Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On RESTful API Design Patterns and Best Practices: Design, develop, and deploy highly adaptable, scalable, and secure RESTful web APIs
Hands-On RESTful API Design Patterns and Best Practices: Design, develop, and deploy highly adaptable, scalable, and secure RESTful web APIs

Build effective RESTful APIs for enterprise with design patterns and REST framework's out-of-the-box capabilities

Key Features

  • Understand advanced topics such as API gateways, API securities, and cloud
  • Implement patterns programmatically with easy-to-follow...
Pro ASP.NET MVC 5 (Expert's Voice in ASP.Net)
Pro ASP.NET MVC 5 (Expert's Voice in ASP.Net)

The ASP.NET MVC 5 Framework is the latest evolution of Microsoft’s ASP.NET web platform. It provides a high-productivity programming model that promotes cleaner code architecture, test-driven development, and powerful extensibility, combined with all the benefits of ASP.NET.

ASP.NET MVC 5 contains a number of advances over...

Handbook of Multisensor Data Fusion
Handbook of Multisensor Data Fusion

Multisensor data fusion is an emerging technology with important applications in both the military and civilian sectors, such as target recognition, robotics, medical diagnostics, and "smart" buildings. It draws on techniques from wide-ranging disciplines, including artificial intelligence, pattern recognition, and statistical...

A Practical Introduction to Enterprise Network and Security Management
A Practical Introduction to Enterprise Network and Security Management

Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a solid ground for a successful...

iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
This book is intended for individuals who are interested in the iPhone and other iOS devices and, more importantly, in the type of data that is stored and can be recovered from these devices. The demand for mobile forensics has grown tremendously with the release of smart phones. Communication on these devices is now documented...
Robot Building for Beginners
Robot Building for Beginners

Learning robotics by yourself isnt easy, but it helps when the encouragement comes from an expert whos spent years in the field. Not only does author David Cook assist you in understanding the component parts of robot development, but he also presents valuable techniques that prepare you to make new discoveries on your...

Visual C# 2010 Recipes: A Problem-Solution Approach
Visual C# 2010 Recipes: A Problem-Solution Approach

Mastering the development of .NET 4.0 applications in C# is less about knowing the Visual C# 2010 language and more about knowing how to use the functionality of the .NET Framework class library most effectively. Visual C# 2010 Recipes explores the breadth of the .NET Framework class library and provides specific solutions to common...

Business Process Mapping: Improving Customer Satisfaction
Business Process Mapping: Improving Customer Satisfaction
Praise For Business Process Mapping: Improving Customer Satisfaction, Second Edition

"A must-read for anyone performing business process mapping! This treasure shares step-by-stepapproaches and critical success factors, based on years of practical, customer-focused experience.A real winner!"
в
...

Visual C# 2005 Recipes: A Problem-Solution Approach
Visual C# 2005 Recipes: A Problem-Solution Approach
Mastering the development of Microsoft .NET Framework applications in C# is less about knowing
the C# language and more about knowing how to use the functionality of the .NET Framework
class library most effectively. Visual C# 2005 Recipes explores the breadth of the .NET Framework class
library and provides specific solutions to
...
Information Security Science: Measuring the Vulnerability to Data Compromises
Information Security Science: Measuring the Vulnerability to Data Compromises

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically...

Writing Stored Procedures with Microsoft SQL Server: The Authoritative Solution
Writing Stored Procedures with Microsoft SQL Server: The Authoritative Solution
This book was written so that you can learn how to create stored procedures. I'm
sure that you have created a few stored procedures already. The first stored
procedures I created were simple queries that I encapsulated so that I didn't have to
reload or retype them every time I wanted to run them. After a while, I learned how...
Bioactives in Fruit: Health Benefits and Functional Foods
Bioactives in Fruit: Health Benefits and Functional Foods

For centuries we have known that fruit is important for health, but we are only just beginning to fully understand why.  Bioactives in Fruit: Health Benefits and Functional Foods aims to summarise some of our current knowledge on the bioactive compounds that are associated with the health benefits of...

Result Page: 32 31 30 29 28 27 26 25 24 23 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy