Sign in

Ruby on Roda

0

AWS Certified Solutions Architect - Associate (SAA-C02) Cert Guide

0

Upgrade Your HTML III

0

Introduction to Computational Thinking

0

97 Things Every Information Security Professional Should Know

  • Get started whether you're new to the infosec space or want to pivot onto a different path
  • Assess your organization's security posture
  • Understand and implement security and risk management controls
  • Effectively communicate the importance of infosec to C-level executives
  • Build and scale an infosec team and program
  • Evaluate return on investment including progress, adoption, and risks mitigated, and relay this information back to stakeholders
0

Changing Mindsets: The Missing Ingredient to Digital Transformation

  • Learn how to think about software as a product rather than software as a project
  • Explore a collection of mindset shifts, practices, and "thought technologies" to help you think and act differently
  • Help managers change the way they think about their daily tasks, goals, and staff
  • Examine case studies that reveal why this transformation is successful, straightforward, and well documented
0

Make Python Talk

0

Concurrency and Scalability for Distributed Systems

  • Foundations of scalable systems: Learn basic design principles of scalability, its costs, and architectural tradeoffs
  • Designing scalable services: Dive into service design, caching, asynchronous messaging, serverless processing, and microservices
  • Designing scalable data systems: Learn data system fundamentals, NoSQL databases, and eventual consistency versus strong consistency
  • Designing scalable streaming systems: Explore stream processing systems and scalable event-driven processing
0

Exam Ref MS-101 Microsoft 365 Mobility and Security, 2nd Edition

0

Software Architecture in Practice, 4th Edition

0

Developing Microservices Architecture on Microsoft Azure with Open Source Technologies

0

Microsoft Azure Data Solutions - An Introduction

0

Python Distilled, 5th Edition

0

Visual Studio Code Distilled

0

Infrastructure-as-Code Automation Using Terraform, Packer, and Vault

0

Smart Mobility

0

Understanding Log Analytics at Scale, 2nd Edition

  • Explore what log analytics is--and why log data is so vital
  • Learn how log analytics helps organizations achieve better business outcomes
  • Use log analytics to address specific business problems
  • Examine the current state of log analytics, including common issues
  • Make the right storage deployments for log analytics use cases
  • Understand how log analytics will evolve in the future
0

Tcl/Tk Pocket Reference

The Tcl/Tk combination is increasingly popular because it lets you produce sophisticated graphical interfaces with a few easy commands, develop and change scripts quickly, and conveniently tie together existing utilities or programming libraries.The Tcl/Tk Pocket Reference,a handy reference guide to the basic Tcl language elements, Tcl and Tk commands, and Tk widgets, is a companion volume to Tcl/Tk in a Nutshell.
0

Container Images Security Scanning: The Good, the Bad and the Ugly

0

Real World PowerShell

0