Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced API Security: OAuth 2.0 and Beyond
Advanced API Security: OAuth 2.0 and Beyond
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs.
Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of
...
5G-Enabled Vehicular Communications and Networking (Wireless Networks)
5G-Enabled Vehicular Communications and Networking (Wireless Networks)

This book investigates and reviews recent advanced techniques and important applications in vehicular communications and networking (VCN) from a novel perspective of the combination and integration of VCN and connected vehicles, which provides a significant scientific and technical support for future 5G-based...

Kubernetes: Preparing for the CKA and CKAD Certifications
Kubernetes: Preparing for the CKA and CKAD Certifications
Kubernetes is a recent platform, based on more than ten years of experience in cloud computing by big companies like Google, its creator. It is considered complex as it includes all the concepts to run diverse applications in a large variety of environments.

This book, based on the curricula of the two Kubernetes
...
Agriculture 5.0: Artificial Intelligence, IoT and Machine Learning
Agriculture 5.0: Artificial Intelligence, IoT and Machine Learning

Agriculture 5.0: Artificial Intelligence, IoT & Machine Learning provides an interdisciplinary, integrative overview of latest development in the domain of smart farming. It shows how the traditional farming practices are being enhanced and modified by automation and introduction of modern scalable technological...

Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Advances in Information Security, 85)
Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Advances in Information Security, 85)

This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been dubbed the ‘ransomware revolution’ after a series of major...

Docker on Windows: From 101 to production with Docker on Windows, 2nd Edition
Docker on Windows: From 101 to production with Docker on Windows, 2nd Edition

Learn how to run new and old applications in Docker containers on Windows - modernizing the architecture, improving security and maximizing efficiency.

Key Features

  • Run .NET Framework and .NET Core apps in Docker containers for efficiency, security and portability
  • Design...
Docker Cookbook: Over 100 practical and insightful recipes to build distributed applications with Docker , 2nd Edition
Docker Cookbook: Over 100 practical and insightful recipes to build distributed applications with Docker , 2nd Edition

Leverage Docker to deploying software at scale

Key Features

  • Leverage practical examples to manage containers efficiently
  • Integrate with orchestration tools such as Kubernetes for controlled deployments
  • Learn to implement best practices on improving...
Guide to Ambient Intelligence in the IoT Environment: Principles, Technologies and Applications (Computer Communications and Networks)
Guide to Ambient Intelligence in the IoT Environment: Principles, Technologies and Applications (Computer Communications and Networks)
Ambient intelligence (AmI) is an element of pervasive computing that brings smartness to living and business environments to make them more sensitive, adaptive, autonomous and personalized to human needs. It refers to intelligent interfaces that recognise human presence and preferences, and adjust smart environments to suit their...
Blockchain for Business 2019: A user-friendly introduction to blockchain technology and its business applications
Blockchain for Business 2019: A user-friendly introduction to blockchain technology and its business applications

Your one-stop guide to blockchain technology and its business applications

Key Features

  • Assimilate blockchain services such as Ethereum and Hyperledger to transform industrial applications
  • Know in and out of blockchain technology to understand various business use...
Angular for Material Design: Leverage Angular Material and TypeScript to Build a Rich User Interface for Web Apps
Angular for Material Design: Leverage Angular Material and TypeScript to Build a Rich User Interface for Web Apps

Build Angular applications faster and better with TypeScript and Material Design. You will learn how to build a web interface and use Google's open source Angular Material library of ready-made and easy-to-use components.

This book uses Angular with TypeScript (a superset to JavaScript) to enable use of data types...

Forecasting With The Theta Method: Theory and Applications
Forecasting With The Theta Method: Theory and Applications

The first book to be published on the Theta method, outlining under what conditions the method outperforms other forecasting methods

This book is the first to detail the Theta method of forecasting – one of the most difficult-to-beat forecasting benchmarks, which topped the biggest forecasting...

Error Correction Coding: Mathematical Methods and Algorithms
Error Correction Coding: Mathematical Methods and Algorithms

Providing in-depth treatment of error correction

Error Correction Coding: Mathematical Methods and Algorithms, 2nd Edition provides a comprehensive introduction to classical and modern methods of error correction. The presentation provides a clear, practical introduction to using a...

unlimited object storage image
Result Page: 876 875 874 873 872 871 870 869 868 867 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy