Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical API Architecture and Development with Azure and AWS: Design and Implementation of APIs for the Cloud
Practical API Architecture and Development with Azure and AWS: Design and Implementation of APIs for the Cloud
Learn the business and technical importance of API design and architecture using the available cloud services from Azure and AWS.

This book starts off with an introduction to APIs and the concept of API Economy from a business and organizational perspective. You'll decide on a sustainable API strategy and API
...
Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it
Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it

Understanding the concept Dark Web and Dark Net to utilize it for effective cybersecurity

Key Features

  • Understand the concept of Dark Net and Deep Web
  • Use Tor to extract data and maintain anonymity
  • Develop a security framework using Deep web evidences
  • ...
Using MVVM Light with your Xamarin Apps
Using MVVM Light with your Xamarin Apps

Learn how to use the popular MVVM Light development framework with a focus on reliable, maintainable code that can be deployed across any of the .NET-supported mobile platforms. Clear examples are provided of the advantages of the MVVM platform along with step-by-step demonstrations of how to create applications at different...

Web Applications on Azure: Developing for Global Scale
Web Applications on Azure: Developing for Global Scale

Build .NET apps on Microsoft Azure services that can grow to Internet scale. Learn how you can make smart application architecture decisions and follow best practices so that your website can handle tens of thousands of concurrent users and deliver your content globally.

 Author Rob...

Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Ever wonder how easy it is to hack into someone’s bank account info while surfing the net at your local Starbucks? Learning how to hack is one of the best preventative measures you can take when protecting yourself from other hackers. Hacking is often misunderstood and that is for good reason. Many people use hacking as...
Hadoop: The Definitive Guide
Hadoop: The Definitive Guide
Hadoop: The Definitive Guide helps you harness the power of your data. Ideal for processing large datasets, the Apache Hadoop framework is an open source implementation of the MapReduce algorithm on which Google built its empire. This comprehensive resource demonstrates how to use Hadoop to build reliable, scalable, distributed systems: programmers...
Pro .NET Framework with the Base Class Library: Understanding the Virtual Execution System and the Common Type System
Pro .NET Framework with the Base Class Library: Understanding the Virtual Execution System and the Common Type System
Learn about the fundamentals and inner workings of the Common Type System (CTS) and the Virtual Execution System (VES) of the Common Language Runtime (CLR) and how they relate to the Base Class Library (BCL) from the perspective of the execution environment.

The author first gives an introduction to the .NET Framework and
...
Modern Algorithms for Image Processing: Computer Imagery by Example Using C#
Modern Algorithms for Image Processing: Computer Imagery by Example Using C#

Utilize modern methods for digital image processing and take advantage of the many time-saving templates provided for all of the projects in this book.

Modern Algorithms for Image Processing approaches the topic of image processing through teaching by example. Throughout the book, you will create projects...

Go: Building Web Applications
Go: Building Web Applications

Build real-world, production-ready solutions by harnessing the powerful features of Go

About This Book

  • An easy-to-follow guide that provides everything a developer needs to know to build end-to-end web applications in Go
  • Write interesting and clever, but simple code, and learn skills and...
Mastering JavaScript Design Patterns - Second Edition
Mastering JavaScript Design Patterns - Second Edition

Key Features

  • Learn how to use tried and true software design methodologies to enhance your JavaScript code
  • Discover robust JavaScript implementations of classic and advanced design patterns
  • Packed with easy-to-follow examples that can be used to create reusable code and...
Programming Web Applications with Node, Express and Pug
Programming Web Applications with Node, Express and Pug

Learn how to program modern web applications using the full Node.js platform, including Node.js on the server, Express for middleware and routing, and Pug (formerly Jade) to simplify the creation of views.

Node.js is the foundation of all full JavaScript apps and plenty of books cover its full usage. This book focuses on how to use...

Tor And The Dark Net: Learn To Avoid NSA Spying And Become Anonymous Online (Dark Net, Tor, Dark Web, Tor Books) (Volume 1)
Tor And The Dark Net: Learn To Avoid NSA Spying And Become Anonymous Online (Dark Net, Tor, Dark Web, Tor Books) (Volume 1)

Use This Information To Avoid Being Spied By The Government Today!

If you’ve ever heard outrageous stories about online illegal drug stores, hit men for hire, celebrities busted for child porn, mad scientific experiments, and Illuminati rituals, you’ve probably heard of the “dark web”, alternatively called...

Result Page: 190 189 188 187 186 185 184 183 182 181 180 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy