Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Groovy 3: Java-Based Dynamic Scripting
Learning Groovy 3: Java-Based Dynamic Scripting

Start building powerful apps that take advantage of the dynamic scripting capabilities of the Groovy language, including what's new in Groovy version 3.0. This book covers Groovy fundamentals, such as installing Groovy, using Groovy tools, and working with the Groovy Development Kit (GDK). You'll also learn more advanced...

An Executive’s Guide to Software Quality in an Agile Organization: A Continuous Improvement Journey
An Executive’s Guide to Software Quality in an Agile Organization: A Continuous Improvement Journey
Imagine a world where product quality is integrated into every function in your organization. Developers, quality engineers, product managers, leaders at all levels, sales, services, and support work together and focus on a shared vision. That vision consists of delivering quality value to customers...
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software

Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack.

The most common culprit of...

Learn R for Applied Statistics: With Data Visualizations, Regressions, and Statistics
Learn R for Applied Statistics: With Data Visualizations, Regressions, and Statistics
Gain the R programming language fundamentals for doing the applied statistics useful for data exploration and analysis in data science and data mining. This book covers topics ranging from R syntax basics, descriptive statistics, and data visualizations to inferential statistics and regressions. After learning R’s syntax, you will...
Pro Spring Boot 2: An Authoritative Guide to Building Microservices, Web and Enterprise Applications, and Best Practices
Pro Spring Boot 2: An Authoritative Guide to Building Microservices, Web and Enterprise Applications, and Best Practices

Quickly and productively develop complex Spring applications and microservices out of the box, with minimal concern over things like configurations. This revised book will show you how to fully leverage the Spring Boot 2 technology and how to apply it to create enterprise ready applications that just work.  It will also cover...

Ethereum for Architects and Developers
Ethereum for Architects and Developers
Explore the Ethereum ecosystem step by step with extensive theory, labs, and live use cases. This book takes you through BlockChain concepts; decentralized applications; Ethereum’s architecture; Solidity smart contract programming with examples; and testing, debugging, and deploying smart contracts on...
Understand, Manage, and Prevent Algorithmic Bias: A Guide for Business Users and Data Scientists
Understand, Manage, and Prevent Algorithmic Bias: A Guide for Business Users and Data Scientists

Are algorithms friend or foe?

The human mind is evolutionarily designed to take shortcuts in order to survive. We jump to conclusions because our brains want to keep us safe. A majority of our biases work in our favor, such as when we feel a car speeding in our direction is dangerous and we instantly move, or when we...

Beginning Machine Learning in iOS: CoreML Framework
Beginning Machine Learning in iOS: CoreML Framework
Implement machine learning models in your iOS applications. This short work begins by reviewing the primary principals of machine learning and then moves on to discussing more advanced topics, such as CoreML, the framework used to enable machine learning tasks in Apple products. 

Many applications on iPhone use
...
Professional Red Teaming: Conducting Successful Cybersecurity Engagements
Professional Red Teaming: Conducting Successful Cybersecurity Engagements

Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools.

...

Remaining Relevant in Your Tech Career: When Change Is the Only Constant
Remaining Relevant in Your Tech Career: When Change Is the Only Constant
Remain relevant in the face of constant change during your career in technology. This book shows you how to proactively plan in anticipation of future changes. 

Many people find technology careers enticing because of the number of job opportunities, the high compensation, or simply because of fascination with
...
Java for Absolute Beginners: Learn to Program the Fundamentals the Java 9+ Way
Java for Absolute Beginners: Learn to Program the Fundamentals the Java 9+ Way

Write your first code in Java using simple, step-by-step examples that model real-word objects and events, making learning easy. With this book you’ll be able to pick up the concepts without fuss. Java for Absolute Beginners teaches Java development in language anyone can understand, giving you the best possible start....

Complex Enterprise Architecture: A New Adaptive Systems Approach
Complex Enterprise Architecture: A New Adaptive Systems Approach
Implement successful and cost-effective enterprise architecture projects. This book provides a new approach to developing enterprise architecture based on the idea of emergent behaviors?where instead of micromanaging system implementation, the enterprise architecture effort establishes clear goals and leaves the details to the...
Result Page: 216 215 214 213 212 211 210 209 208 207 206 205 204 203 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy