Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Java EE 8 and Angular: A practical guide to building modern single-page applications with Angular and Java EE
Java EE 8 and Angular: A practical guide to building modern single-page applications with Angular and Java EE

Learn how to build high-performing enterprise applications using Java EE powered by Angular at the frontend

Key Features

  • Leverage Java EE 8 features to build robust back end for your enterprise applications
  • Use Angular to build a single page frontend and combine it with...
Mental Health and Well-being Interventions in Sport: Research, Theory and Practice (Routledge Psychological Interventions)
Mental Health and Well-being Interventions in Sport: Research, Theory and Practice (Routledge Psychological Interventions)

Mental health within elite sport has traditionally been ignored, but recent research has shown that competitive sport can at times seriously undermine mental health and that athletes are exposed to specific stressors that hinder their mental health optimisation.

Mental Health and Well-being Interventions in Sport...

Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the...

Programming Interviews Exposed: Secrets to Landing Your Next Job
Programming Interviews Exposed: Secrets to Landing Your Next Job
The most important thing we have to tell you is the same as in the first edition: You will get as much out of this book as you put into it. If you read this book cover to cover, you will learn something, but not nearly as much as you would if you take some time trying to work through the problems before you read the answers. ...
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring...
PostgreSQL Developer s Guide
PostgreSQL Developer s Guide

Design, develop, and implement streamlined databases with PostgreSQL

About This Book

  • Design efficient, real-world database solutions and extend your knowledge of database concepts
  • Learn how to program using native PostgreSQL procedural languages to write custom functions
  • ...
TensorFlow 2.0 Quick Start Guide: Get up to speed with the newly introduced features of TensorFlow 2.0
TensorFlow 2.0 Quick Start Guide: Get up to speed with the newly introduced features of TensorFlow 2.0

Perform supervised and unsupervised machine learning and learn advanced techniques such as training neural networks.

Key Features

  • Train your own models for effective prediction, using high-level Keras API
  • Perform supervised and unsupervised machine learning and learn...
Seduction: A History From the Enlightenment to the Present
Seduction: A History From the Enlightenment to the Present

A brilliantly original history that explores the shifting cultural mores of courtship, told through the lives of remarkable women and men throughout history.

If sex has generally been a private matter, seduction has always been of intense public interest. Whether the stuff of front-page tabloid news, the
...
Data Structures and Algorithms Using Python and C++
Data Structures and Algorithms Using Python and C++
THIS BOOK is intended for use in a traditional college-level data structures course (commonly known as CS2). This book assumes that students have learned the basic syntax of Python and been exposed to the use of existing classes. Most traditional CS1 courses that use Python will have covered all the necessary topics, and some may have covered a...
Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

Risk Assessment of Chemicals: An Introduction
Risk Assessment of Chemicals: An Introduction

At last – a second edition of this hugely important text that reflects the progress and experience gained in the last decade and aims at providing background and training material for a new generation of risk assessors. The authors offer an introduction to risk assessment of chemicals as well as basic background information on sources,...

Greatest Guide to Photography: Because It's More Than Pushing the Button (Greatest Guides)
Greatest Guide to Photography: Because It's More Than Pushing the Button (Greatest Guides)

Photography tips and advice to help you... + add wow to your images with simple, little-known techniques that change a good shot into a great shot + get pin-sharp, perfectly composed & correctly exposed images, time and time again + choose the best camera and identify only those essential accessories + take stunning portraits of your...

Result Page: 22 21 20 19 18 17 16 15 14 13 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy