Home | Amazing | Today | Tags | Publishers | Years | Search 
Applications of Data Mining in E-Business and Finance (Frontiers in Artificial Intelligence and Applications)
Applications of Data Mining in E-Business and Finance (Frontiers in Artificial Intelligence and Applications)
The application of Data Mining (DM) technologies has shown an explosive growth in an increasing number of different areas of business, government and science. Two of the most important business areas are finance, in particular in banks and insurance companies, and e-business, such as web portals, e-commerce and ad management services.In...
Mastering Ext JS
Mastering Ext JS

In this book you'll learn to develop a complete application with ExtJS. Enhance your existing skills and get a better grasp of the JavaScript framework to create advanced Internet applications.

Overview

  • Build an application with Ext JS from scratch
  • Learn expert tips and...
Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment
Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth.

The IoT
...
Software Architecture with C++: Design modern systems using effective architecture concepts, design patterns, and techniques with C++20
Software Architecture with C++: Design modern systems using effective architecture concepts, design patterns, and techniques with C++20

Apply business requirements to IT infrastructure and deliver a high-quality product by understanding architectures such as microservices, DevOps, and cloud-native using modern C++ standards and features

Key Features

  • Design scalable large-scale applications with the C++ programming...
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

Demystifying Smart Cities: Practical Perspectives on How Cities Can Leverage the Potential of New Technologies
Demystifying Smart Cities: Practical Perspectives on How Cities Can Leverage the Potential of New Technologies

The concept of Smart Cities is accurately regarded as a potentially transformative power all over the world. Bustling metropolises infused with the right combination of the Internet of Things, artificial intelligence, big data, and blockchain promise to improve both our daily lives and larger structural operations at a city...

Smart Intelligent Computing and Applications: Proceedings of the Second International Conference on SCI 2018, Volume 1 (Smart Innovation, Systems and Technologies, 104)
Smart Intelligent Computing and Applications: Proceedings of the Second International Conference on SCI 2018, Volume 1 (Smart Innovation, Systems and Technologies, 104)

The proceedings covers advanced and multi-disciplinary research on design of smart computing and informatics. The theme of the book broadly focuses on various innovation paradigms in system knowledge, intelligence and sustainability that may be applied to provide realistic solution to varied problems in society, environment and...

Kubernetes: Preparing for the CKA and CKAD Certifications
Kubernetes: Preparing for the CKA and CKAD Certifications
Kubernetes is a recent platform, based on more than ten years of experience in cloud computing by big companies like Google, its creator. It is considered complex as it includes all the concepts to run diverse applications in a large variety of environments.

This book, based on the curricula of the two Kubernetes
...
Agriculture 5.0: Artificial Intelligence, IoT and Machine Learning
Agriculture 5.0: Artificial Intelligence, IoT and Machine Learning

Agriculture 5.0: Artificial Intelligence, IoT & Machine Learning provides an interdisciplinary, integrative overview of latest development in the domain of smart farming. It shows how the traditional farming practices are being enhanced and modified by automation and introduction of modern scalable technological...

Free Space Laser Communication with Ambient Light Compensation
Free Space Laser Communication with Ambient Light Compensation

This book addresses 5G network capacity requirements with a new architecture for 5G Optical Backhaul Network. The author first describes the challenges for 5G backhaul network requirements and then the details of an Optical Backhaul Network for 5G. The author describes an architecture, in which small cells deploy as a cluster (i.e.,...

Software Engineering for Absolute Beginners: Your Guide to Creating Software Products
Software Engineering for Absolute Beginners: Your Guide to Creating Software Products

Start programming from scratch, no experience required. This beginners’ guide to software engineering starts with a discussion of the different editors used to create software and covers setting up a Docker environment. Next, you will learn about repositories and version control along with its uses. Now that you are ready to...

A Practical Guide to Azure DevOps: Learn by doing - Third Edition
A Practical Guide to Azure DevOps: Learn by doing - Third Edition

DevOps has become a major topic for developers, testers, project managers and many others involved in building software products. Microsoft has introduced Azure DevOps as their tool for implementing DevOps practices. 

This book is intended to provide the reader a step-by-step, easy to follow guide...

Result Page: 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy