Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Java 9 Dependency Injection: Write loosely coupled code with Spring 5 and Guice
Java 9 Dependency Injection: Write loosely coupled code with Spring 5 and Guice

Create clean code with Dependency Injection principles

Key Features

  • Use DI to make your code loosely coupled to manage and test your applications easily on Spring 5 and Google Guice
  • Learn the best practices and methodologies to implement DI
  • Write more...
Angular 6 for Enterprise-Ready Web Applications: Deliver production-ready and cloud-scale Angular web apps
Angular 6 for Enterprise-Ready Web Applications: Deliver production-ready and cloud-scale Angular web apps

A hands-on guide with a minimalist and flexible approach that enables quick learning and rapid delivery of cloud-ready enterprise applications with Angular 6

Key Features

  • Explore tools and techniques to push your web app to the next level
  • Master Angular app design and...
Django RESTful Web Services: The easiest way to build Python RESTful APIs and web services with Django
Django RESTful Web Services: The easiest way to build Python RESTful APIs and web services with Django

Design, build and test RESTful web services with the Django framework and Python

Key Features

  • Create efficient real-world RESTful web services with the latest Django framework
  • Authenticate, secure, and integrate third-party packages efficiently in your Web Services
  • ...
Expert MySQL (Expert's Voice in Databases)
Expert MySQL (Expert's Voice in Databases)

Expert MySQL is the leading reference for learning, understanding, and extending the MySQL server. It unlocks the full promise of open source by showing how to modify the code, create your own storage engine, build your own authentication plugins, and even add your own functions and commands to the SQL language. No other book...

Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Develop blockchain application with step-by-step instructions, working example and helpful recommendations

Key Features

  • Understanding the blockchain technology from the cybersecurity perspective
  • Developing cyber security solutions with Ethereum blockchain technology
  • ...
Ruby on Rails Tutorial (6th Edition) (Addison-Wesley Professional Ruby Series)
Ruby on Rails Tutorial (6th Edition) (Addison-Wesley Professional Ruby Series)
Used by sites as varied as Twitter, GitHub, Disney, and Airbnb, Ruby on Rails is one of the most popular frameworks for developing web applications, but it can be challenging to learn and use. Whether you’re new to web development or new only to Rails, Ruby on Rails™ Tutorial, Sixth Edition , is the...
Python GUI Programming with Tkinter: Develop responsive and powerful GUI applications with Tkinter
Python GUI Programming with Tkinter: Develop responsive and powerful GUI applications with Tkinter

Find out how to create visually stunning and feature-rich applications by empowering Python's built-in Tkinter GUI toolkit

Key Features

  • Explore Tkinter's powerful features to easily design and customize your GUI application
  • Learn the basics of 2D and 3D animation...
Cryptography Engineering: Design Principles and Practical Applications
Cryptography Engineering: Design Principles and Practical Applications

The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts.

Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the...

Wireless Telecommunications Networking with ANSI-41
Wireless Telecommunications Networking with ANSI-41
ALL-IN-ONE GUIDE TO ANSI-41 Revision E Replacing IS-41, ANSI –41 Revision E is the North American standard for wireless telecommunications network signaling. Written by Randall Snyder and Michael Gallagher, two of the new standard's developers, Wireless Tel Network with ANSI-41, Second Edition provides you with the latest need-to-know...
Getting Started with Containerization: Reduce the operational burden on your system by automating and managing your containers
Getting Started with Containerization: Reduce the operational burden on your system by automating and managing your containers

Choose the smarter way to learn about containerizing your applications and running them in production.

Key Features

  • Deploy and manage highly scalable, containerized applications with Kubernetes
  • Build high-availability Kubernetes clusters
  • Secure your...
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
Node.js Web Development: Server-side development with Node 10 made easy, 4th Edition
Node.js Web Development: Server-side development with Node 10 made easy, 4th Edition

Create a fault-tolerant backend for your real-time applications using Docker, Node.js 10, and MongoDB, and implement HTTPS for hardened security

Key Features

  • Learn server-side programming with JavaScript and Node.js 10
  • Explore the latest JavaScript features and ECMAScript...
Result Page: 51 50 49 48 47 46 45 44 43 42 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy