Home » Tag cloud » Addison
Category: Tutorial
http://picload.org/image/rwiocodl/s.jpg

Addison-Wesley Professional - Learn Python 3 the Hard Way
English | Size: 6.84 GB
Category: Tutorial

You Will Learn Python!
Zed Shaw has perfected the world's best system for learning Python. Follow it and you will succeed-just like the hundreds of thousands of beginners Zed has taught to date! You bring the discipline, commitment, and persistence; the author supplies everything else.
Download Now
Read More
Category: E-Book

Microservices with Docker on Microsoft Azure (includes Content Update Program) (Addison-Wesley Microsoft Technology)

Microservices with Docker on WeiRuan-->WeiRuan Azure (includes Content Update Program) (Addison-Wesley WeiRuan-->WeiRuan Technology) by Boris Scholl
English | June 29, 2016 | ISBN: 0672337495 | 320 Pages | ePub/ PDF (conv) | 12 MB
Book + Content Update Program
"Beyond just describing the basics, this book dives into best practices every aspiring microservices developer or architect should know."
-Foreword by Corey Sanders, Partner Director of Program Management, Azure

Download Now
Read More
Category: E-Book
UNIX System Security A Guide for Users and System Administrators (Addison-Wesley Professional Computing


UNIX System Security: A Guide for Users and System Administrators (Addison-Wesley Professional Computing (Paperback)) by Dave Curry
English | Jan. 1, 1992 | ISBN: 0201606402 | 227 Pages | PDF | 3 MB
Because the UNIX system was originally designed by programmers for use by other programmers, it was used in an environment of open cooperation where security was of minimal concern. Now that its use has spread to universities, businesses, and government, the confidential and sensitive nature of the data stored on UNIX systems has made the security of these systems of paramount importance.
Despite all the technical papers and workshops on UNIX security, this book is unique. "UNIX System Security" is the first up-to-date source to provide the UNIX system user or administrator with the information needed to protect the data and system from unauthorized use. By following the procedures described in this book and making use of the C programs and shell scripts provided as examples, you can protect your UNIX system from most attackers.


Download Now
Read More
Category: Tutorial
Addison-Wesley Professional – Amazon Web Services AWS LiveLessons
Name Product: Addison-Wesley Professional – Amazon Web Services AWS LiveLessons
Download Size: 2.35 GB
Download Now
Read More
Category: Tutorial
http://picload.org/image/rorgiird/s.jpg

Addison-Wesley Professional - Amazon Web Services AWS LiveLessons
English | Size: 2.35 GB
Category: Tutorial

Table of Contents
1. Introduction
2. Lesson 1: AWS Overview
3. Lesson 2: Security in AWS
4. Lesson 3: Networking in AWS
5. Lesson 4: Computing in AWS
6. Lesson 5: Storage in AWS
Download Now
Read More
Category: Tutorial
Addison - Wesley Professional - Building Spark Applications
Addison - Wesley Professional - Building Spark Applications
Duration: 13h | Video: h264, yuv420p 1280 x 720 | Audio: aac, 44100 Hz, 2 ch | 3.9 GB
Genre: eLearning | Language: English
Download Now
Read More
Category: Tutorial

Addison - Wesley Professional - Data Science Fundamentals
Addison - Wesley Professional - Data Science Fundamentals
Duration: 16h 15m | Video: h264, yuv420p, 1280x720 30fps | Audio: AAC 48KHz 2ch | 1.1 GB
Genre: eLearning | Language: English

Download Now
Read More
Category: Tutorial

Addison - Wesley Professional - Agile Foundations LiveLessons
Addison - Wesley Professional - Agile Foundations LiveLessons
Duration: 1h 44m | Video: h264, yuv420p, 1280x716 30fps | Audio: aac, 44100 Hz, 2 ch | 1GB
Genre: eLearning | Language: English

Download Now
Read More
Category: Tutorial
Addison Wesley - Introduction to Information Security !

Addison Wesley - Introduction to Information Security !
English | Size: 6.10 GB (6,549,855,077 Bytes)
Category: CBTs

5+ Hours of Video Instruction
Introduction to Information Security LiveLessons provides technical professionals with a relatively brief, high-level overview of information security concepts, including the fundamental steps needed to secure a system, the types of threats and vulnerabilities they may encounter, and what steps can and should be taken to mitigate those threats and vulnerabilities.
Download Now
Read More