Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Develop, validate, and deploy powerful decentralized applications using blockchain 


Get the most out of cutting-edge blockchain technology using the hands-on information contained in this comprehensive resource. Written by a team of technology and legal experts, Blockchain:...
Mastering Cloud Computing: Foundations and Applications Programming
Mastering Cloud Computing: Foundations and Applications Programming

Mastering Cloud Computing is designed for undergraduate students learning to develop cloud computing applications. Tomorrow's applications won’t live on a single computer but will be deployed from and reside on a virtual server, accessible anywhere, any time. Tomorrow's application developers need to understand the...

Encyclopedia of Information Science and Technology, Fourth Edition
Encyclopedia of Information Science and Technology, Fourth Edition

In recent years, our world has experienced a profound shift and progression in available computing and knowledge sharing innovations. These emerging advancements have developed at a rapid pace, disseminating into and affecting numerous aspects of contemporary society. This has created a pivotal need for an innovative compendium encompassing...

Python: Data Analytics and Visualization
Python: Data Analytics and Visualization

Understand, evaluate, and visualize data About This Book - Learn basic steps of data analysis and how to use Python and its packages - A step-by-step guide to predictive modeling including tips, tricks, and best practices - Effectively visualize a broad set of analyzed data and generate effective results Who This Book Is For This book is for...

System Parameter Identification: Information Criteria and Algorithms (Elsevier Insights)
System Parameter Identification: Information Criteria and Algorithms (Elsevier Insights)

Recently, criterion functions based on information theoretic measures (entropy, mutual information, information divergence) have attracted attention and become an emerging area of study in signal processing and system identification domain. This book presents a systematic framework for system identification and information processing,...

Networking Essentials: A CompTIA Network+ N10-006 Textbook (4th Edition)
Networking Essentials: A CompTIA Network+ N10-006 Textbook (4th Edition)

Thoroughly updated to reflect the CompTIA Network+ N10-006 exam, Networking Essentials, Fourth Edition is a practical, up-to-date, and hands-on guide to the basics of networking. Written from the viewpoint of a working network administrator, it requires absolutely no experience with either network concepts or...

AWS Certified Advanced Networking Official Study Guide: Specialty Exam
AWS Certified Advanced Networking Official Study Guide: Specialty Exam

The official study guide for the AWS certification specialty exam

The AWS Certified Advanced Networking Official Study Guide – Specialty Exam helps to ensure your preparation for the AWS Certified Advanced Networking – Specialty Exam. Expert review of AWS fundamentals align with the exam objectives,...

Java in 21 Days, Sams Teach Yourself (Covering Java 8) (7th Edition)
Java in 21 Days, Sams Teach Yourself (Covering Java 8) (7th Edition)

In just 21 days you can acquire the knowledge and skills necessary to develop applications on your computer and apps that run on Android phones and tablets. With this complete tutorial you’ll quickly master the basics and then move on to more advanced features and concepts.

Completely updated for Java 8,...

Information Security: The Complete Reference, Second Edition
Information Security: The Complete Reference, Second Edition

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Develop and implement an effective end-to-end security program

Today’s complex world of mobile platforms, cloud...

Hands-on DevOps: Explore the concept of continuous delivery and integrate it with data science concepts
Hands-on DevOps: Explore the concept of continuous delivery and integrate it with data science concepts

Transform yourself into a specialist in DevOps adoption for Big Data on cloud

Key Features

  • Learn the concepts of Bigdata and Devops and Implement them
  • Get Acquainted with DevOps Frameworks Methodologies and Tools
  • A practical approach to build and work efficiently with your...
The Internet of Things in the Cloud: A Middleware Perspective
The Internet of Things in the Cloud: A Middleware Perspective

Although the Internet of Things (IoT) is a vast and dynamic territory that is evolving rapidly, there has been a need for a book that offers a holistic view of the technologies and applications of the entire IoT spectrum. Filling this void, The Internet of Things in the Cloud: A Middleware Perspective provides a comprehensive...

Thinking Security: Stopping Next Year's Hackers (Addison-Wesley Professional Computing Series)
Thinking Security: Stopping Next Year's Hackers (Addison-Wesley Professional Computing Series)

If you’re a security or network professional, you already know the “do’s and don’ts”: run AV software and firewalls, lock down your systems, use encryption, watch network traffic, follow best practices, hire expensive consultants . . . but it isn’t working. You’re at greater risk...

Result Page: 225 224 223 222 221 220 219 218 217 216 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy