Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Java Program Design: Principles, Polymorphism, and Patterns
Java Program Design: Principles, Polymorphism, and Patterns
Get a grounding in polymorphism and other fundamental aspects of object-oriented program design and implementation, and learn a subset of design patterns that any practicing Java professional simply must know in today’s job climate. 

Java Program Design presents program design...
Docker on Windows: From 101 to production with Docker on Windows, 2nd Edition
Docker on Windows: From 101 to production with Docker on Windows, 2nd Edition

Learn how to run new and old applications in Docker containers on Windows - modernizing the architecture, improving security and maximizing efficiency.

Key Features

  • Run .NET Framework and .NET Core apps in Docker containers for efficiency, security and portability
  • Design...
Natural Language Processing with TensorFlow: Teach language to machines using Python's deep learning library
Natural Language Processing with TensorFlow: Teach language to machines using Python's deep learning library

Write modern natural language processing applications using deep learning algorithms and TensorFlow

Key Features

  • Focuses on more efficient natural language processing using TensorFlow
  • Covers NLP as a field in its own right to improve understanding for choosing TensorFlow...
Building Microservices with Go
Building Microservices with Go

Key Features

  • This short, concise, and practical guide is packed with real-world examples of building microservices with Go
  • It is easy to read and will benefit smaller teams who want to extend the functionality of their existing systems
  • Using this practical approach will save your money in...
Building Microservices
Building Microservices

Distributed systems have become more fine-grained in the past 10 years, shifting from code-heavy monolithic applications to smaller, self-contained microservices. But developing these systems brings its own set of headaches. With lots of examples and practical advice, this book takes a holistic view of the topics that system...

Next Generation Wireless Systems and Networks
Next Generation Wireless Systems and Networks
Next Generation Wireless Systems and Networks offers an expert view of cutting edge Beyond 3rd Generation (B3G) wireless applications. This self-contained reference combines the basics of wireless communications, such as 3G wireless standards, spread spectrum and CDMA systems, with a more advanced level research-oriented...
Brilliant HTML & CSS
Brilliant HTML & CSS

Brilliant HTML & CSS is a visual quick reference book that teaches all that you need to know to create clean, forward-looking, standards-compliant, accessible Web sites using HTML & CSS. It will give you a solid grounding on the theory, coding skills, and best practices needed to use HTML & CSS to build sophisticated web pages a...

Unity Android Game Development by Example Beginner's Guide
Unity Android Game Development by Example Beginner's Guide

Absolute beginners to designing games for Android will find this book is their passport to quick results. Lots of handholding and practical exercises using Unity 3D makes learning a breeze.

Overview

  • Enter the increasingly popular mobile market and create games using Unity 3D and Android
  • ...
Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux
Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux

Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holes

Key Features

  • Know how to set up your lab with Kali Linux
  • Discover the core concepts of web penetration testing
  • ...
Honeypots and Routers: Collecting Internet Attacks
Honeypots and Routers: Collecting Internet Attacks

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...

Administrating Solr
Administrating Solr

Master the use of Drupal and associated scripts to administrate, monitor, and optimize Solr

Overview

  • Learn how to work with monitoring tools like OpsView, New Relic, and SPM
  • Utilize Solr scripts and Collection Distribution scripts to manage Solr
  • Employ search features like...
Introduction to Wireless Localization: With iPhone SDK Examples
Introduction to Wireless Localization: With iPhone SDK Examples

This book provides a comprehensive overview of the entire landscape of both outdoor and indoor wireless positioning, and guides the reader step by step in the implementation of wireless positioning applications on the iPhone. Explanations of fundamental positioning techniques are given throughout the text, along with many programming...

Result Page: 24 23 22 21 20 19 18 17 16 15 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy