Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microservices: Flexible Software Architecture
Microservices: Flexible Software Architecture

The Most Complete, Practical, and Actionable Guide to Microservices

 

Going beyond mere theory and marketing hype, Eberhard Wolff presents all the knowledge you need to capture the full benefits of this emerging paradigm. He illuminates...

Web Hacking: Attacks and Defense
Web Hacking: Attacks and Defense

"Both novice and seasoned readers will come away with an increased understanding of how Web hacking occurs and enhanced skill at developing defenses against such Web attacks. Technologies covered include Web languages and protocols, Web and database servers, payment systems...

The Art of Computer Programming: Volume 3: Sorting and Searching (2nd Edition)
The Art of Computer Programming: Volume 3: Sorting and Searching (2nd Edition)

The bible of all fundamental algorithms and the work that taught many of today's software developers most of what they know about computer programming.

 

Byte, September 1995

 

...
Database Systems: A Practical Approach to Design, Implementation and Management (4th Edition)
Database Systems: A Practical Approach to Design, Implementation and Management (4th Edition)

This book places a strong emphasis on good design practice, allowing readers to master design methodology in an accessible, step-by-step fashion. In this book, database design methodology is explicitly divided into three phases: conceptual, logical, and physical. Each phase is described in a separate chapter with an example of the methodology...

UNIX(R) System Security: A Guide for Users and System Administrators
UNIX(R) System Security: A Guide for Users and System Administrators

Many of the same features that have attracted the corporate and government world to UNIX have made security very difficult to control. This book examines several high-profile security break-ins, and then provides the information necessary to protect a UNIX system from unauthorized access. Covers all the most recent releases of UNIX.

...
Computers Under Attack: Intruders, Worms and Viruses
Computers Under Attack: Intruders, Worms and Viruses

This book is broken down into 6 parts. The first describes the emergence of a worldwide network of computers, here called Worldnet, and the practices that people have engaged in as a result. The second part describes the problem of electronic breakins. The third part deals with the phenomenon of worms. The fourth part deals with viruses. The...

Microservices with Docker on Microsoft Azure (includes Content Update Program) (Addison-Wesley Microsoft Technology)
Microservices with Docker on Microsoft Azure (includes Content Update Program) (Addison-Wesley Microsoft Technology)

Book + Content Update Program

“Beyond just describing the basics, this book dives into best practices every aspiring microservices developer or architect should know.”
—Foreword by Corey Sanders, Partner Director of Program Management, Azure

Microservice-based
...

Conceptual Database Design: An Entity-Relationship Approach
Conceptual Database Design: An Entity-Relationship Approach

Database design is the process of determining the organization of a database, including its structure, contents, and the applications to be run. For a long time, database design was considered a task for experts, and was regarded as more of an art than a science. However, much progress has been made in database design, and it is now...

Foundations of Databases: The Logical Level
Foundations of Databases: The Logical Level

The definitive book on the foundations and theory of database systems, including advanced topics not presented in any other survey book. Includes a comprehensive resource useful for any database researcher or practitioner that covers both fundamental and advanced topics.

Database theory is a relative newcomer to the field of computer...

Fundamentals of Database Systems (3rd Edition)
Fundamentals of Database Systems (3rd Edition)
Fundamentals of Database Systems combines clear explanations of theory and design, broad coverage of models and real systems, and excellent examples with up-to-date introductions to modern database technologies. This edition is completely revised and updated, and reflects the latest trends in technological and application development....
Principles of CMOS VLSI Design (VLSI systems series)
Principles of CMOS VLSI Design (VLSI systems series)
With this updated text, Weste conveys an understanding of CMOS technology, circuit design, layout, and system design sufficient to feel confident with the technology. The book deals the technology down to the layout level of detail, thereby providing a bridge from a circuit to a form that may be fabricated. The early chapters provide a circuit view...
Application-Specific Integrated Circuits (The VLSI Systems Series)
Application-Specific Integrated Circuits (The VLSI Systems Series)
This comprehensive book on application-specific integrated circuits (ASICs) describes the latest methods in VLSI-systems design. ASIC design, using commercial tools and pre-designed cell libraries, is the fastest, most cost-effective, and least error-prone method of IC design. As a consequence, ASICs and ASIC-design methods have become...
Result Page: 82 81 80 79 78 77 76 75 74 73 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy