Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microservices for the Enterprise: Designing, Developing, and Deploying
Microservices for the Enterprise: Designing, Developing, and Deploying
Understand the key challenges and solutions around building microservices in the enterprise application environment. This book provides a comprehensive understanding of microservices architectural principles and how to use microservices in real-world scenarios.

Architectural challenges using microservices with service
...
Mastering Bitcoin: Unlocking Digital Cryptocurrencies
Mastering Bitcoin: Unlocking Digital Cryptocurrencies

Mastering Bitcoin is essential reading for everyone interested in learning about bitcoin basics, the technical operation of bitcoin, or if you're building the next great bitcoin killer app or business. From using a bitcoin wallet to buy a cup of coffee, to running a bitcoin marketplace with hundreds of thousands of transactions, or...

Globalization: A Basic Text
Globalization: A Basic Text

Updated to reflect recent global developments, the second edition of Globalization: A Basic Text presents an up-to-date introduction to major trends and topics relating to globalization studies.

  • Features updates and revisions in its accessible introduction to key theories and major topics in...
Data Warehousing in the Age of Big Data (The Morgan Kaufmann Series on Business Intelligence)
Data Warehousing in the Age of Big Data (The Morgan Kaufmann Series on Business Intelligence)

Web 2.0 has changed the way we conduct business, interact with customers, share information with friends and family, measure success in terms of business revenue and customer wallet share, and define brand management, and, most importantly, it has created a revenue channel like none other. Whether you plan your vacation, buy the newest...

Complete Guide to CISM Certification
Complete Guide to CISM Certification

Complete Guide to CISMВ® Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices,...

IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002
IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002

Information is widely regarded as the lifeblood of modern business, but organizations are facing a flood of threats to such “intellectual capital” from hackers, viruses, and online fraud.  Directors must respond to increasingly complex and competing...

Practical Information Security Management: A Complete Guide to Planning and Implementation
Practical Information Security Management: A Complete Guide to Planning and Implementation

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information...

CRC Handbook of Modern Telecommunications, Second Edition
CRC Handbook of Modern Telecommunications, Second Edition

Addressing the most dynamic areas of the ever-changing telecommunications landscape, this new edition of the bestselling CRC Handbook of Modern Telecommunications once again brings together the top minds and industry pioneers in wireless communication networks, protocols, and devices.

In addition to new discussions of...

Public Administration in Europe: The Contribution of EGPA (Governance and Public Management)
Public Administration in Europe: The Contribution of EGPA (Governance and Public Management)
This book considers the ways in which public administration (PA) has been studied in Europe over the last forty years, and examines in particular the contribution of EGPA, the European Group for Public Administration, both to the growth of a truly pan-European PA, and to the future of PA in Europe. The book provides a lively reflection on the...
Information Security Fundamentals, Second Edition
Information Security Fundamentals, Second Edition

Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise’s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides...

Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer
Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer

Leverage the power of Hyperledger Fabric to develop Blockchain-based distributed ledgers with ease

Key Features

  • Write your own chaincode/smart contracts using Golang on hyperledger network
  • Build and deploy decentralized applications (DApps)
  • Dive into real...
New Approaches to CSR, Sustainability and Accountability, Volume I (Accounting, Finance, Sustainability, Governance & Fraud: Theory and Application)
New Approaches to CSR, Sustainability and Accountability, Volume I (Accounting, Finance, Sustainability, Governance & Fraud: Theory and Application)
This book provides a platform for discussing the challenges that organizations face in order to implement sustainability, ethics, and effective corporate governance, all of which are important elements of “standing out” from other companies. Examining the background of the New European Consensus on development with the new...
Result Page: 25 24 23 22 21 20 19 18 17 16 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy