Science Fiction | View detail | Ed Sheeran - Photograph
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microservices with Docker on Microsoft Azure (includes Content Update Program) (Addison-Wesley Microsoft Technology)
Microservices with Docker on Microsoft Azure (includes Content Update Program) (Addison-Wesley Microsoft Technology)

Book + Content Update Program

“Beyond just describing the basics, this book dives into best practices every aspiring microservices developer or architect should know.”
—Foreword by Corey Sanders, Partner Director of Program Management, Azure

Microservice-based
...

Docker Orchestration
Docker Orchestration

Key Features

  • Explore the new features added to the core Docker Engine to make multi-container orchestration easy
  • Leverage tools such as Docker Machine, Swarm, Compose, and third-party tools such as Kubernetes, Mesosphere, and CoreOS to orchestrate containers
  • Use Docker Compose with Swarm and...
The Old New Thing: Practical Development Throughout the Evolution of Windows
The Old New Thing: Practical Development Throughout the Evolution of Windows
Why does Windows work the way it does? Why is Shut Down on the Start menu? (And why is there a Start button, anyway?) How can I tap into the dialog loop? Why does the GetWindowText function behave so strangely? Why are registry files called "hives"?

Many of Windows' quirks have perfectly logical explanations, rooted in...

Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry

I am not an expert. I have never claimed to be an expert at anything (at least not seriously done so), least of all an expert in forensic analysis. I am not an expert in Windows Registry analysis. I am simply, by profession, a responder and analyst with some work and research experience in this area. I have also performed a number...

Hacking the Code: ASP.NET Web Application Security
Hacking the Code: ASP.NET Web Application Security

This unique book walks you through the many threats to your web application code, from managing and authorizing users and encrypting private data to filtering user input and securing XML. For every defined threat, it provides a menu of solutions and coding considerations. And, it offers coding examples and a set of security policies for each of...

Sams Teach Yourself Visual Basic 2008 in 24 Hours: Complete Starter Kit
Sams Teach Yourself Visual Basic 2008 in 24 Hours: Complete Starter Kit
In just 24 sessions of one hour or less, you will be up and running with Visual Basic 2008. Using a straightforward, step-by-step approach, each lesson builds upon a real-world foundation forged in both technology and business matters, allowing you to learn the essentials of Visual Basic 2008 from the ground up. Step-by-step instructions carefully...
Ocular Trauma: Principles and Practice
Ocular Trauma: Principles and Practice

Ocular Trauma: Principles and Practice is the first comprehensive clinical
reference on ocular injuries in more than a decade. Each chapter gives you
detailed instructions on evaluation, treatment, and management, including "what
to do", "how to do it", and "why to do it."
...

Windows Registry Forensics, Second Edition: Advanced Digital Forensic Analysis of the Windows Registry
Windows Registry Forensics, Second Edition: Advanced Digital Forensic Analysis of the Windows Registry

Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, Second Edition, provides the most in-depth guide to forensic investigations involving Windows Registry. This book is one-of-a-kind, giving the background of the Registry to help users develop an understanding of the structure of registry hive files,...

Microsoft Windows 2000 Scripting Guide
Microsoft Windows 2000 Scripting Guide

Welcome to the Microsoft® Windows® 2000 Scripting Guide.

As computers and computer networks continue to grow larger and more complex, system administrators continue to face new challenges. Not all that long ago, system administration was limited to managing a...

Leveraging WMI Scripting (HP Technologies)
Leveraging WMI Scripting (HP Technologies)

Leveraging Scripting is the second in a series of two books dedicated to WMI. Understanding WMI, Lissoir’s first book, explained to Windows Administrators the various WMI scripting techniques and manageability capabilities of this new Windows Server 2003 platform. Illustrated with hundreds of scripts and detailed...

Windows Admin Scripting Little Black Book, Second Edition
Windows Admin Scripting Little Black Book, Second Edition
This book shows Windows XP and 2003 users and administrators how to perform Windows management and administrative tasks using powerful scripts for just about every important task imaginable.

Windows Admin Scripting Little Black Book, 2nd Edition, shows Windows XP and 2003 users and administrators how to perform Windows management...

Degunking Microsoft Office
Degunking Microsoft Office
Degunking Microsoft Office covers the basics to help you quickly get your PCs back to top performance. The unique thing about Degunking Microsoft Office is that it's organized according to the special "cleaning" process that will improve the performance of your computer. Shortcut and time calculation charts are provided...
Result Page: 11 10 9 8 7 6 5 4 3 2 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy