Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Internet of Things and Data Analytics Handbook
Internet of Things and Data Analytics Handbook

This book examines the Internet of Things (IoT) and Data Analytics from a technical, application, and business point of view.

Internet of Things and Data Analytics Handbook describes essential technical knowledge, building blocks, processes, design principles, implementation, and marketing...

Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))
Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))

ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY

 

Clearly explains core concepts, terminology, challenges, technologies, and skills

 

Covers today’s latest attacks and...

Practical DevOps
Practical DevOps

Key Features

  • Get to know the background of DevOps so you understand the collaboration between different aspects of an IT organization and a software developer
  • Improve your organization's performance to ensure smooth production of software and services
  • Deploy top-quality software and...
Use Case Modeling
Use Case Modeling
Developers who effectively employ use cases deliver better applications--on time and under budget. The concept behind use cases is perhaps as old as software itself; they express the behavior of systems in terms of how users will ultimately interact with them. Despite this inherent simplicity, the use case approach is frequently misapplied,...
Developing Microservices with Node.js
Developing Microservices with Node.js

Key Features

  • Real world example explained chapter after chapter with code examples.
  • Useful concepts for other languages like Java or PHP
  • Easy to follow by people with little to none experience in Node.js
  • Node.js Version 0.12.2 and the latest compatible versions of Seneca and...
Art of Computer Programming/Sorting and Searching (Computer Science and Information Processing)
Art of Computer Programming/Sorting and Searching (Computer Science and Information Processing)

For the first time in more than 20 years, Knuth has revised all three books to reflect more recent developments in the field. His revisions focus specifically on those areas where knowledge has converged since publication of the last editions, on problems that have been solved, on problems that have changed. In
...
Windows Server 2012 R2 Pocket Consultant Volume 2: Storage, Security, & Networking
Windows Server 2012 R2 Pocket Consultant Volume 2: Storage, Security, & Networking

Portable and precise, this pocket-sized guide delivers ready answers for administering storage, security, and networking features in Windows Server 2012 R2. Zero in on core tasks through quick-reference tables, instructions, and lists. You'll get the focused information you need to save time and get the job done - whether at your desk or...

Mastering Embedded Linux Programming
Mastering Embedded Linux Programming

Key Features

  • Create efficient and secure embedded devices using Linux
  • Minimize project costs by using open source tools and programs
  • Explore each component technology in depth, using sample implementations as a guide

Book Description

Mastering Embedded Linux...

Python for Secret Agents - Second Edition
Python for Secret Agents - Second Edition

Gather, analyze, and decode data to reveal hidden facts using Python, the perfect tool for all aspiring secret agents

About This Book

  • Discover the essential features of Python programming: statements, variables, expressions, and many of the built-in data types
  • Use Python's standard...
Professional Search Engine Optimization with PHP: A Developer's Guide to SEO
Professional Search Engine Optimization with PHP: A Developer's Guide to SEO
Professional Search Engine Optimization with PHP

Search engine optimization (SEO) is not only the job of the marketing department. It must be considered from a web site's inception and throughout its lifetime by you, the web site developer. Making changes to the architecture of a web site and modifying presentation techniques...

Pro Data Backup and Recovery
Pro Data Backup and Recovery

Pro Data Backup and Recovery has come from the many views of people that I have interacted with during my career as a systems administrator, systems engineer, and consultant. This book is primarily geared toward the systems engineers and architects within an organization, but it will also be useful for the day-to-day functions of systems...

The Executive Guide to E-mail Correspondence: Including Model Letters for Every Situation
The Executive Guide to E-mail Correspondence: Including Model Letters for Every Situation
Sit down at the keyboard and cinch that deal! Press the send button and get the account!

Writing skills are more important than ever in determining business success. They can make the difference between climbing the corporate ladder and getting stuck on a low rung. An e-mail that's clear, concise, and targeted will get more than just a...

Result Page: 136 135 134 133 132 131 130 129 128 127 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy