Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Next-Generation Big Data: A Practical Guide to Apache Kudu, Impala, and Spark
Next-Generation Big Data: A Practical Guide to Apache Kudu, Impala, and Spark

Utilize this practical and easy-to-follow guide to modernize traditional enterprise data warehouse and business intelligence environments with next-generation big data technologies.

Next-Generation Big Data takes a holistic approach, covering the most important aspects of modern enterprise big data. The book...

Qt5 Python GUI Programming Cookbook: Building responsive and powerful cross-platform applications with PyQt
Qt5 Python GUI Programming Cookbook: Building responsive and powerful cross-platform applications with PyQt

Over 60 recipes to help you design interactive, smart, and cross-platform GUI applications

Key Features

  • Get succinct QT solutions to pressing GUI programming problems in Python
  • Learn how to effectively implement reactive programming
  • Build customized...
Learning Python Networking: A complete guide to build and deploy strong networking capabilities using Python 3.7 and Ansible , 2nd Edition
Learning Python Networking: A complete guide to build and deploy strong networking capabilities using Python 3.7 and Ansible , 2nd Edition

Achieve improved network programmability and automation by leveraging powerful network programming concepts, algorithms, and tools

Key Features

  • Deal with remote network servers using SSH, FTP, SNMP and LDAP protocols.
  • Design multi threaded and event-driven architectures...
Linux Administration Cookbook: Insightful recipes to work with system administration tasks on Linux
Linux Administration Cookbook: Insightful recipes to work with system administration tasks on Linux

Over 100 recipes to get up and running with the modern Linux administration ecosystem

Key Features

  • Understand and implement the core system administration tasks in Linux
  • Discover tools and techniques to troubleshoot your Linux system
  • Maintain a healthy...
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats

Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful...

Complete Guide to Test Automation: Techniques, Practices, and Patterns for Building and Maintaining Effective Software Projects
Complete Guide to Test Automation: Techniques, Practices, and Patterns for Building and Maintaining Effective Software Projects
Rely on this robust and thorough guide to build and maintain successful test automation. As the software industry shifts from traditional waterfall paradigms into more agile ones, test automation becomes a highly important tool that allows your development teams to deliver software at an ever-increasing pace without compromising...
C# 7 and .NET Core 2.0 Blueprints: Build effective applications that meet modern software requirements
C# 7 and .NET Core 2.0 Blueprints: Build effective applications that meet modern software requirements

Leverage the features of C# 7 and .NET core 2.0 to build real-world .NET core applications

Key Features

  • See how to incorporate Entity Framework Core to build ASP .NET core MVC application
  • Get hands-on SignalR and NuGet packages
  • Work with Reactive...
Effective Java
Effective Java

The Definitive Guide to Java Platform Best Practices–Updated for Java 7, 8, and 9

 

Java has changed dramatically since the previous edition of Effective Java was published shortly after the release of Java 6. This Jolt...

Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps
Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps

Protect your organization's security at all levels by introducing the latest strategies for securing DevOps

Key Features

  • Integrate security at each layer of the DevOps pipeline
  • Discover security practices to protect your cloud services by detecting fraud and...
Mastering TensorFlow 1.x: Advanced machine learning and deep learning concepts using TensorFlow 1.x and Keras
Mastering TensorFlow 1.x: Advanced machine learning and deep learning concepts using TensorFlow 1.x and Keras

Build, scale, and deploy deep neural network models using the star libraries in Python

Key Features

  • Delve into advanced machine learning and deep learning use cases using Tensorflow and Keras
  • Build, deploy, and scale end-to-end deep neural network models in a production...
Practical JSF in Java EE 8
Practical JSF in Java EE 8

Master the Java EE 8 and JSF (JavaServer Faces) APIs and web framework with this practical, projects-driven guide to web development. This book combines theoretical background with a practical approach by building four real-world applications. By developing these JSF web applications, you'll take a tour through the other...

Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring...
Result Page: 1005 1004 1003 1002 1001 1000 999 998 997 996 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy