Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats

Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful...

Django RESTful Web Services: The easiest way to build Python RESTful APIs and web services with Django
Django RESTful Web Services: The easiest way to build Python RESTful APIs and web services with Django

Design, build and test RESTful web services with the Django framework and Python

Key Features

  • Create efficient real-world RESTful web services with the latest Django framework
  • Authenticate, secure, and integrate third-party packages efficiently in your Web Services
  • ...
Expert SQL Server Transactions and Locking: Concurrency Internals for SQL Server Practitioners
Expert SQL Server Transactions and Locking: Concurrency Internals for SQL Server Practitioners
Some time ago, one of my colleagues asked me, “What do you like about SQL Server the most?” I had heard this question many times before, and so I provided my usual answer: “SQL Server Internals. I like to understand how the product works and solve complex problems with this knowledge.”

His
...
The Data-Driven Project Manager: A Statistical Battle Against Project Obstacles
The Data-Driven Project Manager: A Statistical Battle Against Project Obstacles
Discover solutions to common obstacles faced by project managers. Written as a business novel, the book is highly interactive, allowing readers to participate and consider options at each stage of a project. The book is based on years of experience, both through the author's research projects as well as his teaching lectures at business...
Optimizing Data-to-Learning-to-Action: The Modern Approach to Continuous Performance Improvement for Businesses
Optimizing Data-to-Learning-to-Action: The Modern Approach to Continuous Performance Improvement for Businesses

Apply a powerful new approach and method that ensures continuous performance improvement for your business. You will learn how to determine and value the people, process, and technology-based solutions that will optimize your organization’s data-to-learning-to-action processes.

This book describes in...

Google Flutter Mobile Development Quick Start Guide: Get up and running with iOS and Android mobile app development
Google Flutter Mobile Development Quick Start Guide: Get up and running with iOS and Android mobile app development

A fast-paced guide to get you started with cross-platform mobile application development with Google Flutter

Key Features

  • Understand the fundamentals of Flutter and get started with cross-platform mobile app development.
  • Learn about different widgets in Flutter and...
Adopting Elixir: From Concept to Production
Adopting Elixir: From Concept to Production

Adoption is more than programming. Elixir is an exciting new language, but to successfully get your application from start to finish, you're going to need to know more than just the language. The case studies and strategies in this book will get you there. Learn the best practices for the whole life of your application, from...

Java EE 8 High Performance: Master techniques such as memory optimization, caching, concurrency, and multithreading to achieve maximum performance from your enterprise applications.
Java EE 8 High Performance: Master techniques such as memory optimization, caching, concurrency, and multithreading to achieve maximum performance from your enterprise applications.

Get more control of your applications performances in development and production and know how to meet your Service Level Agreement on critical microservices.

Key Features

  • Learn how to write a JavaEE application with performance constraints (Service Level Agreement?SLA) leveraging the...
Deep Learning for Computer Vision: Expert techniques to train advanced neural networks using TensorFlow and Keras
Deep Learning for Computer Vision: Expert techniques to train advanced neural networks using TensorFlow and Keras

Learn how to model and train advanced neural networks to implement a variety of Computer Vision tasks

Key Features

  • Train different kinds of deep learning model from scratch to solve specific problems in Computer Vision
  • Combine the power of Python, Keras, and TensorFlow to...
High-performance and Hardware-aware Computing
High-performance and Hardware-aware Computing

High-performance system architectures are increasingly exploiting heterogeneity: multi- and manycore-based systems are complemented by coprocessors, accelerators, and reconfigurable units providing huge computational power. However, applications of scientific interest (e.g. in high-performance computing and numerical simulation) are not yet...

Restricted Kalman Filtering: Theory, Methods, and Application (SpringerBriefs in Statistics)
Restricted Kalman Filtering: Theory, Methods, and Application (SpringerBriefs in Statistics)

In this book, I highlight the developments in Kalman filtering subject to general linear constraints. Essentially, the material to be presented is almost entirely based on the results and examples originally developed in Pizzinga et al. (2008a), Cerqueira et al. (2009), Pizzinga (2009, 2010), Souza et al. (2011), Pizzinga et al. (2011), and...

Embedded Systems: Hardware, Design and Implementation
Embedded Systems: Hardware, Design and Implementation

Covers the significant embedded computing technologies—highlighting their applications in wireless communication and computing power

An embedded system is a computer system designed for specific control functions within a larger system—often with real-time computing constraints. It is embedded as part of a...

Result Page: 35 34 33 32 31 30 29 28 27 26 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy