Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Full Stack Developer: Your Essential Guide to the Everyday Skills Expected of a Modern Full Stack Web Developer
The Full Stack Developer: Your Essential Guide to the Everyday Skills Expected of a Modern Full Stack Web Developer

Understand the technical foundations, as well as the non-programming skills needed to be a successful full stack web developer. This book reveals the reasons why a truly successful full stack developer does more than write code. 

You will learn the principles of the topics needed to help a developer new to agile or full
...
Practical Docker with Python: Build, Release and Distribute your Python App with Docker
Practical Docker with Python: Build, Release and Distribute your Python App with Docker
Learn the key differences between containers and virtual machines. Adopting a project based approach, this book introduces you to a simple Python application to be developed and containerized with Docker.

After an introduction to Containers and Docker you'll be guided through Docker installation and...
Machine Learning with AWS: Explore the power of cloud services for your machine learning and artificial intelligence projects
Machine Learning with AWS: Explore the power of cloud services for your machine learning and artificial intelligence projects

Use artificial intelligence and machine learning on AWS to create engaging applications

Key Features

  • Explore popular AI and ML services with their underlying algorithms
  • Use the AWS environment to manage your AI workflow
  • Reinforce key concepts with hands-on...
Pro PowerShell Desired State Configuration: An In-Depth Guide to Windows PowerShell DSC
Pro PowerShell Desired State Configuration: An In-Depth Guide to Windows PowerShell DSC

Use Windows PowerShell Desired State Configuration (DSC) to configure your infrastructure on-premises and in the cloud. In an environment where changes and deployments are happening all the time, DSC makes the necessary adjustments to the system so you don’t have to. Pro PowerShell Desired State Configuration shows...

Securing SQL Server: DBAs Defending the Database
Securing SQL Server: DBAs Defending the Database
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database enterprise. This new edition covers threat analysis, common attacks and countermeasures, and provides an introduction to compliance that is useful for meeting regulatory requirements such as the GDPR. The...
Securing Office 365: Masterminding MDM and Compliance in the Cloud
Securing Office 365: Masterminding MDM and Compliance in the Cloud
Understand common security pitfalls and discover weak points in your organization’s data security, and what you can do to combat them. This book includes the best approaches to managing mobile devices both on your local network and outside the office.

Data breaches, compliance fines,  and
...
Beginning Serverless Computing: Developing with Amazon Web Services, Microsoft Azure, and Google Cloud
Beginning Serverless Computing: Developing with Amazon Web Services, Microsoft Azure, and Google Cloud
Learn the basics of serverless computing and how to develop event-driven architectures with the three major cloud platforms: Amazon Web Services, Microsoft Azure, and Google Cloud. This hands-on guide dives into the foundations of serverless computing, its use cases, and how to apply it using developer tools such as Node.js, Visual...
Hands-On Cybersecurity for Architects: Plan and design robust security architectures
Hands-On Cybersecurity for Architects: Plan and design robust security architectures

Gain practical experience of creating security solutions and designing secure, highly available, and dynamic infrastructure for your organization

Key Features

  • Architect complex security structures using standard practices and use cases
  • Integrate security with any...
Software Architect's Handbook: Become a successful software architect by implementing effective architecture concepts
Software Architect's Handbook: Become a successful software architect by implementing effective architecture concepts

A comprehensive guide to exploring software architecture concepts and implementing best practices

Key Features

  • Enhance your skills to grow your career as a software architect
  • Design efficient software architectures using patterns and best practices
  • Learn...
Data Science Algorithms in a Week: Top 7 algorithms for scientific computing, data analysis, and machine learning, 2nd Edition
Data Science Algorithms in a Week: Top 7 algorithms for scientific computing, data analysis, and machine learning, 2nd Edition

Build a strong foundation of machine learning algorithms in 7 days

Key Features

  • Use Python and its wide array of machine learning libraries to build predictive models
  • Learn the basics of the 7 most widely used machine learning algorithms within a week
  • Know...
Modern Python Standard Library Cookbook: Over 100 recipes to fully leverage the features of the standard library in Python
Modern Python Standard Library Cookbook: Over 100 recipes to fully leverage the features of the standard library in Python

Build optimized applications in Python by smartly implementing the standard library

Key Features

  • Strategic recipes for effective application development in Python
  • Techniques to create GUIs and implement security through cryptography
  • Best practices for...
Thoughtful Data Science: A Programmer's Toolset for Data Analysis and Artificial Intelligence with Python, Jupyter Notebook, and PixieDust
Thoughtful Data Science: A Programmer's Toolset for Data Analysis and Artificial Intelligence with Python, Jupyter Notebook, and PixieDust

Bridge the gap between developer and data scientist by creating a modern open-source, Python-based toolset that works with Jupyter Notebook, and PixieDust.

Key Features

  • Think deeply as a developer about your strategy and toolset in data science
  • Discover the best tools that...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy