Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Microservices Architectural Patterns: Event-Based Java Microservices with Spring Boot and Spring Cloud
Practical Microservices Architectural Patterns: Event-Based Java Microservices with Spring Boot and Spring Cloud
Take your distributed applications to the next level and see what the reference architectures associated with microservices can do for you. This book begins by showing you the distributed computing architecture landscape and provides an in-depth view of microservices architecture. Following this, you will work with CQRS, an essential...
TCP/IP Network Administration (3rd Edition; O'Reilly Networking)
TCP/IP Network Administration (3rd Edition; O'Reilly Networking)

The first edition of TCP/IP Network Administration was written in 1992. In the decade since, many things have changed, yet some things remain the same. TCP/IP is still the preeminent communications protocol for linking together diverse computer systems. It remains the basis of interoperable...

Neo4j High Performance
Neo4j High Performance

Design, build, and administer scalable graph database systems for your applications using Neo4j

About This Book

  • Explore the numerous components that provide abstractions for pretty much any functionality you need from your persistent graphs
  • Familiarize yourself with how to test the...
Blockchain for Business 2019: A user-friendly introduction to blockchain technology and its business applications
Blockchain for Business 2019: A user-friendly introduction to blockchain technology and its business applications

Your one-stop guide to blockchain technology and its business applications

Key Features

  • Assimilate blockchain services such as Ethereum and Hyperledger to transform industrial applications
  • Know in and out of blockchain technology to understand various business use...
The Definitive Guide to AWS Infrastructure Automation: Craft Infrastructure-as-Code Solutions
The Definitive Guide to AWS Infrastructure Automation: Craft Infrastructure-as-Code Solutions

Discover the pillars of AWS infrastructure automation, starting with API-driven infrastructure concepts and its immediate benefits such as increased agility, automation of the infrastructure life cycle, and flexibility in experimenting with new architectures. With this base established, the book discusses infrastructure-as-code...

BIRT: A Field Guide to Reporting (The Eclipse Series)
BIRT: A Field Guide to Reporting (The Eclipse Series)

The first in a two-book series about Business Intelligence and Reporting Technology, BIRT: A Field Guide to Reporting introduces reporting to a broad base of users. Built on the Eclipse platform, this exciting technology makes it possible for programmers and non-programmers to build and deploy complex reports with...

Clean Code: A Handbook of Agile Software Craftsmanship (Robert C. Martin Series)
Clean Code: A Handbook of Agile Software Craftsmanship (Robert C. Martin Series)

Even bad code can function. But if code isn’t clean, it can bring a development organization to its knees. Every year, countless hours and significant resources are lost because of poorly written code. But it doesn’t have to be that way.

Noted software expert Robert C. Martin presents a revolutionary paradigm with
...

Ethical Hacking and Countermeasures: Attack Phases (EC-Council Press)
Ethical Hacking and Countermeasures: Attack Phases (EC-Council Press)

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan,...

MERN Quick Start Guide: Build web applications with MongoDB, Express.js, React, and Node
MERN Quick Start Guide: Build web applications with MongoDB, Express.js, React, and Node

Build web applications with MongoDB, ExpressJS, React, and Node

Key Features

  • Build applications with the MERN stack
  • Work with each component of the MERN stack
  • Become confident with MERN and ready for more!

Book Description

...

Host Identity Protocol (HIP): Towards the Secure Mobile Internet (Wiley Series on Communications Networking &Distributed Systems)
Host Identity Protocol (HIP): Towards the Secure Mobile Internet (Wiley Series on Communications Networking &Distributed Systems)
“Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it.” - Jari Arkko, Internet Area...
Penetration Testing: Procedures & Methodologies
Penetration Testing: Procedures & Methodologies

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Google Maps JavaScript API Cookbook
Google Maps JavaScript API Cookbook

This book will help you use the amazing resource that is Google Maps to your own ends. From showing maps on mobiles to creating GIS applications, this lively, recipe-packed guide is all you need.

Overview

  • Add to your website's functionality by utilizing Google Maps' power
  • Full of...
Result Page: 69 68 67 66 65 64 63 62 61 60 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy