Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
PolyBase Revealed: Data Virtualization with SQL Server, Hadoop, Apache Spark, and Beyond
PolyBase Revealed: Data Virtualization with SQL Server, Hadoop, Apache Spark, and Beyond

Harness the power of PolyBase data virtualization software to make data from a variety of sources easily accessible through SQL queries while using the T-SQL skills you already know and have mastered.

PolyBase Revealed shows you how to use the PolyBase feature of SQL Server 2019 to...

Building Embedded Linux Systems
Building Embedded Linux Systems
There's a great deal of excitement surrounding the use of Linux in embedded systems -- for everything from cell phones to car ABS systems and water-filtration plants -- but not a lot of practical information. Building Embedded Linux Systems offers an in-depth, hard-core guide to putting together embedded systems based on Linux.
...
OpenCV 3 Computer Vision with Python Cookbook: Leverage the power of OpenCV 3 and Python to build computer vision applications
OpenCV 3 Computer Vision with Python Cookbook: Leverage the power of OpenCV 3 and Python to build computer vision applications

Recipe-based approach to tackle the most common problems in Computer Vision by leveraging the functionality of OpenCV using Python APIs

Key Features

  • Build computer vision applications with OpenCV functionality via Python API
  • Get to grips with image processing, multiple...
AngularJS UI Development
AngularJS UI Development

Design, build, and test production-ready applications in AngularJS

About This Book

  • Design and customize applications with mobile users in mind using open source CSS3 frameworks
  • Use polished UI components written from scratch solely in AngularJS to build real-world applications with a...
Pro Bash Programming: Scripting the GNU/Linux Shell (Expert's Voice in Linux)
Pro Bash Programming: Scripting the GNU/Linux Shell (Expert's Voice in Linux)

The bash shell is a complete programming language, not merely a glue to combine external Linux commands. By taking full advantage of shell internals, shell programs can perform as snappily as utilities written in C or other compiled languages. And you will see how, without assuming Unix lore, you can write professional bash 4.0 programs through...

Metaprogramming Elixir: Write Less Code, Get More Done (and Have Fun!)
Metaprogramming Elixir: Write Less Code, Get More Done (and Have Fun!)

Write code that writes code with Elixir macros. Macros make metaprogramming possible and define the language itself. In this book, you'll learn how to use macros to extend the language with fast, maintainable code and share functionality in ways you never thought possible. You'll discover how to extend Elixir with your own first-class...

Botnets: The Killer Web App
Botnets: The Killer Web App
This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise!

The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world
...
Inside Microsoft SQL Server 2005: T-SQL Querying
Inside Microsoft SQL Server 2005: T-SQL Querying
A comprehensive, hands-on reference for database developers and administrators, this book focuses on advanced querying techniques using Transact-SQL (T-SQL), the database programming language built into SQL Server. Includes code and table examples.

Key Book Benefits:
  • Delivers practical, hands-on guidance on...
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

The Accredited Symbian Developer Primer: Fundamentals of Symbian OS (Symbian Press)
The Accredited Symbian Developer Primer: Fundamentals of Symbian OS (Symbian Press)
This new book, first in the Academy series, is the official guide to the ASD exam, priming candidates for the exam, explaining exactly what they need to know.

The Primer explains the knowledge tested in the Accredited Symbian Developer exam, identifying and explaining the topics examined. Each of the exam's objectives is succinctly...

ASP.NET in 60 Minutes a Day
ASP.NET in 60 Minutes a Day
Get up and running with ASP.NET using this innovative virtual classroom approach!

Are you ready to learn how to write clean, reusable, scalable code for Web pages using ASP.NET? Experienced trainer Glenn Johnson takes you inside his virtual classroom to provide you with seventeen one-hour lessons that recreate a typical introductory seminar on...

Inside Microsoft® SQL Server(TM) 2005: Query Tuning and Optimization
Inside Microsoft® SQL Server(TM) 2005: Query Tuning and Optimization
Dive deep into the internals of query tuning and optimization in SQL Server 2005 with this comprehensive reference. Understanding the internals of SQL Server helps database developers and administrators to better create, access, and effectively process information from enterprise data. Written by experts on SQL Server, this volume from the Inside...
unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy