Home | Amazing | Today | Tags | Publishers | Years | Search 
Beginning Serverless Computing: Developing with Amazon Web Services, Microsoft Azure, and Google Cloud
Beginning Serverless Computing: Developing with Amazon Web Services, Microsoft Azure, and Google Cloud
Learn the basics of serverless computing and how to develop event-driven architectures with the three major cloud platforms: Amazon Web Services, Microsoft Azure, and Google Cloud. This hands-on guide dives into the foundations of serverless computing, its use cases, and how to apply it using developer tools such as Node.js, Visual...
Google Cloud Platform for Architects: Design and manage powerful cloud solutions
Google Cloud Platform for Architects: Design and manage powerful cloud solutions

Get started with GCP and manage robust, highly available, and dynamic solutions to drive business objectives

Key Features

  • Identify the strengths, weaknesses and ideal use cases for individual services offered on the Google Cloud Platform (GCP)
  • Make intelligent choices...
Big Data Analytics with Hadoop 3: Build highly effective analytics solutions to gain valuable insight into your big data
Big Data Analytics with Hadoop 3: Build highly effective analytics solutions to gain valuable insight into your big data

Explore big data concepts, platforms, analytics, and their applications using the power of Hadoop 3

Key Features

  • Learn Hadoop 3 to build effective big data analytics solutions on-premise and on cloud
  • Integrate Hadoop with other big data tools such as R, Python, Apache...
Fundamentals of Linux: Explore the essentials of the Linux command line
Fundamentals of Linux: Explore the essentials of the Linux command line

Develop a solid understanding of the important command-line tools and utilities in Linux

Key Features

  • Delve into the fundamentals of Linux
  • Explore and work with virtualization, command lines, and Bash shell scripts
  • Use special file permission flags such as...
Office 365 for Healthcare Professionals: Improving Patient Care Through Collaboration, Compliance, and Productivity
Office 365 for Healthcare Professionals: Improving Patient Care Through Collaboration, Compliance, and Productivity

Leverage Office 365 and the cloud in order to be more productive, secure, and compliant with healthcare standards. This book offers prescriptive guidance and real-world use cases to help you maximize and extend care for patients, while working with fewer resources and striving to stay modern and secure.  

...

Introduction to Blockchain and Ethereum: Use distributed ledgers to validate digital transactions in a decentralized and trustless manner
Introduction to Blockchain and Ethereum: Use distributed ledgers to validate digital transactions in a decentralized and trustless manner

Build distributed applications that resolve data ownership issues when working with transactions between multiple parties

Key Features

  • Explore a perfect balance between theories and hands-on activities
  • Discover popular Blockchain use cases such as Bitcoin
  • ...
Mastering JavaScript Design Patterns - Second Edition
Mastering JavaScript Design Patterns - Second Edition

Key Features

  • Learn how to use tried and true software design methodologies to enhance your JavaScript code
  • Discover robust JavaScript implementations of classic and advanced design patterns
  • Packed with easy-to-follow examples that can be used to create reusable code and...
Mastering Microsoft Power BI: Expert techniques for effective data analytics and business intelligence
Mastering Microsoft Power BI: Expert techniques for effective data analytics and business intelligence

Design, create and manage robust Power BI solutions to gain meaningful business insights

Key Features

  • Master all the dashboarding and reporting features of Microsoft Power BI
  • Combine data from multiple sources, create stunning visualizations and publish your reports across...
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Develop blockchain application with step-by-step instructions, working example and helpful recommendations

Key Features

  • Understanding the blockchain technology from the cybersecurity perspective
  • Developing cyber security solutions with Ethereum blockchain technology
  • ...
Mastering Numerical Computing with NumPy: Master scientific computing and perform complex operations with ease
Mastering Numerical Computing with NumPy: Master scientific computing and perform complex operations with ease

Enhance the power of NumPy and start boosting your scientific computing capabilities

Key Features

  • Grasp all aspects of numerical computing and understand NumPy
  • Explore examples to learn exploratory data analysis (EDA), regression, and clustering
  • Access...
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques

Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment―that is, reconnaissance―is not given enough attention by security professionals,...

Matplotlib 3.0 Cookbook: Over 150 recipes to create highly detailed interactive visualizations using Python
Matplotlib 3.0 Cookbook: Over 150 recipes to create highly detailed interactive visualizations using Python

Build attractive, insightful, and powerful visualizations to gain quality insights from your data

Key Features

  • Master Matplotlib for data visualization
  • Customize basic plots to make and deploy figures in cloud environments
  • Explore recipes to design various...
Result Page: 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy