Linkedin Learning – WordPress Workflows-ZH

Linkedin Learning – WordPress Workflows-ZH
English | Size: 261.57 MB
Category: Tutorial

If your WordPress workflow is streamlined from the start development is simpler, more organized, and more efficient all the way through to publication. This course takes your WordPress knowledge to the next level by covering three
common WordPress workflows. First, learn a time-tested workflow for building a WordPress site: from choosing a host to launching a site. Next, discover how to build a child theme. Finally, review the tools and techniques professionals use to develop sites for clients, including setting up a staging environment and version control. Developer and WordPress educator Joe Casabona concludes with a look at some advanced tools you might want to put into your workflows, including automated testing and static site tools

Linkedin Learning – Spring Spring Cloud

Linkedin Learning – Spring Spring Cloud-ZH
English | Size: 163.18 MB
Category: Tutorial

Spring Cloud provides tools for developers to quickly build cloud native apps. Using Spring Boot and Spring Cloud, developers can stand up microservices, consume services, perform load balancing, and more. Plus, Spring Cloud solutions are built on the 12-factor app methodology, so they’ll work well in any distributed environment. Join software and security architect Frank Moley, as he shows how to use Spring Cloud to build cloud native apps that scale beautifully in both traditional data centers and private or public cloud infrastructures. Learn how to set up microservices and external configurations, as well as how to discover and consume services. Frank concentrates on the Spring Cloud Netflix patterns, including Eureka

Linkedin Learning – Ethical Hacking System Hacking UPDATE 20200103-ZH

Linkedin Learning – Ethical Hacking System Hacking UPDATE 20200103-ZH
English | Size: 223.38 MB
Category: Tutorial

System hacking is the way hackers get access to individual computers on a network. Ethical hackers learn system hacking to detect, prevent, and counter these types of attacks. This course explains the main methods of system hacking password cracking, privilege escalation, spyware installation, and keylogging and the countermeasures IT security professionals can take to fight these attacks. Security expert Lisa Bock also covers steganography, spyware on a cell phone, and tactics for hiding files and tools

PacktPub – Master Deep Learning with TensorFlow 2.0 in Python [2019]

PacktPub – Master Deep Learning with TensorFlow 2.0 in Python [2019] [Video]
English | Size: 2.3 GB
Category: Programming | Cloud-Comp | E-learning

Build deep learning algorithms with TensorFlow 2.0, dive into neural networks, and apply your skills in a business case.