Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer
Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer

Leverage the power of Hyperledger Fabric to develop Blockchain-based distributed ledgers with ease

Key Features

  • Write your own chaincode/smart contracts using Golang on hyperledger network
  • Build and deploy decentralized applications (DApps)
  • Dive into real...
Firewalls Don’t Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies
Firewalls Don’t Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies

Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself?step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't really know....

Data Professionals at Work
Data Professionals at Work
Enjoy reading interviews with more than two dozen data professionals to see a picture of what it’s like to work in the industry managing and analyzing data, helping you to know what it takes to move from your current expertise into one of the fastest growing areas of technology today. Data is the hottest word of...
Software Development From A to Z: A Deep Dive into all the Roles Involved in the Creation of Software
Software Development From A to Z: A Deep Dive into all the Roles Involved in the Creation of Software

Understand the big picture of the software development process. We use software every day – operating systems, applications, document editing programs, home banking – but have you ever wondered who creates software and how it’s created? This book guides you through the entire process, from conception to the finished...

Firewalls Don't Stop Dragons: A Step-By-Step Guide to Computer Security for Non-Techies
Firewalls Don't Stop Dragons: A Step-By-Step Guide to Computer Security for Non-Techies
Fully updated and expanded!
  • Added steps for Windows 10 and Mac OS X El Capitan
  • Over 30% more material
  • Expanded coverage on mobile device safety
  • Expanded coverage on safety for kids online
Contains well over 100 tips with complete step-by-step
...
NHibernate in Action
NHibernate in Action
In the classic style of Manning's "In Action" series, NHibernate in Action shows .NET developers how to use the NHibernate Object/Relational Mapping tool. This book is a translation from Java to .NET, as well as an expansion, of Manning's bestselling Hibernate in Action. All traces of Java have been carefully replaced by their .NET...
Elementary Linear Programming with Applications, Second Edition
Elementary Linear Programming with Applications, Second Edition

Linear programming finds the least expensive way to meet given needs with available resources. Its results are used in every area of engineering and commerce: agriculture, oil refining, banking, and air transport. Authors Kolman and Beck present the basic notions of linear programming and illustrate how they are used to solve important common...

High-Performance Oracle: Proven Methods for Achieving Optimum Performance and Availability
High-Performance Oracle: Proven Methods for Achieving Optimum Performance and Availability
"Geoff Ingram has met the challenge of presenting the complex process of managing Oracle performance. This book can support every technical person looking to resolve Oracle8i and Oracle9i performance issues."
–Aki Ratner, President, Precise Software Solutions

Ensuring high-performance and continuous availability of...

Plunkett's Wireless, Wi-Fi, RFID & Cellular Industry Almanac 2011
Plunkett's Wireless, Wi-Fi, RFID & Cellular Industry Almanac 2011

Rapid development of new technologies is leading to ever more versatile, multipurpose mobile devices, including 3G and 4G Internet-enabled cell phones. Wireless networking and wireless Internet access are developing and expanding on a global basis at a rapid rate. Meanwhile, RFID (radio frequency identification) will revolutionize wireless...

Biometric Image Discrimination Technologies (Computational Intelligence and Its Applications Series)
Biometric Image Discrimination Technologies (Computational Intelligence and Its Applications Series)
Personal identification and verification both play a critical role in our society.
Today, more and more business activities and work practices are computerized. Ecommerce
applications, such as e-banking, or security applications, such as building
access, demand fast, real-time and accurate personal identification. Traditional
...
Spring Persistence with Hibernate
Spring Persistence with Hibernate

Spring is the leading platform to build and run enterprise Java applications. Spring's Hibernate integration makes it easy to mix and match persistence methodologies simplifying your Hibernate applications. You can incorporate lots of Inversion of Control (IoC) convenience features to address many typical Hibernate integration issues,...

Mastering Data Mining: The Art and Science of Customer Relationship Management
Mastering Data Mining: The Art and Science of Customer Relationship Management
"Berry and Linoff lead the reader down an enlightened path of best practices." -Dr. Jim Goodnight, President and Cofounder, SAS Institute Inc.

"This is a great book, and it will be in my stack of four or five essential resources for my professional work." -Ralph Kimball, Author of The Data Warehouse Lifecycle
...
Result Page: 19 18 17 16 15 14 13 12 11 10 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy