Home | Amazing | Today | Tags | Publishers | Years | Search 
The Longing for Less: Living with Minimalism
The Longing for Less: Living with Minimalism

"More than just a story of an abiding cultural preoccupation, The Longing For Less peels back the commodified husk of minimalism to reveal something surprising and thoroughly alive." -Jenny Odell, author of How to Do Nothing

"Thoughtful and absorbing . . . A superb outing...

Build a Next-Generation Digital Workplace: Transform Legacy Intranets to Employee Experience Platforms
Build a Next-Generation Digital Workplace: Transform Legacy Intranets to Employee Experience Platforms

Evolve your traditional intranet platform into a next-generation digital workspace with this comprehensive book. Through in-depth coverage of strategies, methods, and case studies, you will learn how to design and build an employee experience platform (EXP) for improved employee productivity, engagement, and collaboration.

...

The Definitive Guide to AWS Infrastructure Automation: Craft Infrastructure-as-Code Solutions
The Definitive Guide to AWS Infrastructure Automation: Craft Infrastructure-as-Code Solutions

Discover the pillars of AWS infrastructure automation, starting with API-driven infrastructure concepts and its immediate benefits such as increased agility, automation of the infrastructure life cycle, and flexibility in experimenting with new architectures. With this base established, the book discusses infrastructure-as-code...

Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment
Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth.

The IoT
...
Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions
Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions
Understand critical cybersecurity and risk perspectives, insights, and tools for the leaders of complex financial systems and markets. This book offers guidance for decision makers and helps establish a framework for communication between cyber leaders and front-line professionals. Information is provided to help in the analysis of...
Building Xamarin.Forms Mobile Apps Using XAML: Mobile Cross-Platform XAML and Xamarin.Forms Fundamentals
Building Xamarin.Forms Mobile Apps Using XAML: Mobile Cross-Platform XAML and Xamarin.Forms Fundamentals

Leverage Xamarin.Forms to build iOS and Android apps using a single, cross-platform approach. This book is the XAML companion to the C# guide Xamarin Mobile Application Development

You'll begin with an overview of Xamarin.Forms, then move on to an in-depth XAML (eXtensible Application Markup Language)...

Machine Learning with Microsoft Technologies: Selecting the Right Architecture and Tools for Your Project
Machine Learning with Microsoft Technologies: Selecting the Right Architecture and Tools for Your Project

Know how to do machine learning with Microsoft technologies. This book teaches you to do predictive, descriptive, and prescriptive analyses with Microsoft Power BI, Azure Data Lake, SQL Server, Stream Analytics, Azure Databricks, HD Insight, and more.

The ability to analyze massive amounts of real-time data and predict...

Developing Bots with QnA Maker Service: Integration with Azure Bot Service and Microsoft Bot Framework
Developing Bots with QnA Maker Service: Integration with Azure Bot Service and Microsoft Bot Framework

Learn to develop bots with zero coding knowledge using the Azure Cognitive QnA Maker service, a GUI cognitive service from Microsoft. This book shows you how to integrate QnA Maker with the Azure Bot Service and Microsoft Bot Framework, along with how to integrate your bot with social channels such as Web Chat,...

Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software

Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack.

The most common culprit of...

Java Design Patterns: A Hands-On Experience with Real-World Examples
Java Design Patterns: A Hands-On Experience with Real-World Examples

Get hands-on experience implementing 26 of the most common design patterns using Java and Eclipse. In addition to Gang of Four (GoF) design patterns, you will also learn about alternative design patterns, and understand the criticisms of design patterns with an overview of anti-patterns. For each pattern you will see at least...

Microservices for the Enterprise: Designing, Developing, and Deploying
Microservices for the Enterprise: Designing, Developing, and Deploying
Understand the key challenges and solutions around building microservices in the enterprise application environment. This book provides a comprehensive understanding of microservices architectural principles and how to use microservices in real-world scenarios.

Architectural challenges using microservices with service
...
Migrating to Azure: Transforming Legacy Applications into Scalable Cloud-First Solutions
Migrating to Azure: Transforming Legacy Applications into Scalable Cloud-First Solutions

Design an enterprise solution from scratch that allows the migration of a legacy application. Begin with the planning and design phase and be guided through all the stages of selecting the architecture framework that fits your enterprise.

Join Microsoft MVP Josh Garverick as he addresses all major areas of design and...

Result Page: 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy