Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Securing SQL Server: DBAs Defending the Database
Securing SQL Server: DBAs Defending the Database
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy, performing threat analysis, and encrypting sensitive data as a last line of defense against compromise. The multi-layered approach in this book helps ensure that a single breach doesn't lead to loss or compromise of your data...
Foundations for Analytics with Python
Foundations for Analytics with Python

If you’re like many of Excel’s 750 million users, you want to do more with your data—like repeating similar analyses over hundreds of files, or combining data in many files for analysis at one time. This practical guide shows ambitious non-programmers how to automate and scale the processing and analysis of data in...

Windows Installation and Update Troubleshooting
Windows Installation and Update Troubleshooting

Understand, troubleshoot and repair issues with local Windows installations, automating the OS deployment and configuring updates via WSUS and Windows Intune. When tasked with deploying Windows operating systems, there can seem to be an overwhelming amount of tools and techniques to learn to master this process. Whether you are installing a...

Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide
Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do...

Identity and Data Security for Web Development: Best Practices
Identity and Data Security for Web Development: Best Practices

Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how...

Using Chef with Microsoft Azure
Using Chef with Microsoft Azure

This book is your hands-on guide to infrastructure provisioning and configuration management in the cloud using Chef’s open source, cross-platform toolset. With over 10,000 customers joining the Microsoft Azure cloud platform each week and steadily increasing usage, the need for automation approaches has never been greater. This book...

Building Arduino Projects for the Internet of Things: Experiments with Real-World Applications
Building Arduino Projects for the Internet of Things: Experiments with Real-World Applications

Gain a strong foundation of Arduino-based device development, from which you can go in any direction according to your specific development needs and desires. You'll build Arduino-powered devices for everyday use, and then connect those devices to the Internet. 

You'll be introduced to the building...

CCNA Routing and Switching Complete Review Guide: Exam 100-105, Exam 200-105, Exam 200-125
CCNA Routing and Switching Complete Review Guide: Exam 100-105, Exam 200-105, Exam 200-125

Tight, focused CCNA review covering all three exams

The CCNA Routing and Switching Complete Review Guide offers clear, concise review for Exams 100-105, 200-105, and 200-125. Written by best-selling certification author and Cisco guru Todd Lammle, this guide is your ideal resource for quick review and reinforcement of...

Exploratory Programming for the Arts and Humanities (MIT Press)
Exploratory Programming for the Arts and Humanities (MIT Press)

This book introduces programming to readers with a background in the arts and humanities; there are no prerequisites, and no knowledge of computation is assumed. In it, Nick Montfort reveals programming to be not merely a technical exercise within given constraints but a tool for sketching, brainstorming, and inquiring about important topics....

Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems
Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems

Want to know how the best software engineers and architects structure their applications to make them scalable, reliable, and maintainable in the long term? This book examines the key principles, algorithms, and trade-offs of data systems, using the internals of various popular software packages and frameworks as examples.

...

Microservices From Day One: Build robust and scalable software from the start
Microservices From Day One: Build robust and scalable software from the start

Learn what a microservices architecture is, its advantages, and why you should consider using one when starting a new application. The book describes how taking a microservices approach from the start helps avoid the complexity and expense of moving to a service-oriented approach after applications reach a critical code base size or...

React.js Essentials
React.js Essentials

A fast-paced guide to designing and building scalable and maintainable web apps with React.js

About This Book

  • Build maintainable and performant user interfaces for your web applications using React.js
  • Create reusable React.js components to save time and effort in maintaining your user...
Result Page: Previous 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 Next 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy