Home | Amazing | Today | Tags | Publishers | Years | Search 
Optimizing Data-to-Learning-to-Action: The Modern Approach to Continuous Performance Improvement for Businesses
Optimizing Data-to-Learning-to-Action: The Modern Approach to Continuous Performance Improvement for Businesses

Apply a powerful new approach and method that ensures continuous performance improvement for your business. You will learn how to determine and value the people, process, and technology-based solutions that will optimize your organization’s data-to-learning-to-action processes.

This book describes in...

Practical Bot Development: Designing and Building Bots with Node.js and Microsoft Bot Framework
Practical Bot Development: Designing and Building Bots with Node.js and Microsoft Bot Framework
Explore the concept of bots and discover the motivation behind working with these new apps with messaging platforms. This book is an accessible resource teaching the basic concepts behind bot design and implementation. Each chapter builds on previous topics and, where appropriate, real working code is shown that implements the concepts. By...
Business Process Automation with ProcessMaker 3.1: A Beginner’s Guide
Business Process Automation with ProcessMaker 3.1: A Beginner’s Guide

Use this practical, hands-on guide to get started with ProcessMaker. The book provides clear steps for you to walk through and set up ProcessMaker on your own system and make processes run faster and smarter. You will model and build a complete business process for requesting, approving, and reporting expenses.

In the...

Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
VMware vSphere 6.5 Cookbook - Third Edition: Over 140 task-oriented recipes to install, configure, manage, and orchestrate various VMware vSphere 6.5 components
VMware vSphere 6.5 Cookbook - Third Edition: Over 140 task-oriented recipes to install, configure, manage, and orchestrate various VMware vSphere 6.5 components

Deploy and manage VMware vSphere 6.5 components with ease

Key Features

  • Simplified and to-the-point theory and practical recipes to deploy and manage vSphere 6.5
  • Discover the best ways to deploy stateless and stateful ESXi hosts and upgrade them
  • Storage and...
Hands-On Transfer Learning with Python: Implement advanced deep learning and neural network models using TensorFlow and Keras
Hands-On Transfer Learning with Python: Implement advanced deep learning and neural network models using TensorFlow and Keras

Deep learning simplified by taking supervised, unsupervised, and reinforcement learning to the next level using the Python ecosystem

Key Features

  • Build deep learning models with transfer learning principles in Python
  • implement transfer learning to solve real-world research...
Blockchain for Enterprise: Build scalable blockchain applications with privacy, interoperability, and permissioned features
Blockchain for Enterprise: Build scalable blockchain applications with privacy, interoperability, and permissioned features

Implement blockchain principles in your choice of domain using Ethereum

Key Features

  • Build permissioned enterprise-grade blockchain applications from scratch
  • Implement Blockchain-as-a-Service to enterprises in terms of deployment and security
  • Achieve...
DevOps for Azure Applications: Deploy Web Applications on Azure
DevOps for Azure Applications: Deploy Web Applications on Azure
Deploy web applications on Azure using DevOps tools. This book gives solutions to real-world Cloud deployment scenarios which will enable you to become adept in DevOps work for Azure.

You'll start by seeing an overview of DevOps for Azure deployments where you will also survey the available tools,
...
Hands-On Cybersecurity for Architects: Plan and design robust security architectures
Hands-On Cybersecurity for Architects: Plan and design robust security architectures

Gain practical experience of creating security solutions and designing secure, highly available, and dynamic infrastructure for your organization

Key Features

  • Architect complex security structures using standard practices and use cases
  • Integrate security with any...
DevOps for Serverless Applications: Design, deploy, and monitor your serverless applications using DevOps practices
DevOps for Serverless Applications: Design, deploy, and monitor your serverless applications using DevOps practices

Set up complete CI and CD pipelines for your serverless applications using DevOps principles

Key Features

  • Understand various services for designing serverless architecture
  • Build CD pipelines using various cloud providers for your serverless applications
  • ...
Expert Twisted: Event-Driven and Asynchronous Programming with Python
Expert Twisted: Event-Driven and Asynchronous Programming with Python
Explore Twisted, the Python-based event-driven networking engine, and review several of its most popular application projects. It is written by community leaders who have contributed to many of the projects covered, and share their hard-won insights and experience.

Expert Twisted starts with an introduction...
Jira 8 Administration Cookbook: Over 90 recipes to administer, customize, and extend Jira Core and Jira Service Desk, 3rd Edition
Jira 8 Administration Cookbook: Over 90 recipes to administer, customize, and extend Jira Core and Jira Service Desk, 3rd Edition

Build customized solutions that fulfil your business requirements using the latest features of Jira 8

Key Features

  • Learn how to customize Jira applications to suit your organizational requirements
  • Extend Jira's capabilities for custom integrations with other products...
Result Page: 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy