Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Migrating to Azure: Transforming Legacy Applications into Scalable Cloud-First Solutions
Migrating to Azure: Transforming Legacy Applications into Scalable Cloud-First Solutions

Design an enterprise solution from scratch that allows the migration of a legacy application. Begin with the planning and design phase and be guided through all the stages of selecting the architecture framework that fits your enterprise.

Join Microsoft MVP Josh Garverick as he addresses all major areas of design and...

Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems

Implement defensive techniques in your ecosystem successfully with Python

Key Features

  • Identify and expose vulnerabilities in your infrastructure with Python
  • Learn custom exploit development
  • Make robust and powerful cybersecurity tools with Python
  • ...
Professional Augmented Reality Browsers for Smartphones: Programming for junaio, Layar and Wikitude (Wrox Programmer to Programmer)
Professional Augmented Reality Browsers for Smartphones: Programming for junaio, Layar and Wikitude (Wrox Programmer to Programmer)
AT AUGMENTEDPLANET.COM, I have been blogging about the rise in popularity of augmented reality (AR) since April 2009. When I started Augmented Planet, the only augmented reality applications available were either high-budget demos put together by creative agencies to wow their clients or obscure demos created by developers...
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

Mission Critical Windows 2000 Server Administration
Mission Critical Windows 2000 Server Administration
To put it in terms understandable to the many former English majors who now manage Windows networks: if Everyman were a system administrator, he'd run Windows 2000 Server. It supports pretty much any business requirement, yet it's user-friendly enough that anyone can learn to be an administrator with a bit of study. Mission Critical! Windows...
Computational Methods for Three-Dimensional Microscopy Reconstruction (Applied and Numerical Harmonic Analysis)
Computational Methods for Three-Dimensional Microscopy Reconstruction (Applied and Numerical Harmonic Analysis)

Approaches to the recovery of three-dimensional information on a biological object, which are often formulated or implemented initially in an intuitive way, are concisely described here based on physical models of the object and the image-formation process. Both three-dimensional electron microscopy and X-ray tomography can be captured in the...

The All-New Switch Book: The Complete Guide to LAN Switching Technology
The All-New Switch Book: The Complete Guide to LAN Switching Technology
The much-anticipated update to the bestselling book on LAN switching

Since the publication of the first edition of The Switch Book seven years ago, LAN switching has witnessed significant changes, particularly in the areas of network layers, Ethernet, fast Ethernet, segmenting LANs, layer 3 switching, layer 4 switching, and multi-layer...

Nuendo Power!
Nuendo Power!
Whether you are a musician, recording engineer, sound designer, video editor, or other type of
media author, certainly you have noticed that the demands of audio production in today’s multimedia
environment have increased dramatically. With the proliferation of surround sound systems in theaters,
homes, and specialized
...
Knots and Links
Knots and Links
Knot theory is the study of embeddings of circles in space. It is a subject in which naturally occurring questions are often so simple to state that they can be explained to a child, yet finding answers may require ideas from the forefront of research. It is a subject of both depth and subtlety.

The subject started to develop
...
Iran and Nuclear Weapons: Protracted Conflict and Proliferation (Routledge Global Security Studies)
Iran and Nuclear Weapons: Protracted Conflict and Proliferation (Routledge Global Security Studies)

This book investigates what is driving Iran's nuclear weapons programme in a less-hostile regional environment, using a theory of protracted conflicts to explicate proliferation.

Iran’s nuclear weapons program has alarmed the international community since the 1990s, but has come to the forefront of international security...

Higher Categories and Homotopical Algebra (Cambridge Studies in Advanced Mathematics)
Higher Categories and Homotopical Algebra (Cambridge Studies in Advanced Mathematics)
This book provides an introduction to modern homotopy theory through the lens of higher categories after Joyal and Lurie, giving access to methods used at the forefront of research in algebraic topology and algebraic geometry in the twenty-first century. The text starts from scratch - revisiting results from classical homotopy theory such as...
Algebraic Theory of Automata Networks (SIAM Monographs on Discrete Mathematics and Applications, 11)
Algebraic Theory of Automata Networks (SIAM Monographs on Discrete Mathematics and Applications, 11)
This self-contained monograph covers the foundations of what is currently known about automata networks, giving the reader sufficient theoretical background to be at the forefront of research in many related areas. Alexandra Kireeva, Mathematical Reviews

Algebraic Theory of Automata Networks investigates automata networks as
...
Result Page: 16 15 14 13 12 11 10 9 8 7 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy