Markov models with Python and OpenAI
  • Explore the power of TensorFlow to build self-learning models
  • Eight AI...
Hands-On Kubernetes on Azure: Run your applications securely and at scale on the most widely adopted orchestration platform
Hands-On Kubernetes on Azure: Run your applications securely and at scale on the most widely adopted orchestration platform

Efficiently deploy and manage Kubernetes clusters on a cloud

Key Features

  • Deploy highly scalable applications with Kubernetes on Azure
  • Leverage AKS to deploy, manage, and operations of Kubernetes
  • Gain best practices from this guide to increase efficiency...
Network Analysis Using Wireshark 2 Cookbook: Practical recipes to analyze and secure your network using Wireshark 2, 2nd Edition
Network Analysis Using Wireshark 2 Cookbook: Practical recipes to analyze and secure your network using Wireshark 2, 2nd Edition

Over 100 recipes to analyze and troubleshoot network problems using Wireshark 2

Key Features

  • Place Wireshark 2 in your network and configure it for effective network analysis
  • Deep dive into the enhanced functionalities of Wireshark 2 and protect your network with ease
  • ...
Learn Autodesk Inventor 2018 Basics: 3D Modeling, 2D Graphics, and Assembly Design
Learn Autodesk Inventor 2018 Basics: 3D Modeling, 2D Graphics, and Assembly Design
Get started with the basics of part modeling, assembly modeling, presentations, and drawings in this step-by-step tutorial on Autodesk Inventor fundamentals. Next, this book teaches you some intermediate-level topics such as additional part modeling tools, sheet metal modeling, top-down assembly features, assembly joints, and dimension...
Linux Administration Cookbook: Insightful recipes to work with system administration tasks on Linux
Linux Administration Cookbook: Insightful recipes to work with system administration tasks on Linux

Over 100 recipes to get up and running with the modern Linux administration ecosystem

Key Features

  • Understand and implement the core system administration tasks in Linux
  • Discover tools and techniques to troubleshoot your Linux system
  • Maintain a healthy...
Computational and Manufacturing Strategies: Experimental Expressions of Wood Capabilities (SpringerBriefs in Architectural Design and Technology)
Computational and Manufacturing Strategies: Experimental Expressions of Wood Capabilities (SpringerBriefs in Architectural Design and Technology)

This book highlights computationally enabled and digitally fabricated strategies used in the design of a series of full-size wooden structures. It introduces theoretical foundations and then focuses on the possibilities that have emerged as a result of the material-aware processes. The case studies expound wood as one of the most...

Result Page: 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy