Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
A Practical Introduction to Enterprise Network and Security Management
A Practical Introduction to Enterprise Network and Security Management

Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a solid ground for a successful...

Mastering Kubernetes: Large scale container deployment and management
Mastering Kubernetes: Large scale container deployment and management

Master the art of container management utilizing the power of Kubernetes.

About This Book

  • This practical guide demystifies Kubernetes and ensures that your clusters are always available, scalable, and up to date
  • Discover new features such as autoscaling, rolling updates, resource quotas,...
DevOps for Web Development
DevOps for Web Development

About This Book

  • Overcome the challenges of implementing DevOps for web applications, familiarize yourself with diverse third-party modules, and learn how to integrate them with bespoke code to efficiently complete tasks
  • Understand how to deploy web applications for a variety of Cloud platforms such as...
Thermal Comfort Assessment of Buildings (SpringerBriefs in Applied Sciences and Technology)
Thermal Comfort Assessment of Buildings (SpringerBriefs in Applied Sciences and Technology)

A number of metrics for assessing human thermal response to climatic conditions have been proposed in scientific literature over the last decades. They aim at describing human thermal perception of the thermal environment to which an individual or a group of people is exposed. More recently, a new type of “discomfort index” has...

Design Patterns for Embedded Systems in C: An Embedded Software Engineering Toolkit
Design Patterns for Embedded Systems in C: An Embedded Software Engineering Toolkit
The predominate language for the development of embedded systems is clearly C. Other languages certainly have their allure, but over 80% of all embedded systems are developed in this classic language. Many of the advances in the industry assume the use of object-oriented languages, web clients, and technologies that are either...
The Enterprise and Scrum
The Enterprise and Scrum

This book is for those who want to use Scrum throughout their enterprise for product development. Right now, you might have pockets within your enterprise that use Scrum, and they are more effective than elsewhere. You are at least partially convinced that using Scrum throughout the enterprise might be a way to make the whole enterprise more...

Beginning C# 2005 Databases (Programmer to Programmer)
Beginning C# 2005 Databases (Programmer to Programmer)
Welcome to Beginning C# 2005 Databases! In this book you learn everything you need to know about
developing C# applications that access databases. If you are wondering why this is such an important
topic, just consider how many applications use the functionality. At first glance, you might notice a few
specialized ones such as
...
Internet Psychology (The Basics)
Internet Psychology (The Basics)

We can't imagine our lives without the Internet. It is the tool of our existence; without it we couldn't work, plan our social and leisure activities, and interact with friends. The Internet’s influence on contemporary society extends across every aspect of our personal and professional lives, but how has this altered us in...

Computer Vision-Guided Virtual Craniofacial Surgery: A Graph-Theoretic and Statistical Perspective
Computer Vision-Guided Virtual Craniofacial Surgery: A Graph-Theoretic and Statistical Perspective
The monograph deals with an important application of computer vision and pattern recognition in the area of medical science, more specifically reconstructive craniofacial surgery. Craniofacial fractures are encountered very frequently in today’s fastpaced society; the major causes being gunshot wounds, motor vehicle...
Agile For Dummies, IBM Limited Edition
Agile For Dummies, IBM Limited Edition
Welcome to Agile For Dummies, IBM Limited Edition. You’ve probably been hearing about agile for a long time, which isn’t surprising. If you’re not using agile methods already though, or if you’ve only been exposed to agile on small projects here and there, you may wonder how to get started with it. Can...
Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

Risk Assessment of Chemicals: An Introduction
Risk Assessment of Chemicals: An Introduction

At last – a second edition of this hugely important text that reflects the progress and experience gained in the last decade and aims at providing background and training material for a new generation of risk assessors. The authors offer an introduction to risk assessment of chemicals as well as basic background information on sources,...

Result Page: 21 20 19 18 17 16 15 14 13 12 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy