Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learn Blockchain Programming with JavaScript: Build your very own Blockchain and decentralized network with JavaScript and Node.js
Learn Blockchain Programming with JavaScript: Build your very own Blockchain and decentralized network with JavaScript and Node.js

Explore the essentials of blockchain technology with JavaScript to develop highly secure bitcoin-like applications

Key Features

  • Develop bitcoin and blockchain-based cryptocurrencies using JavaScript
  • Create secure and high-performant blockchain networks
  • ...
Software Design for Resilient Computer Systems
Software Design for Resilient Computer Systems

This book addresses the question of how system software should be designed to account for faults, and which fault tolerance features it should provide for highest reliability. With this second edition of Software Design for Resilient Computer Systems the book is thoroughly updated to contain the newest advice...

IoT, AI, and Blockchain for .NET: Building a Next-Generation Application from the Ground Up
IoT, AI, and Blockchain for .NET: Building a Next-Generation Application from the Ground Up
Create applications using Industry 4.0. Discover how artificial intelligence (AI) and machine learning (ML) capabilities can be enhanced using the Internet of things (IoT) and secured using Blockchain, so your latest app can be not just smarter but also more connected and more secure than ever before. This book covers the latest...
Financial Modelling in Python (The Wiley Finance Series)
Financial Modelling in Python (The Wiley Finance Series)

"Fletcher and Gardner have created a comprehensive resource that will be of interest not only to those working in the field of finance, but also to those using numerical methods in other fields such as engineering, physics, and actuarial mathematics. By showing how to combine the high-level elegance, accessibility, and flexibility of...

Computer and Information Security Handbook
Computer and Information Security Handbook

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical...

Kali Linux Cookbook
Kali Linux Cookbook

When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes.

Overview

  • Recipes designed to educate you extensively on the penetration testing principles and Kali...
The Semantic Web: A Guide to the Future of XML, Web Services, and Knowledge Management
The Semantic Web: A Guide to the Future of XML, Web Services, and Knowledge Management
A strategic guide to the revolutionary framework that will change the way you do business

Imagine if you could teach your computer to make decisions that lead to faster B2B trading implementations, more effective customer management, and seamless data warehousing. Now, your imagination can be turned into reality. This authoritative book...

Network Security Through Data Analysis: From Data to Action
Network Security Through Data Analysis: From Data to Action

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You’ll...

Bad to the Bone: Crafting Electronics Systems with Beaglebone and BeagleBone Black
Bad to the Bone: Crafting Electronics Systems with Beaglebone and BeagleBone Black

This comprehensive book provides detailed materials for both novice and experienced programmers using all BeagleBone variants which host a powerful 32-bit, super-scalar TI Sitara ARM Cortex A8 processor. Authored by Steven F. Barrett and Jason Kridner, a seasoned ECE educator along with the founder of Beagleboard.org, respectively, the work...

Laravel Application Development Cookbook
Laravel Application Development Cookbook

Over 90 recipes to learn all the key aspects of Laravel, including installation, authentication, testing, and the deployment and integration of third parties in your application

Overview

  • Install and set up a Laravel application and then deploy and integrate third parties in your application
  • ...
Docker Cookbook: Solutions and Examples for Building Distributed Applications
Docker Cookbook: Solutions and Examples for Building Distributed Applications

Whether you’re deploying applications on premise or in the cloud, this cookbook provides developers, operators, and IT professionals with more than 130 proven recipes for working with Docker.

With these practical solutions, experienced developers with no previous knowledge of Docker will be able to package and...

Hands-On Software Engineering with Python: Move beyond basic programming and construct reliable and efficient software with complex code
Hands-On Software Engineering with Python: Move beyond basic programming and construct reliable and efficient software with complex code

Explore various verticals in software engineering through high-end systems using Python

Key Features

  • Master the tools and techniques used in software engineering
  • Evaluates available database options and selects one for the final Central Office system-components
  • ...
Result Page: 61 60 59 58 57 56 55 54 53 52 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy