Featured | Featured article

Testing Your React Components with Jest: A Quick Guide

When testing a component, you basically proceed in the same way as for an ordinary unit test: you prepare the environment, you perform an operation, and check the result.

Rheinwerk Computing
Rheinwerk Computing

Rheinwerk Computing is an imprint of Rheinwerk Publishing and publishes books by leading experts in the fields of programming, administration, security, analytics, and more.

Blogs by Rheinwerk Computing

What Is?

What Is YAML and How Is It Used with Kubernetes?

To make your intended result clear to Kubernetes, you need a language in which you can specify your resources declaratively.

Partitioning Basics for New Linux Users

Before you downsize the Windows partition or decide in the installation program on the optimal size of the new partitions for Linux, you should know...

DevOps

How to Scale and Load Balance in Kubernetes

Along with self-healing, horizontal scaling is one of the best features of Kubernetes that significantly simplifies IT operations.

Security

What Are the 4 Principles of Cryptography?

The main purpose of cryptography is to meet one or more of these security principles: confidentiality, integrity, authenticity, and nonrepudiation.

Programming Languages

What Are the Different C++ Compilers?

Curious about C++ compilers? Find out how GCC, Clang++, and MSVC stack up for modern development and what makes each one unique!

Security

What Are Red Teaming and Purple Teaming in Cybersecurity?

Discover how red teaming and purple teaming can strengthen your cybersecurity defenses by simulating real-world attacks and fostering collaboration...

DevOps

Why Should You Use Kubernetes?

Understanding why your company should adopt Kubernetes begins with identifying how it can optimize value creation and align with your business goals.

Programming Languages

When Is Cleanup Not Necessary in C++ Programs?

Sometimes, skipping memory cleanup at program termination can save valuable time—especially when working with large data structures—while letting the...

JavaScript

How to Master Time in JavaScript: Essential Tips for Using the Date Object and Custom Extensions

Master the art of handling time in JavaScript with this guide to creating, formatting, and calculating time data using the powerful Date object and...

Featured

Securing SSH Access with YubiKey: A Step-by-Step Guide to Two-Factor Authentication

Learn about enhancing your SSH login security with YubiKey, a robust two-factor authentication method using a USB security token for one-time...