Ninjago: Masters Of Spinjitzu: Season 8 | Okusama ga Seitokaichou! | Subtitulo de Vida S01E06
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python for Secret Agents - Second Edition
Python for Secret Agents - Second Edition

Gather, analyze, and decode data to reveal hidden facts using Python, the perfect tool for all aspiring secret agents

About This Book

  • Discover the essential features of Python programming: statements, variables, expressions, and many of the built-in data types
  • Use Python's standard...
Practical Linux Security Cookbook
Practical Linux Security Cookbook

Key Features

  • This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
  • More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
  • Enhance file system security and local and remote...
Microservices Deployment Cookbook
Microservices Deployment Cookbook

Key Features

  • Adopt microservices-based architecture and deploy it at scale
  • Build your complete microservice architecture using different recipes for different solutions
  • Identify specific tools for specific scenarios and deliver immediate business results, correlate use cases, and adopt them...
Microservices with Docker on Microsoft Azure (includes Content Update Program) (Addison-Wesley Microsoft Technology)
Microservices with Docker on Microsoft Azure (includes Content Update Program) (Addison-Wesley Microsoft Technology)

Book + Content Update Program

“Beyond just describing the basics, this book dives into best practices every aspiring microservices developer or architect should know.”
—Foreword by Corey Sanders, Partner Director of Program Management, Azure

Microservice-based
...

Mastering Linux Shell Scripting
Mastering Linux Shell Scripting

Key Features

  • Identify the high level steps such as verifying user input, using command lines and conditional statements in creating and executing simple shell scripts
  • Create and edit dynamic shell scripts to manage complex and repetitive tasks
  • Learn about scripting in Perl and programming in...
Mastering Oracle Scheduler in Oracle 11g Databases
Mastering Oracle Scheduler in Oracle 11g Databases

Scheduler (DBMS_SCHEDULER) is included in Oracle Database and is a tool for the automation, management, and control of jobs. It enables users to schedule jobs running inside the database such as PL/SQL procedures or PL/SQL blocks, as well as jobs running outside the database like shell scripts. Scheduler ensures that jobs are run on time,...

Pro SQL Server Internals
Pro SQL Server Internals

Pro SQL Server Internals explains how different SQL Server components work "under the hood" and how they communicate with each other. This is the practical book with a large number of examples that will show you how various design and implementation decisions affect the behavior and performance of your systems.

...
Tcl 8.5 Network Programming
Tcl 8.5 Network Programming

Tcl (Tool Command Language) is a very powerful and easy to learn dynamic programming language, suitable for a very wide range of uses. Tcl is regarded as one of the best-kept secrets in the software industry. This book gives you a hands-on experience on Tcl, helping you develop network-aware applications using this mature yet evolving...

Practical DevOps
Practical DevOps

Key Features

  • Get to know the background of DevOps so you understand the collaboration between different aspects of an IT organization and a software developer
  • Improve your organization's performance to ensure smooth production of software and services
  • Deploy top-quality software and...
Docker Cookbook
Docker Cookbook

80 hands-on recipes to efficiently work with the Docker 1.6 environment on Linux About This Book Provides practical techniques and knowledge of various emerging and developing APIs to help you create scalable services Create, manage, and automate production-quality services while dealing with inherent issues. Each recipe is carefully...

Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

Google AdSense For Dummies (Computer/Tech)
Google AdSense For Dummies (Computer/Tech)
You can get paid for online ad placement with Google AdSense! If you’ve ever considered using AdSense to improve revenue for your Web site, Google AdSense For Dummies will get you started. It’s loaded with tips to help you implement a successful AdSense program.

AdSense lets you generate income with ad...

Result Page: 11 10 9 8 7 6 5 4 3 2 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy