Home | Amazing | Today | Tags | Publishers | Years | Search 
Authentication and Access Control: Practical Cryptography Methods and Tools
Authentication and Access Control: Practical Cryptography Methods and Tools
The advent of the Internet has allowed for many services and applications, most notably in communications between users, servers, and devices. Unfortunately, this has led to many security challenges and problems. Recent examples include password leakage on large social network sites and defacement of websites. It is, therefore,...
Pro Cryptography and Cryptanalysis with C++20: Creating and Programming Advanced Algorithms
Pro Cryptography and Cryptanalysis with C++20: Creating and Programming Advanced Algorithms
Knowledge is one of the most important aspects to consider when designing and implementing complex systems, such as companies, organizations, military operations, and so on. Information falling into the wrong hands can be a tragedy and can result in a huge loss of business or disastrous outcomes. To guarantee the security of...
Practical Rust Web Projects: Building Cloud and Web-Based Applications
Practical Rust Web Projects: Building Cloud and Web-Based Applications

Go beyond the basics of Rust and build web and serverless cloud applications. The applications explained in this practical book include web sites, RESTful APIs, a real-time web chat application, and frontend application with WebAssembly. Each chapter is organized in the following format: what this kind of application looks...

Beginning T-SQL: A Step-by-Step Approach
Beginning T-SQL: A Step-by-Step Approach
The card catalog at the local public library was my first database. The catalog made it possible to find books based on titles, authors, or subjects just like writing a SQL query. Of course, I could walk around and locate books because they were arranged thanks to the Dewey Decimal System, but having that old drawer-filled cabinet...
PHP 8 Quick Scripting Reference: A Pocket Guide to PHP Web Scripting
PHP 8 Quick Scripting Reference: A Pocket Guide to PHP Web Scripting

This pocket reference has been updated with the new PHP 8 release. It is a condensed, code-rich scripting and syntax handbook for the PHP scripting language. You won’t find any technical jargon, bloated samples, drawn-out history lessons or witty stories in this book. What you will find is a web scripting language...

Software Engineering for Absolute Beginners: Your Guide to Creating Software Products
Software Engineering for Absolute Beginners: Your Guide to Creating Software Products

Start programming from scratch, no experience required. This beginners’ guide to software engineering starts with a discussion of the different editors used to create software and covers setting up a Docker environment. Next, you will learn about repositories and version control along with its uses. Now that you are ready to...

Big Breaches: Cybersecurity Lessons for Everyone
Big Breaches: Cybersecurity Lessons for Everyone
Neil and Moudy have written a book that will help us reduce our exposure as a society to future “big breaches” but also to many of the technology risks we face in an increasingly digitized society. They do this not by presenting a “recipe” for success but by making the subject accessible to audiences who...
Practical WebDriverIO: Learn to Automate Effectively Using WebDriverIO APIs
Practical WebDriverIO: Learn to Automate Effectively Using WebDriverIO APIs

Learn how to quickly set up the test automation tool WebdriverIO, one of the major Node.js-based test frameworks. Software testing is here to stay, and an integral part of this is test automation. Dive into the amazing possibilities that WebDriverIO offers to automate browser interactions for a user of any web application. 

...
Splunk Certified Study Guide: Prepare for the User, Power User, and Enterprise Admin Certifications
Splunk Certified Study Guide: Prepare for the User, Power User, and Enterprise Admin Certifications

Make your Splunk certification easier with this exam study guide that covers the User, Power User, and Enterprise Admin certifications. This book is divided into three parts. The first part focuses on the Splunk User and Power User certifications starting with how to install Splunk, Splunk Processing Language (SPL), field...

Learn FileMaker Pro 19: The Comprehensive Guide to Building Custom Databases
Learn FileMaker Pro 19: The Comprehensive Guide to Building Custom Databases

Discover how easy it is to create multi-user, cross-platform custom solutions with FileMaker Pro, the relational database platform published by Apple subsidiary Claris International, Inc. Meticulously rewritten with clearer lessons, more real-world examples and updated to include feature changes introduced in recent versions, this...

Azure Arc-Enabled Data Services Revealed: Early First Edition Based on Public Preview
Azure Arc-Enabled Data Services Revealed: Early First Edition Based on Public Preview
For many years, major software companies like Microsoft and Oracle made previously unfathomable profits by selling enterprise software that companies would buy and operate in their own data centers. In the last 20 years, we have seen a gradual transition to a wide variety of software and services models – SaaS, IaaS, PaaS...
Getting Started with NSX-T: Logical Routing and Switching: The Basic Principles of Building Software-Defined Network Architectures with VMware NSX-T
Getting Started with NSX-T: Logical Routing and Switching: The Basic Principles of Building Software-Defined Network Architectures with VMware NSX-T
This first chapter is a primer on how virtualization is used to create a software-defined data center (an SDDC) . One of the central pillars of the software-defined data center is the use of software defined networking (SDN). To better understand NSX-T (VMware’s SDN solution), it is best to first understand the...
Result Page: Previous 2217 2218 2219 2220 2221 2222 2223 2224 2225 2226 2227 2228 2229 2230 2231 2232 2233 2234 2235 2236 2237 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy