Home | Amazing | Today | Tags | Publishers | Years | Search 
Pro iOS Security and Forensics: Enterprise iPhone and iPad Safety
Pro iOS Security and Forensics: Enterprise iPhone and iPad Safety
Examine how to keep iOS devices safe in the physical world, including creating company policies for iPhones; assessing and defending against cyber vulnerabilities and attacks; working with preinstalled as well as third party tools; and strategies for keeping your data safe including backing up and screen locks.

...
The Essential Guide to HTML5: Using Games to Learn HTML5 and JavaScript
The Essential Guide to HTML5: Using Games to Learn HTML5 and JavaScript
There was considerable enthusiasm about the new capabilities of HTML5, and even suggestions that no other technologies or products are necessary to produce dynamic, engrossing, interactive websites. That may be overstating things, but it is true the new features are exciting. HTML is HTML5. It now is possible, using just HTML,...
Beginning BBC micro:bit: A Practical Introduction to micro:bit Development
Beginning BBC micro:bit: A Practical Introduction to micro:bit Development
Learn essential concepts and techniques to build simple-to-advanced projects and overcome common programming challenges in micro:bit development. 


Beginning BBC micro:bit will take you through the complete features and capabilities of the micro:bit controller, enabling you to program and...
API Development: A Practical Guide for Business Implementation Success
API Development: A Practical Guide for Business Implementation Success

Implement application programming interface (API) usability, security, availability, reliability, and scalability to extend your company’s market and potentially generate revenue. Businesses know they need to extend their markets into the digital world, and expose internal data to the Internet. This book shows how stakeholders...

Deep Learning for Natural Language Processing: Creating Neural Networks with Python
Deep Learning for Natural Language Processing: Creating Neural Networks with Python
Discover the concepts of deep learning used for natural language processing (NLP), with full-fledged examples of neural network models such as recurrent neural networks, long short-term memory networks, and sequence-2-sequence models.

You’ll start by covering the mathematical prerequisites...
Practical Bot Development: Designing and Building Bots with Node.js and Microsoft Bot Framework
Practical Bot Development: Designing and Building Bots with Node.js and Microsoft Bot Framework
Explore the concept of bots and discover the motivation behind working with these new apps with messaging platforms. This book is an accessible resource teaching the basic concepts behind bot design and implementation. Each chapter builds on previous topics and, where appropriate, real working code is shown that implements the concepts. By...
The Full Stack Developer: Your Essential Guide to the Everyday Skills Expected of a Modern Full Stack Web Developer
The Full Stack Developer: Your Essential Guide to the Everyday Skills Expected of a Modern Full Stack Web Developer

Understand the technical foundations, as well as the non-programming skills needed to be a successful full stack web developer. This book reveals the reasons why a truly successful full stack developer does more than write code. 

You will learn the principles of the topics needed to help a developer new to agile or full
...
Practical Docker with Python: Build, Release and Distribute your Python App with Docker
Practical Docker with Python: Build, Release and Distribute your Python App with Docker
Learn the key differences between containers and virtual machines. Adopting a project based approach, this book introduces you to a simple Python application to be developed and containerized with Docker.

After an introduction to Containers and Docker you'll be guided through Docker installation and...
Pro PowerShell Desired State Configuration: An In-Depth Guide to Windows PowerShell DSC
Pro PowerShell Desired State Configuration: An In-Depth Guide to Windows PowerShell DSC

Use Windows PowerShell Desired State Configuration (DSC) to configure your infrastructure on-premises and in the cloud. In an environment where changes and deployments are happening all the time, DSC makes the necessary adjustments to the system so you don’t have to. Pro PowerShell Desired State Configuration shows...

Securing SQL Server: DBAs Defending the Database
Securing SQL Server: DBAs Defending the Database
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database enterprise. This new edition covers threat analysis, common attacks and countermeasures, and provides an introduction to compliance that is useful for meeting regulatory requirements such as the GDPR. The...
Securing Office 365: Masterminding MDM and Compliance in the Cloud
Securing Office 365: Masterminding MDM and Compliance in the Cloud
Understand common security pitfalls and discover weak points in your organization’s data security, and what you can do to combat them. This book includes the best approaches to managing mobile devices both on your local network and outside the office.

Data breaches, compliance fines,  and
...
Agile Office 365: Successful Project Delivery Practices for an Evolving Platform
Agile Office 365: Successful Project Delivery Practices for an Evolving Platform
Plan, deploy, and run Office 365 using an agile project management approach. This soup-to-nuts guide teaches you how to apply agile techniques in order to make your Office 365 implementation a success, even as the Microsoft Office 365 platform continues to evolve and introduce new features.

The...
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy