Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer
Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer

Leverage the power of Hyperledger Fabric to develop Blockchain-based distributed ledgers with ease

Key Features

  • Write your own chaincode/smart contracts using Golang on hyperledger network
  • Build and deploy decentralized applications (DApps)
  • Dive into real...
Challenging Problems in Geometry
Challenging Problems in Geometry
Stimulating collection of unusual problems dealing with congruence and parallelism, the Pythagorean theorem, circles, area relationships, Ptolemy and the cyclic quadrilateral, collinearity and concurrency and many other topics. Arranged in order of difficulty. Detailed solutions.

The challenge of well-posed problems transcends national
...
Seven Concurrency Models in Seven Weeks: When Threads Unravel (The Pragmatic Programmers)
Seven Concurrency Models in Seven Weeks: When Threads Unravel (The Pragmatic Programmers)

Your software needs to leverage multiple cores, handle thousands of users and terabytes of data, and continue working in the face of both hardware and software failure. Concurrency and parallelism are the keys, and Seven Concurrency Models in Seven Weeks equips you for this new world. See how emerging technologies such as actors and...

Expert Oracle Indexing and Access Paths: Maximum Performance for Your Database
Expert Oracle Indexing and Access Paths: Maximum Performance for Your Database

Speed up the execution of important database queries by making good choices about which indexes to create. Choose correct index types for different scenarios. Avoid indexing pitfalls that can actually have indexes hurting performance rather than helping. Maintain indexes so as to provide consistent and predictable query response over...

Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

Linux Firewalls discusses the...

Matlab: A Practical Introduction to Programming and Problem Solving
Matlab: A Practical Introduction to Programming and Problem Solving

MatLab, Third Edition is the only book that gives a full introduction to programming in MATLAB combined with an explanation of the software’s powerful functions, enabling engineers to fully exploit its extensive capabilities in solving engineering problems. The book provides a systematic, step-by-step approach, building on...

PostScript(R) Language Reference (3rd Edition)
PostScript(R) Language Reference (3rd Edition)

IN THE 1980S, ADOBE DEVISED a powerful graphics imaging model that over time has formed the basis for the Adobe PostScript technologies. These technologies— a combination of the PostScript language and PostScript language–based graphics and text-formatting applications, drivers, and imaging systems—have forever changed the...

The Book of Weeds: How to Deal with Plants that Behave Badly
The Book of Weeds: How to Deal with Plants that Behave Badly

Finally, from the author of Compost, fascinating information and advice on handling weeds - how to recognize them, how to control them, and how to exploit them. The first step is to know your enemy, so weeds are identified and the survival strategies of various types is explained to enable you to get rid of them more easily. Finally,...

The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit
The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit

Master the Metasploit Framework and become an expert in penetration testing.

Key Features

  • Gain a thorough understanding of the Metasploit Framework
  • Develop the skills to perform penetration testing in complex and highly secure environments
  • Learn...
PowerShell and Python Together: Targeting Digital Investigations
PowerShell and Python Together: Targeting Digital Investigations
Bring together the Python programming language and Microsoft’s PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.

You will learn how to join PowerShell's robust set of commands and access to the
...
JUnit in Action, Second Edition
JUnit in Action, Second Edition

When JUnit was first introduced a decade ago by Kent Beck and Erich Gamma, the Agile movement was in its infancy, "Test Driven Development" was unknown, and unit testing was just starting to move into the typical developer's vocabulary. Today, most developers acknowledge the benefits of unit testing and rely on the...

Higher-Level Hardware Synthesis
Higher-Level Hardware Synthesis
In the mid 1960s, when a single chip contained an average of 50 transistors,
Gordon Moore observed that integrated circuits were doubling in complexity
every year. In an influential article published by Electronics Magazine in 1965,
Moore predicted that this trend would continue for the next 10 years. Despite
being criticized
...
unlimited object storage image
Result Page: 42 41 40 39 38 37 36 35 34 33 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy