Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microservices for the Enterprise: Designing, Developing, and Deploying
Microservices for the Enterprise: Designing, Developing, and Deploying
Understand the key challenges and solutions around building microservices in the enterprise application environment. This book provides a comprehensive understanding of microservices architectural principles and how to use microservices in real-world scenarios.

Architectural challenges using microservices with service
...
TCP/IP Network Administration (3rd Edition; O'Reilly Networking)
TCP/IP Network Administration (3rd Edition; O'Reilly Networking)

The first edition of TCP/IP Network Administration was written in 1992. In the decade since, many things have changed, yet some things remain the same. TCP/IP is still the preeminent communications protocol for linking together diverse computer systems. It remains the basis of interoperable...

Programming Social Applications: Building Viral Experiences with OpenSocial, OAuth, OpenID, and Distributed Web Frameworks
Programming Social Applications: Building Viral Experiences with OpenSocial, OAuth, OpenID, and Distributed Web Frameworks

I first began developing social applications when Facebook opened up its developer platform in 2007, giving people like me a taste of the extensive social data that an application can use to improve growth and target personalization settings. At the time, I was building social fantasy sports applications for CBSSports.com, pulling user...

Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition
Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition
Firewalls and Internet Security: Repelling the Wily Hacker gives invaluable advice and practical tools for protecting our computers. You will learn how to plan and execute a security strategy that will thwart the most determined and sophisticated of hackers, while still allowing your company easy access to Internet services. In particular, the...
Mastering Microsoft Power BI: Expert techniques for effective data analytics and business intelligence
Mastering Microsoft Power BI: Expert techniques for effective data analytics and business intelligence

Design, create and manage robust Power BI solutions to gain meaningful business insights

Key Features

  • Master all the dashboarding and reporting features of Microsoft Power BI
  • Combine data from multiple sources, create stunning visualizations and publish your reports across...
Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer
Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer

Leverage the power of Hyperledger Fabric to develop Blockchain-based distributed ledgers with ease

Key Features

  • Write your own chaincode/smart contracts using Golang on hyperledger network
  • Build and deploy decentralized applications (DApps)
  • Dive into real...
Voice over IP Fundamentals (2nd Edition)
Voice over IP Fundamentals (2nd Edition)

A systematic approach to understanding the basics of Voice over IP

* Understand the basics of PSTN services and IP signaling protocols, including SS7
* Learn how VoIP can run the same applications as the existing telephony system, but in a more cost-efficient and scalable manner
* Delve into such VoIP topics as jitter,
...

E: The Story of a Number
E: The Story of a Number
Maor attempts to give the irrational number e its rightful standing alongside pi as a fundamental constant in science and nature; he succeeds very well.... Maor writes so that both mathematical newcomers and long-time professionals alike can thoroughly enjoy his book, learn something new, and witness the ubiquity of mathematical ideas in...
Next Generation Network Services: Technologies & Strategies
Next Generation Network Services: Technologies & Strategies
'Next Generation' refers to the new technologies and services that telecommunications operators will have at their disposal as they create new 3G networks where voice and data converge and which are based on packet switched rather than circuit switched telephony.

Providing a much needed overview of the latest communication technologies
...
CCIE: Cisco Certified Internetwork Expert Study Guide, Second Edition
CCIE: Cisco Certified Internetwork Expert Study Guide, Second Edition

Here's the book you need to prepare for Cisco's CCIE Qualification and Lab Exams. This Study Guide provides:

  • Assessment testing to focus and direct your studies
  • In-depth coverage of all exam objectives
  • Hundreds of challenging practice questions, in...
SIP Trunking
SIP Trunking

The first complete guide to planning, evaluating, and implementing high-value SIP trunking solutions

 

Most large enterprises have switched to IP telephony, and service provider backbone networks have largely converted to VoIP transport. But there’s a...

Pro Power BI Architecture: Sharing, Security, and Deployment Options for Microsoft Power BI Solutions
Pro Power BI Architecture: Sharing, Security, and Deployment Options for Microsoft Power BI Solutions
Architect and deploy a Power BI solution. This book will help you understand the many available options and choose the best combination for hosting, developing, sharing, and deploying a Power BI solution within your organization.

Pro Power BI Architecture provides detailed examples and explains...
Result Page: 16 15 14 13 12 11 10 9 8 7 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy