Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microservices for the Enterprise: Designing, Developing, and Deploying
Microservices for the Enterprise: Designing, Developing, and Deploying
Understand the key challenges and solutions around building microservices in the enterprise application environment. This book provides a comprehensive understanding of microservices architectural principles and how to use microservices in real-world scenarios.

Architectural challenges using microservices with service
...
Splunk Certified Study Guide: Prepare for the User, Power User, and Enterprise Admin Certifications
Splunk Certified Study Guide: Prepare for the User, Power User, and Enterprise Admin Certifications

Make your Splunk certification easier with this exam study guide that covers the User, Power User, and Enterprise Admin certifications. This book is divided into three parts. The first part focuses on the Splunk User and Power User certifications starting with how to install Splunk, Splunk Processing Language (SPL), field...

Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

Peer-to-Peer Computing for Mobile Networks: Information Discovery and Dissemination
Peer-to-Peer Computing for Mobile Networks: Information Discovery and Dissemination
Wireless devices are becoming smaller, more user-friendly and more pervasive. Peer-to-Peer Computing for Mobile Networks: Information Discovery and Dissemination discusses research results on data dissemination in mobile networks and peer-to-peer systems for mobile devices.

An important research challenge within this book is to...

Using Docker: Developing and Deploying Software with Containers
Using Docker: Developing and Deploying Software with Containers

Docker containers offer simpler, faster, and more robust methods for developing, distributing, and running software than previously available. With this hands-on guide, you’ll learn why containers are so important, what you’ll gain by adopting Docker, and how to make it part of your development...

Handbook of Financial Cryptography and Security
Handbook of Financial Cryptography and Security

Cryptography has made a peculiar journey to become a modern science. It had long been associated with the military and with magic. The rst published work in the eld was Steganographia, by an alchemist named Trithemius. Although written earlier, the book was published in 1606. Cryptography has continued this connection with the arcane...

Network Forensics: Tracking Hackers through Cyberspace
Network Forensics: Tracking Hackers through Cyberspace
My great-grandfather was a furniture maker. I am writing this on his table, sitting in his chair. His world was one of craft, “the skilled practice of a practical occupation.”1 He made furniture late in life that was in superficial respects the same as that which he made earlier, but one can see his craft advance. ...
Pattern Discovery Using Sequence Data Mining: Applications and Studies
Pattern Discovery Using Sequence Data Mining: Applications and Studies

Sequential data from Web server logs, online transaction logs, and performance measurements is collected each day. This sequential data is a valuable source of information, as it allows individuals to search for a particular value or event and also facilitates analysis of the frequency of certain events or sets of related events. Finding...

Algorithms from and for Nature and Life: Classification and Data Analysis (Studies in Classification, Data Analysis, and Knowledge Organization)
Algorithms from and for Nature and Life: Classification and Data Analysis (Studies in Classification, Data Analysis, and Knowledge Organization)

This volume provides approaches and solutions to challenges occurring at the interface of research fields such as, e.g., data analysis, data mining and knowledge discovery, computer science, operations research, and statistics. In addition to theory-oriented contributions various application areas are included. Moreover, traditional...

SQL Injection Attacks and Defense, Second Edition
SQL Injection Attacks and Defense, Second Edition

SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award

"SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog

SQL injection represents...

Mining Intelligence and Knowledge Exploration: 7th International Conference, MIKE 2019, Goa, India, December 19–22, 2019, Proceedings (Lecture Notes in Computer Science, 11987)
Mining Intelligence and Knowledge Exploration: 7th International Conference, MIKE 2019, Goa, India, December 19–22, 2019, Proceedings (Lecture Notes in Computer Science, 11987)

This book constitutes the refereed conference proceedings of the 7th International Conference on Mining Intelligence and Knowledge Exploration, MIKE 2019, held in Goa, India, in December 2019.

The 31 full papers were carefully reviewed and selected from 83 submissions. The accepted papers were chosen on the basis of...

Data Mining and Knowledge Discovery via Logic-Based Methods: Theory, Algorithms, and Applications
Data Mining and Knowledge Discovery via Logic-Based Methods: Theory, Algorithms, and Applications

There are many approaches to data mining and knowledge discovery (DM&KD), including neural networks, closest neighbor methods, and various statistical methods. This monograph, however, focuses on the development and use of a novel approach, based on mathematical logic, that the author and his research associates have worked on over the...

unlimited object storage image
Result Page: 62 61 60 59 58 57 56 55 54 53 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy