Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Docker for Data Science: Building Scalable and Extensible Data Infrastructure Around the Jupyter Notebook Server
Docker for Data Science: Building Scalable and Extensible Data Infrastructure Around the Jupyter Notebook Server
Learn Docker "infrastructure as code" technology to define a system for performing standard but non-trivial data tasks on medium- to large-scale data sets, using Jupyter as the master controller.

It is not uncommon for a real-world data set to fail to be easily managed. The set may not fit well into access memory or
...
Professional PHP5 (Programmer to Programmer)
Professional PHP5 (Programmer to Programmer)
What is this book about?

With the release of PHP 5 and the Zend Engine 2, PHP finally graduates from it earliest days as a lightweight scripting syntax to an powerful object oriented programming language that can hold its own against the Java and .NET architectures that currently dominate corporate software development....

XSLT, 2nd Edition
XSLT, 2nd Edition
The goal of this book is to help you make the most of XSLT, the Extensible Stylesheet Language for Transformations. It covers both XSLT 1.0 and XSLT 2.0, along with versions 1.0 and 2.0 of XPath, the XML Path Language. The two languages are designed to work together: XPath identifies the parts of an XML document that should be transformed, and XSLT...
Communicating with XML
Communicating with XML
XML (Extensible Markup Language) is the lingua franca in contemporary networked environments. It is intended to support communication between software modules, particularly on the Web, as well as communication between people involved in developing new XML-based solutions. Developing the new solutions for a specifi c domain or...
Learning Penetration Testing with Python
Learning Penetration Testing with Python

Utilize Python scripting to execute effective and efficient penetration tests

About This Book

  • Understand how and where Python scripts meet the need for penetration testing
  • Familiarise yourself with the process of highlighting a specific methodology to exploit an environment to fetch...
Learning XML, Second Edition
Learning XML, Second Edition
In this new edition of the best selling title, the author explains the important and relevant XML technologies and their capabilities clearly and succinctly with plenty of real-life projects and useful examples. He outlines the elements of markup--demystifying concepts such as attributes, entities, and namespaces--and provides enough depth and...
Learning XSLT
Learning XSLT
Learning XSLT moves smoothly from the simple to complex, illustrating all aspects of XSLT 1.0 through step-by-step examples that you'll practice as you work through the book. Thorough in its coverage of the language, the book makes few assumptions about what you may already know. You'll learn about XSLT's...
AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services. 

AAA and Network Security for Mobile Access is an invaluable guide to the AAA concepts and framework, including its...

XSLT Cookbook, Second Edition
XSLT Cookbook, Second Edition

Forget those funky robot toys that were all the rage in the '80s, XSLT (Extensible Stylesheet Transformations) is the ultimate transformer. This powerful language is expert at transforming XML documents into PDF files, HTML documents, JPEG files--virtually anything your heart desires. As useful as XSLT is, though, most people...

Professional Enterprise .NET (Wrox Programmer to Programmer)
Professional Enterprise .NET (Wrox Programmer to Programmer)

Comprehensive coverage to help experienced .NET developers create flexible, extensible enterprise application code

If you're an experienced Microsoft .NET developer, you'll find in this book a road map to the latest enterprise development methodologies. It covers the tools you will use in addition to Visual Studio, including Spring.NET...

Java Virtual Machine (Java Series)
Java Virtual Machine (Java Series)
The Java Virtual Machine is the software implementation of a "CPU" designed to run compiled Java code. This includes stand-alone Java applications, as well as "applets" that are downloaded and run in Web browsers such as the NetScape Navigator. This book is a comprehensive programming guide for the Java Virtual Machine (JVM)....
XSLT Programmer's Reference 2nd Edition
XSLT Programmer's Reference 2nd Edition

This compact, relevant, updated version reflects recent changes in the XSLT specification and developments in XSLT parsers. The material on tools and implementations has been revised; so too have all the examples. It also includes a new chapter on writing extension functions.

XML has firmly established itself as the universal...

Result Page: 24 23 22 21 20 19 18 17 16 15 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy