Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Most Important Thing: Discovering Truth at the Heart of Life
The Most Important Thing: Discovering Truth at the Heart of Life

From esteemed teacher Adyashanti, a collection of writings on the search for the ultimate reality beneath the narrative of our lives

"Our inner lives are every bit as astonishing, baffling, and mysterious as the infinite vastness of the cosmos." ?Adyashanti

We all define
...

Advanced Microservices: A Hands-on Approach to Microservice Infrastructure and Tooling
Advanced Microservices: A Hands-on Approach to Microservice Infrastructure and Tooling

Use the many types of tools required to navigate and maintain a microservice ecosystem. This book examines what is normally a complex system of interconnected services and clarifies them one at a time, first examining theoretical requirements then looking at concrete tools, configuration, and workflows.

Building out these systems...

Reactive Design Patterns
Reactive Design Patterns

Summary

Reactive Design Patterns is a clearly written guide for building message-driven distributed systems that are resilient, responsive, and elastic. In this book you'll find patterns for messaging, flow control, resource management, and concurrency, along with practical issues like test-friendly...

Graph Theory: A Problem Oriented Approach (Mathematical Association of America Textbooks)
Graph Theory: A Problem Oriented Approach (Mathematical Association of America Textbooks)

Graph Theory presents a natural, reader-friendly way to learn some of the essential ideas of graph theory starting from first principles. The format is similar to the companion text, Combinatorics: A Problem Oriented Approach also by Daniel A. Marcus, in that it combines the features of a textbook with those of a problem...

Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to...

Fundamentals of Wireless Communication
Fundamentals of Wireless Communication
Wireless communication is one of the most vibrant areas in the communication
field today. While it has been a topic of study since the 1960s,
the past decade has seen a surge of research activities in the area. This is
due to a confluence of several factors. First, there has been an explosive
increase in demand for tetherless
...
Introduction to the Semantic  Web and Semantic Web Services
Introduction to the Semantic Web and Semantic Web Services
Even though the semantic Web is a relatively new and dynamic area of research, a whole suite of components, standards, and tools have already been developed around it. Using a concrete approach, Introduction to the Semantic Web and Semantic Web Services builds a firm foundation in the concept of the semantic Web, its principal technologies, its...
Programming with Mathematica®: An Introduction
Programming with Mathematica®: An Introduction

Starting from first principles, this book covers all of the foundational material needed to develop a clear understanding of the Mathematica language, with a practical emphasis on solving problems. Concrete examples throughout the text demonstrate how Mathematica language, can be used to solve problems in science, engineering,...

Applied Cryptography in .NET and Azure Key Vault: A Practical Guide to Encryption in .NET and .NET Core
Applied Cryptography in .NET and Azure Key Vault: A Practical Guide to Encryption in .NET and .NET Core
Benefit from Microsoft's robust suite of security and cryptography primitives to create a complete, hybrid encryption scheme that will protect your data against breaches. This highly practical book teaches you how to use the .NET encryption APIs and Azure Key Vault, and how they can work together to produce a robust...
Foundations of Neural Networks, Fuzzy Systems, and Knowledge Engineering
Foundations of Neural Networks, Fuzzy Systems, and Knowledge Engineering
Here we have a comprehensive, problem-oriented, engineering perspective on the uses of neural nets, fuzzy systems, and hybrids that emphasizes practical solutions to everyday artificial intelligence (AI) problems over abstract theoretical noodling. Intended for upper-division students and postgraduates who need a...
Basic Concepts in Computational Physics
Basic Concepts in Computational Physics

With the development of ever more powerful computers a new branch of physics and engineering evolved over the last few decades: Computer Simulation or Computational Physics. It serves two main purposes:

- Solution of complex mathematical problems such as, differential equations, minimization/optimization, or high-dimensional...

Essentials of Research Design and Methodology (Essentials of Behavioral  Science)
Essentials of Research Design and Methodology (Essentials of Behavioral Science)
Master the essential skills for designing and conducting a successful research project

Essentials of Research Design and Methodology contains practical information on how to design and conduct scientific research in the behavioral and social sciences. This accessible guide covers basic to advanced concepts in a clear, concrete, and readable...

Result Page: 39 38 37 36 35 34 33 32 31 30 
┬ę2020 LearnIT (support@pdfchm.net) - Privacy Policy