Home | Amazing | Today | Tags | Publishers | Years | Search 
MySQL 8 Administrator's Guide: Effective guide to administering high-performance MySQL 8 solutions
MySQL 8 Administrator's Guide: Effective guide to administering high-performance MySQL 8 solutions

Step by step guide to monitor, manage, and secure your database engine

Key Features

  • Your companion to master all the administration-related tasks in MySQL 8
  • Ensure high performance and high availability of your MySQL solution using effective replication and backup...
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Develop blockchain application with step-by-step instructions, working example and helpful recommendations

Key Features

  • Understanding the blockchain technology from the cybersecurity perspective
  • Developing cyber security solutions with Ethereum blockchain technology
  • ...
Hands-On Design Patterns with C# and .NET Core: Write clean and maintainable code by using reusable solutions to common software design problems
Hands-On Design Patterns with C# and .NET Core: Write clean and maintainable code by using reusable solutions to common software design problems

Apply design patterns to solve problems in software architecture and programming using C# 7.x and .NET Core 2

Key Features

  • Enhance your programming skills by implementing efficient design patterns for C# and .NET
  • Explore design patterns for functional and reactive...
Mastering UI Development with Unity: An in-depth guide to developing engaging user interfaces with Unity 5, Unity 2017, and Unity 2018
Mastering UI Development with Unity: An in-depth guide to developing engaging user interfaces with Unity 5, Unity 2017, and Unity 2018

Master Game UI system by creating captivating user interface components with Unity 5 through Unity 2018 and C#. Learn about UI texts, images, world space UI, mobile-specific UI and much more.

Key Features

  • Develop a game UI with both technical and aesthetic considerations
  • ...
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python

Become a master at penetration testing using machine learning with Python

Key Features

  • Identify ambiguities and breach intelligent security systems
  • Perform unique cyber attacks to breach robust systems
  • Learn to leverage machine learning algorithms
  • ...
The Data-Driven Project Manager: A Statistical Battle Against Project Obstacles
The Data-Driven Project Manager: A Statistical Battle Against Project Obstacles
Discover solutions to common obstacles faced by project managers. Written as a business novel, the book is highly interactive, allowing readers to participate and consider options at each stage of a project. The book is based on years of experience, both through the author's research projects as well as his teaching lectures at business...
Database Benchmarking and Stress Testing: An Evidence-Based Approach to Decisions on Architecture and Technology
Database Benchmarking and Stress Testing: An Evidence-Based Approach to Decisions on Architecture and Technology
Provide evidence-based answers that can be measured and relied upon by your business. Database administrators will be able to make sound architectural decisions in a fast-changing landscape of virtualized servers and container-based solutions based on the empirical method presented in this book for answering “what if”...
Hacking Product Design: A Guide to Designing Products for Startups
Hacking Product Design: A Guide to Designing Products for Startups

Understand how designing a technology product in a startup environment is markedly different from product design at established companies. This book teaches product designers how to think and frame problems in the dynamic context of startups. You will discover how to enhance your soft skills that are often not taught, but are crucial...

Understand, Manage, and Prevent Algorithmic Bias: A Guide for Business Users and Data Scientists
Understand, Manage, and Prevent Algorithmic Bias: A Guide for Business Users and Data Scientists

Are algorithms friend or foe?

The human mind is evolutionarily designed to take shortcuts in order to survive. We jump to conclusions because our brains want to keep us safe. A majority of our biases work in our favor, such as when we feel a car speeding in our direction is dangerous and we instantly move, or when we...

Data versus Democracy: How Big Data Algorithms Shape Opinions and Alter the Course of History
Data versus Democracy: How Big Data Algorithms Shape Opinions and Alter the Course of History
Human attention is in the highest demand it has ever been. The drastic increase in available information has compelled individuals to find a way to sift through the media that is literally at their fingertips. Content recommendation systems have emerged as the technological solution to this...
Political Theology: A Critical Introduction
Political Theology: A Critical Introduction
God is dead, but his presence lives on in politics. This is the problem of political theology: the way that theological ideas find their way into secular political institutions, particularly the sovereign state.

In this intellectual tour-de-force, leading political theorist Saul Newman shows how political theology arose
...
Detecting the Social: Order and Disorder in Post-1970s Detective Fiction
Detecting the Social: Order and Disorder in Post-1970s Detective Fiction

This book analyses the ways in which twenty-first century detective fiction provides an understanding of the increasingly complex and often baffling contemporary world ? and what sociology, as a discipline, can learn from it.

Conventional sociological accounts of fiction generally comprehend its value in terms of...

Result Page: 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy