Discover everything you want to know about web design in this easy to use guide, from the most essential tasks that you'll want to perform, to solving the most common problems you'll encounter.
Discover everything you want to know about building your first website in this easy-to-use guide; from the most essential tasks that you'll want to perform, to solving the most common problems you'll encounter.
This book explores the intersection of legal frameworks, healthcare innovation, and computational intelligence, shedding light on how emerging technologies like artificial intelligence (AI) and machine learning (ML) are reshaping the medical landscape.
This book explores the transformative potential of blockchain technology and shows how blockchain can promote equitable access to resources and bridge societal gaps.
Microsoft Windows 8 is designed to mesh users digital lives seamlessly-from desktop to phone to tablet-by utilizing a look and feel that give users a new Windows experience.
An introductory, tutorial style text covering the basics of UNIX and Linux for the complete beginner, this is a comprehensive and well written introduction to these operating systems.
Gain a firm practical understanding of how to secure your Linux system from intruders, malware attacks, and other cyber threatsPurchase of the print or Kindle book includes a free eBook in PDF format.
As computers become more and more integral to business and other organizational operations around the world, software design must increasingly meet the social demands of the workplace.
Distributed Computing by Mobile Entities is concerned with the study of the computational and complexity issues arising in systems of decentralized computational entities operating in a spatial universe Encompassing and modeling a large variety of application environments and systems, from robotic swarms to networks of mobile sensors, from software mobile agents in communication networks to crawlers and viruses on the web, the theoretical research in this area intersects distributed computing with the fields of computational geometry (especially for continuous spaces), control theory, graph theory and combinatorics (especially for discrete spaces).
Deploy functions efficiently using different cloud-based serverless offeringsKey FeaturesUnderstand the concept of Function-as-a-ServiceImplement Serverless solutions using AWS Lambda, Azure Functions and Google Cloud FunctionsPractical approach towards choosing the best tool for your serverless environmentBook DescriptionServerless applications and architectures are gaining momentum and are increasingly being used by companies of all sizes.
Best Practices, How-Tos, and Technical Deep Dives for Working VMware VI4/VI3 Pros Maximum vSphere is the comprehensive, up-to-the-minute, working reference for everyone who plans, implements, or administers VMware virtual infrastructure.
The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and incident response.
Systems Performance, Second Edition, covers concepts, strategy, tools, and tuning for operating systems and applications, using Linux-based operating systems as the primary example.
Explore the world of systemd—yes, all lower-case, even at the beginning of a sentence— which is the modern replacement for init and SystemV init scripts.
This book builds on basic Python tutorials to explain various Python language features that aren't routinely covered: from reusable console scripts that play double duty as micro-services by leveraging entry points, to using asyncio efficiently to collate data from a large number of sources.
Building applications for Kubernetes is both a challenge and an opportunity-a challenge because the options and complexity to develop for Kubernetes are evolving rapidly, an opportunity because, if done right, your applications will go into production quicker, scale easier, and run smoother.
A comprehensive guide to securing your Linux system against cyberattacks and intrudersKey FeaturesDeliver a system that reduces the risk of being hackedExplore a variety of advanced Linux security techniques with the help of hands-on labsMaster the art of securing a Linux environment with this end-to-end practical guideBook DescriptionFrom creating networks and servers to automating the entire working environment, Linux has been extremely popular with system administrators for the last couple of decades.
Prepare for Microsoft Exam AZ-305 and help demonstrate your real-world expertise in designing cloud and hybrid solutions that run on Microsoft Azure, including identity, governance, monitoring, data storage, business continuity, and infrastructure.
Prepare for Microsoft Exam AZ-305 and help demonstrate your real-world expertise in designing cloud and hybrid solutions that run on Microsoft Azure, including identity, governance, monitoring, data storage, business continuity, and infrastructure.
Prepare for the updated version of Microsoft Exam AZ-900 and help demonstrate your real-world knowledge of cloud services and how they can be provided with Microsoft Azure, including high-level concepts that apply throughout Azure, and key concepts specific to individual services.
Prepare for the updated version of Microsoft Exam AZ-900 and help demonstrate your real-world knowledge of cloud services and how they can be provided with Microsoft Azure, including high-level concepts that apply throughout Azure, and key concepts specific to individual services.
Plan, build, and maintain highly secure Azure applications and workloads As business-critical applications and workloads move to the Microsoft Azure cloud, they must stand up against dangerous new threats.
Prepare for Microsoft Exam AZ-500: Demonstrate your real-world knowledge of Microsoft Azure security, including tools and techniques for protecting identity, access, platforms, data, and applications, and for effectively managing security operations.