Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
ASP.NET Core 2 Fundamentals: Build cross-platform apps and dynamic web services with this server-side web application framework
ASP.NET Core 2 Fundamentals: Build cross-platform apps and dynamic web services with this server-side web application framework

Imagine the boost in business if you can build large, rich web applications with little code and built-in Windows authentication. With this book, you can gain skills to develop real-world applications with ASP.NET Core 2.

Key Features

  • Adopts the application-centric approach to explain core...
PMP Exam Prep, Eighth Edition - Updated: Rita's Course in a Book for Passing the PMP Exam
PMP Exam Prep, Eighth Edition - Updated: Rita's Course in a Book for Passing the PMP Exam

This book has been FULLY updated to reflect PMI's changes to the PMP Exam Content Outline dated June 2015, and is intended for all PMP exams taken AFTER November 1st, 2015. If you are taking the PMP exam on or before November 1st of 2015, please contact the Publisher.

Can you imagine valuing a book so much that you...

Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Ever wonder how easy it is to hack into someone’s bank account info while surfing the net at your local Starbucks? Learning how to hack is one of the best preventative measures you can take when protecting yourself from other hackers. Hacking is often misunderstood and that is for good reason. Many people use hacking as...
Moodle Security
Moodle Security

Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks. Learn how to safeguard Moodle to keep the bad guys...

Clojure for Java Developers
Clojure for Java Developers

Key Features

  • Write apps for the multithreaded world with Clojure's flavor of functional programming
  • Discover Clojure's features and advantages and use them in your existing projects
  • The book is designed so that you'll be able put to use your existing skills and software knowledge...
Complex Variables Demystified
Complex Variables Demystified
Complex variables, and its more advanced version, complex analysis, is one of the most fascinating areas in pure and applied mathematics. It all started when mathematicians were mystified by equations that could only be solved if you could take the square roots of negative numbers. This seemed bizarre, and back then nobody could imagine that...
Configuring Cisco AVVID: Architecture for Voice, Video, and Integrated Data
Configuring Cisco AVVID: Architecture for Voice, Video, and Integrated Data
AVVID (Architecture for Voice, Video, and Integrated Data) is a network architecture made up of hardware and software that transmits a company’s data such as e-mail, web traffic, file transfers, voice traffic, and video traffic over the same physical computer network. Imagine taking the three networks your...
How Google Tests Software
How Google Tests Software

 

Software development is hard. Testing that software is hard, too. And when you talk about development and testing at the scale of the entire web, you are talking about Google. If you are interested in how one of the biggest names in the Internet handles such large-scale testing, then you have found the right
...
Solving Everyday Problems with the Scientific Method: Thinking Like a Scientist
Solving Everyday Problems with the Scientific Method: Thinking Like a Scientist

This book describes how one can use The Scientific Method to solve everyday problems including medical ailments, health issues, money management, traveling, shopping, cooking, household chores, etc. It illustrates how to exploit the information collected from our five senses, how to solve problems when no information is available for the...

Digital Piracy (Cybersafety)
Digital Piracy (Cybersafety)

The Internet has had and will continue to have a profound effect on society. It is hard to imagine life without such technologies as computers, cell phones, gaming devices, and so on. The Internet, World Wide Web, and their associated technologies have altered our social and personal experience of the world. In no other time in...

Java Deep Learning Essentials
Java Deep Learning Essentials

Dive into the future of data science and learn how to build the sophisticated algorithms that are fundamental to deep learning and AI with Java

About This Book

  • Go beyond the theory and put Deep Learning into practice with Java
  • Find out how to build a range of Deep Learning algorithms...
Big Data Analytics with Microsoft HDInsight in 24 Hours, Sams Teach Yourself
Big Data Analytics with Microsoft HDInsight in 24 Hours, Sams Teach Yourself

With Microsoft HDInsight, business professionals and data analysts can rapidly leverage the power of Hadoop on a flexible, scalable cloud-based platform, using Microsoft's accessible business intelligence, visualization, and productivity tools. Now, in just 24 lessons of one hour or less, you can learn all the skills and...

Result Page: 21 20 19 18 17 16 15 14 13 12 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy