Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Java EE 8 and Angular: A practical guide to building modern single-page applications with Angular and Java EE
Java EE 8 and Angular: A practical guide to building modern single-page applications with Angular and Java EE

Learn how to build high-performing enterprise applications using Java EE powered by Angular at the frontend

Key Features

  • Leverage Java EE 8 features to build robust back end for your enterprise applications
  • Use Angular to build a single page frontend and combine it with...
Web Applications (Hacking Exposed)
Web Applications (Hacking Exposed)

"This book goes a long way in making the Web a safer place to do business." -- Mark Curphey, Chair of the Open Web Application Security Project

Unleash the hackers' arsenal to secure your Web applications

In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as...

Agile Project Management with Azure DevOps: Concepts, Templates, and Metrics
Agile Project Management with Azure DevOps: Concepts, Templates, and Metrics

Roll up your sleeves and jump into Agile project management to use and customize Microsoft Azure DevOps. Organizations adopt Agile practices because they are a key enabler to run better projects, get more successful end results, and achieve an overall higher quality output. To benefit the most from Agile, you need an Application Life...

Malware Detection (Advances in Information Security)
Malware Detection (Advances in Information Security)

Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Many...

Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the...

IPv6 for Enterprise Networks (Networking Technology)
IPv6 for Enterprise Networks (Networking Technology)

Internet Protocol version 6 (IPv6) is the next version of the protocol that is used for communication among devices of all types on the Internet. IPv6 has been in existence for many years, but recently the deployment of IPv6 has accelerated greatly in the enterprise. IPv6 has been under continuous development and is maturing as real-world...

Raspberry Pi Blueprints
Raspberry Pi Blueprints

Design and build your own hardware projects that interact with the real world using the Raspberry Pi

About This Book

  • Interact with a wide range of additional sensors and devices via Raspberry Pi
  • Create exciting, low-cost products ranging from radios to home security and weather...
Algorithms: Sequential, Parallel, and Distributed
Algorithms: Sequential, Parallel, and Distributed
The objectives of this book are to provide a solid foundation for the classical the ory of sequential algorithms and to cover some of the most important recent al gorithmic developments, including the rapidly advancing theory of parallel and distributed algorithms. The book is intended to serve as a text for a core upper...
Nanomaterials and Plant Potential
Nanomaterials and Plant Potential

This book discusses the latest developments in plant-mediated fabrication of metal and metal-oxide nanoparticles, and their characterization by using a variety of modern techniques. It explores in detail the application of nanoparticles in drug delivery, cancer treatment, catalysis, and as antimicrobial agent, antioxidant and the...

Pro Machine Learning Algorithms: A Hands-On Approach to Implementing Algorithms in Python and R
Pro Machine Learning Algorithms: A Hands-On Approach to Implementing Algorithms in Python and R
Bridge the gap between a high-level understanding of how an algorithm works and knowing the nuts and bolts to tune your models better. This book will give you the confidence and skills when developing all the major machine learning models. In Pro Machine Learning Algorithms, you will first develop the algorithm in Excel so...
Developing Data Migrations and Integrations with Salesforce: Patterns and Best Practices
Developing Data Migrations and Integrations with Salesforce: Patterns and Best Practices

Migrate your data to Salesforce and build low-maintenance and high-performing data integrations to get the most out of Salesforce and make it a "go-to" place for all your organization's customer information.

When companies choose to roll out Salesforce, users expect it to be the place to find any and all...

Expert Oracle Exadata
Expert Oracle Exadata

Expert Oracle Exadata, 2nd Edition opens up the internals of Oracle's Exadata platform so that you can fully benefit from the most performant and scalable database hardware appliance capable of running Oracle Database. This edition is fully-updated to cover Exadata 5-2 and Oracle Database 12c. If you're new to Exadata,...

Result Page: 22 21 20 19 18 17 16 15 14 13 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy