Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Database Benchmarking and Stress Testing: An Evidence-Based Approach to Decisions on Architecture and Technology
Database Benchmarking and Stress Testing: An Evidence-Based Approach to Decisions on Architecture and Technology
Provide evidence-based answers that can be measured and relied upon by your business. Database administrators will be able to make sound architectural decisions in a fast-changing landscape of virtualized servers and container-based solutions based on the empirical method presented in this book for answering “what if”...
Hacking Product Design: A Guide to Designing Products for Startups
Hacking Product Design: A Guide to Designing Products for Startups

Understand how designing a technology product in a startup environment is markedly different from product design at established companies. This book teaches product designers how to think and frame problems in the dynamic context of startups. You will discover how to enhance your soft skills that are often not taught, but are crucial...

Hands-On Design Patterns with C# and .NET Core: Write clean and maintainable code by using reusable solutions to common software design problems
Hands-On Design Patterns with C# and .NET Core: Write clean and maintainable code by using reusable solutions to common software design problems

Apply design patterns to solve problems in software architecture and programming using C# 7.x and .NET Core 2

Key Features

  • Enhance your programming skills by implementing efficient design patterns for C# and .NET
  • Explore design patterns for functional and reactive...
The Data-Driven Project Manager: A Statistical Battle Against Project Obstacles
The Data-Driven Project Manager: A Statistical Battle Against Project Obstacles
Discover solutions to common obstacles faced by project managers. Written as a business novel, the book is highly interactive, allowing readers to participate and consider options at each stage of a project. The book is based on years of experience, both through the author's research projects as well as his teaching lectures at business...
Intelligent Projects Using Python: 9 real-world AI projects leveraging machine learning and deep learning with TensorFlow and Keras
Intelligent Projects Using Python: 9 real-world AI projects leveraging machine learning and deep learning with TensorFlow and Keras

Implement machine learning and deep learning methodologies to build smart, cognitive AI projects using Python

Key Features

  • A go-to guide to help you master AI algorithms and concepts
  • 8 real-world projects tackling different challenges in healthcare, e-commerce, and...
MySQL 8 Administrator's Guide: Effective guide to administering high-performance MySQL 8 solutions
MySQL 8 Administrator's Guide: Effective guide to administering high-performance MySQL 8 solutions

Step by step guide to monitor, manage, and secure your database engine

Key Features

  • Your companion to master all the administration-related tasks in MySQL 8
  • Ensure high performance and high availability of your MySQL solution using effective replication and backup...
Cybersecurity Law
Cybersecurity Law

A definitive guide to cybersecurity law

Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information...

Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python

Become a master at penetration testing using machine learning with Python

Key Features

  • Identify ambiguities and breach intelligent security systems
  • Perform unique cyber attacks to breach robust systems
  • Learn to leverage machine learning algorithms
  • ...
Feature Engineering for Machine Learning: Principles and Techniques for Data Scientists
Feature Engineering for Machine Learning: Principles and Techniques for Data Scientists

Feature engineering is a crucial step in the machine-learning pipeline, yet this topic is rarely examined on its own. With this practical book, you’ll learn techniques for extracting and transforming features—the numeric representations of raw data—into formats for machine-learning models. Each chapter guides you...

Java EE 8 High Performance: Master techniques such as memory optimization, caching, concurrency, and multithreading to achieve maximum performance from your enterprise applications.
Java EE 8 High Performance: Master techniques such as memory optimization, caching, concurrency, and multithreading to achieve maximum performance from your enterprise applications.

Get more control of your applications performances in development and production and know how to meet your Service Level Agreement on critical microservices.

Key Features

  • Learn how to write a JavaEE application with performance constraints (Service Level Agreement?SLA) leveraging the...
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Develop blockchain application with step-by-step instructions, working example and helpful recommendations

Key Features

  • Understanding the blockchain technology from the cybersecurity perspective
  • Developing cyber security solutions with Ethereum blockchain technology
  • ...
The Data Warehouse ETL Toolkit: Practical Techniques for Extracting, Cleanin
The Data Warehouse ETL Toolkit: Practical Techniques for Extracting, Cleanin

The Extract-Transform-Load (ETL) system is the foundation of the data warehouse. A properly designed ETL system extracts data from the source systems, enforces data quality and consistency standards, conforms data so that separate sources can be used together, and finally delivers data in a presentation-ready format so that...

Result Page: 69 68 67 66 65 64 63 62 61 60 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy