Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Java 9 Dependency Injection: Write loosely coupled code with Spring 5 and Guice
Java 9 Dependency Injection: Write loosely coupled code with Spring 5 and Guice

Create clean code with Dependency Injection principles

Key Features

  • Use DI to make your code loosely coupled to manage and test your applications easily on Spring 5 and Google Guice
  • Learn the best practices and methodologies to implement DI
  • Write more...
Building Modern Web Applications Using Angular
Building Modern Web Applications Using Angular

Key Features

  • Learn about the core building blocks of Angular
  • Build and architect high performance web applications
  • Implement the latest JavaScript concepts in ECMAScript 2015, ECMAScript 2016, and TypeScript
  • Leverage the latest Angular features to get the most out of your web...
Handbook of Diabetes Technology
Handbook of Diabetes Technology

This book covers the main fields of diabetes management through applied technologies.

The different chapters include insulin therapy through basic insulin injection therapy, external and implantable insulin pumps and the more recent approaches such as sensor augmented pumps and close-loop systems. Islet transplantation...

Pivotal Certified Professional Core Spring 5 Developer Exam: A Study Guide Using Spring Framework 5
Pivotal Certified Professional Core Spring 5 Developer Exam: A Study Guide Using Spring Framework 5

Pass the Pivotal Certified Professional exam for Core Spring, based on the latest Spring Framework 5, using source code examples, study summaries, and mock exams. This book now includes WebFlux, reactive programming, and more found in Spring 5. You'll find a descriptive overview of certification-related Spring modules and a...

Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
SQL Hacks
SQL Hacks

Whether you're running Access, MySQL, SQL Server, Oracle, or PostgreSQL, this book will help you push the limits of traditional SQL to squeeze data effectively from your database. The book offers 100 hacks -- unique tips and tools -- that bring you the knowledge of experts who apply what they know in the real world to help you...

Applying Domain-Driven Design and Patterns: With Examples in C# and .NET
Applying Domain-Driven Design and Patterns: With Examples in C# and .NET

“[This] is a book about design in the .NET world, driven in an agile manner and infused with the products of the enterprise patterns community. [It] shows you how to begin applying such things as TDD, object relational mapping, and DDD to .NET projects...techniques that many developers think are the key to future...

Scala for Machine Learning
Scala for Machine Learning

Leverage Scala and Machine Learning to construct and study systems that can learn from data

About This Book

  • Explore a broad variety of data processing, machine learning, and genetic algorithms through diagrams, mathematical formulation, and source code
  • Leverage your expertise in Scala...
SQL Injection Attacks and Defense, Second Edition
SQL Injection Attacks and Defense, Second Edition

SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award

"SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog

SQL injection represents...

Angular 5 Projects: Learn to Build Single Page Web Applications Using 70+ Projects
Angular 5 Projects: Learn to Build Single Page Web Applications Using 70+ Projects

Learn to build single page web apps using Angular 5 and TypeScript by working through 70+ mini-projects. With hundreds of code examples you gain a thorough understanding of the Angular 5 ecosystem and how to work within it.

You'll begin by understanding the benefits of Angular 5 vs older versions, and how this...

Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

Cutting-edge techniques for finding and fixing critical security flaws

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s...

Kotlin Programming Cookbook: Explore more than 100 recipes that show how to build robust mobile and web applications with Kotlin, Spring Boot, and Android
Kotlin Programming Cookbook: Explore more than 100 recipes that show how to build robust mobile and web applications with Kotlin, Spring Boot, and Android

Discover Android programming and web development by understanding the concepts of Kotlin Programming

Key Features

  • Practical solutions to your common programming problems with Kotlin 1.1
  • Leverage the functional power of Kotlin to ease your Android application...
Result Page: 16 15 14 13 12 11 10 9 8 7 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy