O’Reilly case studies: A map to your destination
Explore how great companies make change happen with O’Reilly case studies, available only on Safari.
Practical resources for getting things done.
Explore how great companies make change happen with O’Reilly case studies, available only on Safari.
Learn how to create an automated training routine for any of your deep learning models.
Learn how to use TensorFlow-Slim’s meta-operators to build deep learning models with a substantially reduced amount of code.
How to communicate with stakeholders and deliver the best user experience.
Learn the configuration steps required to enable a Cisco router to accept Secure Shell (SSH) connections over the virtual terminal (VTY) lines.
Learn about what may be the single most important networking concept that helps different systems communicate—the OSI model.
Learn how to change the configuration register so that a router password can be recovered without losing any configurations.
Expanding the blue team by building a security culture program.
How companies are providing native experiences in their mobile apps.
Learn how to build both web and traditional application programming interfaces (APIs).
Learn how to use different types of application programming interfaces (APIs).
Learn the basics of application programming interfaces (APIs), their purpose, and the key concepts underlying the technology.
Elm’s static typing and compiler error messages lead to more productivity.
Learn how to use Apache Maven, a project management and comprehension tool, to package your Java application as a Docker image and run as a Docker container.
Learn how to use Gradle, a popular build tool for Java developers, to package your Java application as a Docker image and run as a Docker container.
Learn how to use Docker to distribute multi-container applications into a standardized unit for seamless software development.
This two-day live online training covers JPMS, a tool Paul Deitel calls “the most significant new Java software-engineering technology since the inception of Java.”
O’Reilly’s assessment tool puts the focus on the learner, not arbitrary scores.
User stories help track goals, user needs, and project timeframes to deliver valuable software quickly.
Learn how to become an information security specialist by obtaining a CompTIA Security+ certification.
Learn what knowledge areas are covered in the CompTIA Security+ exam objectives.
Learn about the possible career opportunities once you have become Security+ certified.
Architectural change is often connected to a desire for mastery, purpose, and autonomy.
Achieve high scalability and performance while reducing system complexity.
Learn how you can use OpenVAS to scan your network for hosts and fingerprint their listening services to obtain access.
Learn how you can use Nmap to scan your network to find out which services and hosts are listening and may be vulnerable to compromise.
Learn computer worm malware inside and out by building your own.
Building transparency and individual choice into IoT security.
Learn how to perform a security assessment on a MySQL database with InSpec.
Learn how to integrate InSpec and detect weaknesses in your Docker container.
Learn how to perform security assessments with InSpec over SSH.
Allen Downey takes on elementary school band camp in this fun application of Digital Signal Processing.
Learn what Terraform does, and how it compares to Chef, Puppet, Ansible, CloudFormation, and other tools.
Learn how to access a server from any web browser using Windows 2016 Server Management Tools.
Learn how to perform hot-add/remove in Windows Server 2016 Hyper-V and how it can help you achieve more granular control over memory.
Learn how to deploy Storage Spaces Direct to enable local storage as clustered storage.
Learn how to use the gensim Python library to determine the similarity between two or more documents.
Learn how to tokenize, breaking a sentence down into its words and punctuation, using NLTK and spaCy.
Learn how to use spaCy to parse a sentence to return the parts of speech (noun, verb, etc.) and dependencies.
Learn how integrating Mulumba can help you complete development and testing tasks locally in the AWS Lambda environment.
Learn how to call one Lambda from another AWS Lambda function in the AWS management console.
Learn how uncoupling development from security using AWS Identity and Access Management can enhance security.
Learn how to use Impala’s SQL analytics layer to create a Kudu table.
Learn how hash partitioning affects performance and stability in Kudu.
Learn how to pair two top-tier open source technologies to create scalable data engineering pipelines.
Embrace plurality over single systems of record.
Exploring the economics of cybersecurity.
Learn how to unlock the full potential of your JSON data using the JSON_TABLE function in Oracle SQL.
Learn how the JSON EXISTS function can help you verify the existence of an element or value with Oracle SQL.
Learn how to use the JSON_QUERY function to look for specific JSON elements using Oracle SQL.
Learn the difference between explicit and implicit JOINs and understand which you should use in your MySQL project.
Learn how the JOIN technique can help you present information from two or more tables.
Learn how to join tables with non-matching data using inner or outer join in MySQL
How to build and train an image caption generator using a TensorFlow notebook.
Learn how cloud computing can help reduce business costs by using an array of cloud services.
Learn how multi-factor authentication can better protect your data, and why it should be a primary consideration when choosing a cloud service provider.
Learn how to prevent potential enterprise data leakages from your cloud computing accounts.
If you're familiar with Java or the JVM but want more power from your APIs and want to see what functional programming can do with your data, Scala is a good bet.
Learn how to access, decipher, and implement commands with the correct syntax using the man pages in Linux.
Learn the directory structure and where common files are located in Linux.
Learn to effectively manage your program processes in Linux.
What you need to consider when your microservices architecture is tightly coupled.
Learn how to deal with the shortcomings of the Linux spell command; such as unsorted output, duplicates, and false positives.