Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Software Engineering
Handbook of Software Engineering
This handbook provides a unique and in-depth survey of the current state-of-the-art in software engineering, covering its major topics, the conceptual genealogy of each subfield, and discussing future research directions. Subjects include foundational areas of software engineering (e.g. software processes, requirements engineering,...
Deep Learning with PyTorch: A practical approach to building neural network models using PyTorch
Deep Learning with PyTorch: A practical approach to building neural network models using PyTorch

Build neural network models in text, vision and advanced analytics using PyTorch

Key Features

  • Learn PyTorch for implementing cutting-edge deep learning algorithms.
  • Train your neural networks for higher speed and flexibility and learn how to implement them in various...
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Blockchain for Business 2019: A user-friendly introduction to blockchain technology and its business applications
Blockchain for Business 2019: A user-friendly introduction to blockchain technology and its business applications

Your one-stop guide to blockchain technology and its business applications

Key Features

  • Assimilate blockchain services such as Ethereum and Hyperledger to transform industrial applications
  • Know in and out of blockchain technology to understand various business use...
Docker on Windows: From 101 to production with Docker on Windows, 2nd Edition
Docker on Windows: From 101 to production with Docker on Windows, 2nd Edition

Learn how to run new and old applications in Docker containers on Windows - modernizing the architecture, improving security and maximizing efficiency.

Key Features

  • Run .NET Framework and .NET Core apps in Docker containers for efficiency, security and portability
  • Design...
Getting Started with Containerization: Reduce the operational burden on your system by automating and managing your containers
Getting Started with Containerization: Reduce the operational burden on your system by automating and managing your containers

Choose the smarter way to learn about containerizing your applications and running them in production.

Key Features

  • Deploy and manage highly scalable, containerized applications with Kubernetes
  • Build high-availability Kubernetes clusters
  • Secure your...
Complete Vue.js 2 Web Development: Practical guide to building end-to-end web development solutions with Vue.js 2
Complete Vue.js 2 Web Development: Practical guide to building end-to-end web development solutions with Vue.js 2

Become a pro in creating modern interactive web applications using this JavaScript framework

Key Features

  • Explore the exciting features of Vue.js 2 through interesting examples and practical recipes
  • Craft highly modular applications using design patterns and the component...
Building RESTful Web Services with Spring 5 - Second Edition: Leverage the power of Spring 5.0, Java SE 9, and Spring Boot 2.0
Building RESTful Web Services with Spring 5 - Second Edition: Leverage the power of Spring 5.0, Java SE 9, and Spring Boot 2.0

Find out how to implement the REST architecture to build resilient software in Java with the help of the Spring 5.0 framework.

Key Features

  • Follow best practices and explore techniques such as clustering and caching to achieve a reactive, scalable web service,
  • Leverage...
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Develop blockchain application with step-by-step instructions, working example and helpful recommendations

Key Features

  • Understanding the blockchain technology from the cybersecurity perspective
  • Developing cyber security solutions with Ethereum blockchain technology
  • ...
Building Modern Web Applications Using Angular
Building Modern Web Applications Using Angular

Key Features

  • Learn about the core building blocks of Angular
  • Build and architect high performance web applications
  • Implement the latest JavaScript concepts in ECMAScript 2015, ECMAScript 2016, and TypeScript
  • Leverage the latest Angular features to get the most out of your web...
Lonely Planet Andalucia (Regional Guide)
Lonely Planet Andalucia (Regional Guide)

Lonely Planet: The world's leading travel guide publisher

Lonely Planet's Andalucíais your passport to the most relevant, up-to-date advice on what to see and skip, and what hidden discoveries await you. Experience the Alhambra's perfect blend of architecture and nature, visit the...

Pro Power BI Architecture: Sharing, Security, and Deployment Options for Microsoft Power BI Solutions
Pro Power BI Architecture: Sharing, Security, and Deployment Options for Microsoft Power BI Solutions
Architect and deploy a Power BI solution. This book will help you understand the many available options and choose the best combination for hosting, developing, sharing, and deploying a Power BI solution within your organization.

Pro Power BI Architecture provides detailed examples and explains...
unlimited object storage image
Result Page: 238 237 236 235 234 233 232 231 230 229 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy