Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Migrating to Azure: Transforming Legacy Applications into Scalable Cloud-First Solutions
Migrating to Azure: Transforming Legacy Applications into Scalable Cloud-First Solutions

Design an enterprise solution from scratch that allows the migration of a legacy application. Begin with the planning and design phase and be guided through all the stages of selecting the architecture framework that fits your enterprise.

Join Microsoft MVP Josh Garverick as he addresses all major areas of design and...

Data Analytics: Concepts, Techniques, and Applications
Data Analytics: Concepts, Techniques, and Applications

Large data sets arriving at every increasing speeds require a new set of efficient data analysis techniques. Data analytics are becoming an essential component for every organization and technologies such as health care, financial trading, Internet of Things, Smart Cities or Cyber Physical Systems. However, these diverse application...

In a Pure Muslim Land: Shi'ism between Pakistan and the Middle East (Islamic Civilization and Muslim Networks)
In a Pure Muslim Land: Shi'ism between Pakistan and the Middle East (Islamic Civilization and Muslim Networks)
Centering Pakistan in a story of transnational Islam stretching from South Asia to the Middle East, Simon Wolfgang Fuchs offers the first in-depth ethnographic history of the intellectual production of Shi'is and their religious competitors in this "Land of the Pure." The notion of Pakistan as the pinnacle of modern global...
Advanced Data Analytics Using Python: With Machine Learning, Deep Learning and NLP Examples
Advanced Data Analytics Using Python: With Machine Learning, Deep Learning and NLP Examples
Gain a broad foundation of advanced data analytics concepts and discover the recent revolution in databases such as Neo4j, Elasticsearch, and MongoDB. This book discusses how to implement ETL techniques including topical crawling, which is applied in domains such as...
Open Source Identity Management Patterns and Practices Using OpenAM 10.x
Open Source Identity Management Patterns and Practices Using OpenAM 10.x

An intuitive guide to learning OpenAM access management capabilities for web and application servers

Overview

  • Learn patterns, practices, and the terminology of Identity Management
  • Learn how to install OpenAM 10.x
  • Protect web and application servers using policy agents
  • ...
Reactive Design Patterns
Reactive Design Patterns

Summary

Reactive Design Patterns is a clearly written guide for building message-driven distributed systems that are resilient, responsive, and elastic. In this book you'll find patterns for messaging, flow control, resource management, and concurrency, along with practical issues like test-friendly...

Introduction to RF Equipment and System Design
Introduction to RF Equipment and System Design
Applies theoretical fundamentals to real-world issues, heavily relying on examples from recent design projects. Key discussions include system design schemes, circuits and components for system evaluations and design.

An excellent resource for engineers and technicians alike, this practical design guide offers a comprehensive and
...
Dependency Injection in .NET Core 2.0: Make use of constructors, parameters, setters, and interface injection to write reusable and loosely-coupled code
Dependency Injection in .NET Core 2.0: Make use of constructors, parameters, setters, and interface injection to write reusable and loosely-coupled code

Inject dependencies and write highly maintainable and flexible code using the new .NET Core DI Engine

About This Book

  • Identify when to use the constructors, parameters, setters, or Interface Injection, for best results
  • Build dependencies not only for MVC within .NET but also for other...
2D Object Detection and Recognition: Models, Algorithms, and Networks
2D Object Detection and Recognition: Models, Algorithms, and Networks
This book is about detecting and recognizing 2D objects in gray-level images. Howare
models constructed? Howare they trained? What are the computational approaches to
efficient implementation on a computer? And finally, how can some of these computations
be implemented in the framework of parallel and biologically plausible neural...
Signal Processing for Remote Sensing
Signal Processing for Remote Sensing
Signal processing has been playing an increasingly important role in remote sensing, though most remote sensing literatures are concerned with remote sensing images. Many data received by remote sensors such as microwave and geophysical sensors, are signals or waveforms, which can be processed by analog and digital signal...
Machine Learning Algorithms: Popular algorithms for data science and machine learning, 2nd Edition
Machine Learning Algorithms: Popular algorithms for data science and machine learning, 2nd Edition

An easy-to-follow, step-by-step guide for getting to grips with the real-world application of machine learning algorithms

Key Features

  • Explore statistics and complex mathematics for data-intensive applications
  • Discover new developments in EM algorithm, PCA, and bayesian...
MERN Quick Start Guide: Build web applications with MongoDB, Express.js, React, and Node
MERN Quick Start Guide: Build web applications with MongoDB, Express.js, React, and Node

Build web applications with MongoDB, ExpressJS, React, and Node

Key Features

  • Build applications with the MERN stack
  • Work with each component of the MERN stack
  • Become confident with MERN and ready for more!

Book Description

...

Result Page: 90 89 88 87 86 85 84 83 82 81 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy