Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical DevOps
Practical DevOps

Key Features

  • Get to know the background of DevOps so you understand the collaboration between different aspects of an IT organization and a software developer
  • Improve your organization's performance to ensure smooth production of software and services
  • Deploy top-quality software and...
CURRENT Medical Diagnosis and Treatment 2017 (Lange)
CURRENT Medical Diagnosis and Treatment 2017 (Lange)

This #1 annual internal medicine and clinical practice guide turns the latest research into improved patient outcomes – now fully updated and revised.

Developing Microservices with Node.js
Developing Microservices with Node.js

Key Features

  • Real world example explained chapter after chapter with code examples.
  • Useful concepts for other languages like Java or PHP
  • Easy to follow by people with little to none experience in Node.js
  • Node.js Version 0.12.2 and the latest compatible versions of Seneca and...
Scientific Methods in Mobile Robotics: Quantitative Analysis of Agent Behaviour
Scientific Methods in Mobile Robotics: Quantitative Analysis of Agent Behaviour
Mobile robots are widely applied in a range of applications from transportation, surveillance through to health care. In all these applications it is clearly important to be able to analyse and control the performance of the mobile robot and it is therefore surprising that formalised methods to achieve this are not readily available. This book...
Statistics for Research (Wiley Series in Probability and Statistics)
Statistics for Research (Wiley Series in Probability and Statistics)
Praise for the Second Edition

"Statistics for Research has other fine qualities besides superior organization. The examples and the statistical methods are laid out with unusual clarity by the simple device of using special formats for each. The book was written with great care and is extremely user-friendly."—The...

Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human...

Troubleshooting Java Performance: Detecting Anti-Patterns with Open Source Tools
Troubleshooting Java Performance: Detecting Anti-Patterns with Open Source Tools
With just 30 minutes of troubleshooting, how close can you get to finding the root cause of a Java performance problem? What observability tools would you use? What subsystems would you investigate?

This book is a short curriculum in Java performance tuning for Java server-side developers. It explores one methodical
...
RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations
RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations
The escalating demand for ubiquitous computing along with the complementary and flexible natures of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) have sparked an increase in the integration of these two dynamic technologies. Although a variety of applications can be observed under development and in practical use, there...
Result Page: 102 101 100 99 98 97 96 95 94 93 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy