Home | Amazing | Today | Tags | Publishers | Years | Search 
Industrial Applications of Evolutionary Algorithms (Intelligent Systems Reference Library)
Industrial Applications of Evolutionary Algorithms (Intelligent Systems Reference Library)

"Industrial applications of evolutionary algorithms" is intended as a resource for both experienced users of evolutionary algorithms and researchers that are beginning to approach these fascinating optimization techniques.

Experienced users will find interesting details of real-world problems, advice on solving...

Hands-On RESTful API Design Patterns and Best Practices: Design, develop, and deploy highly adaptable, scalable, and secure RESTful web APIs
Hands-On RESTful API Design Patterns and Best Practices: Design, develop, and deploy highly adaptable, scalable, and secure RESTful web APIs

Build effective RESTful APIs for enterprise with design patterns and REST framework's out-of-the-box capabilities

Key Features

  • Understand advanced topics such as API gateways, API securities, and cloud
  • Implement patterns programmatically with easy-to-follow...
Odoo 11 Development Cookbook: Over 120 unique recipes to build effective enterprise and business applications
Odoo 11 Development Cookbook: Over 120 unique recipes to build effective enterprise and business applications

Create fast and efficient server-side applications using the latest features of Odoo v11

Key Features

  • Get the most up-to-date guide on Odoo 11 to create custom and reusable modules
  • Interconnect your application with other systems by implementing web APIs
  • ...
Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux
Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux

Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holes

Key Features

  • Know how to set up your lab with Kali Linux
  • Discover the core concepts of web penetration testing
  • ...
Building RESTful Web Services with Spring 5 - Second Edition: Leverage the power of Spring 5.0, Java SE 9, and Spring Boot 2.0
Building RESTful Web Services with Spring 5 - Second Edition: Leverage the power of Spring 5.0, Java SE 9, and Spring Boot 2.0

Find out how to implement the REST architecture to build resilient software in Java with the help of the Spring 5.0 framework.

Key Features

  • Follow best practices and explore techniques such as clustering and caching to achieve a reactive, scalable web service,
  • Leverage...
Pro Spring Boot 2: An Authoritative Guide to Building Microservices, Web and Enterprise Applications, and Best Practices
Pro Spring Boot 2: An Authoritative Guide to Building Microservices, Web and Enterprise Applications, and Best Practices

Quickly and productively develop complex Spring applications and microservices out of the box, with minimal concern over things like configurations. This revised book will show you how to fully leverage the Spring Boot 2 technology and how to apply it to create enterprise ready applications that just work.  It will also cover...

The Scandinavian Skincare Bible: the definitive guide to understanding your skin
The Scandinavian Skincare Bible: the definitive guide to understanding your skin
We get goosebumps if someone strokes our skin gently. The reason for this is that a tiny hair-erector muscle — the arrector pili, located deep in each hair follicle — responds to nerve signals from the brain. Our hairs stand on end, and the layer of air they trap protects us against the cold. The skin, our...
Good Thinking: Why Flawed Logic Puts Us All at Risk and How Critical Thinking Can Save the World
Good Thinking: Why Flawed Logic Puts Us All at Risk and How Critical Thinking Can Save the World
Good Thinking is our best defense against anti-vaccine paranoia, climate denial, and other dire threats of today

Publisher’s Note: Good Thinking was previously published in the UK as The Irrational Ape.

In our ever-more-polarized society, there’s at least one thing we
...
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems

Implement defensive techniques in your ecosystem successfully with Python

Key Features

  • Identify and expose vulnerabilities in your infrastructure with Python
  • Learn custom exploit development
  • Make robust and powerful cybersecurity tools with Python
  • ...
Inclusion, Equity and Access for Individuals with Disabilities: Insights from Educators across World
Inclusion, Equity and Access for Individuals with Disabilities: Insights from Educators across World
The book provides multiple perspectives and insights on the area of Inclusion, Equity and Access for people with disabilities and brings together various inclusive effective practices from 21 countries across the world most comprehensively in one book. The book documents perspectives from educational researchers and teacher educators...
Microservices for the Enterprise: Designing, Developing, and Deploying
Microservices for the Enterprise: Designing, Developing, and Deploying
Understand the key challenges and solutions around building microservices in the enterprise application environment. This book provides a comprehensive understanding of microservices architectural principles and how to use microservices in real-world scenarios.

Architectural challenges using microservices with service
...
Mastering Reverse Engineering: Re-engineer your ethical hacking skills
Mastering Reverse Engineering: Re-engineer your ethical hacking skills

Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses.

Key Features

  • Analyze and improvise software and hardware with real-world examples
  • Learn advanced debugging and patching...
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy