Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Blockchain for Enterprise: Build scalable blockchain applications with privacy, interoperability, and permissioned features
Blockchain for Enterprise: Build scalable blockchain applications with privacy, interoperability, and permissioned features

Implement blockchain principles in your choice of domain using Ethereum

Key Features

  • Build permissioned enterprise-grade blockchain applications from scratch
  • Implement Blockchain-as-a-Service to enterprises in terms of deployment and security
  • Achieve...
Deploying IPv6 Networks
Deploying IPv6 Networks

An essential guide to IPv6 concepts, service implementation, and interoperability in existing IPv4 environments.

  • Learn about IPv6 services and the relevant IPv6 features that make them possible

  • Plan, deploy, and manage IPv6 services at...

Beginning Scala
Beginning Scala

Beginning Scala, Second Edition takes a down-to-earth approach to teaching Scala that leads you through simple examples that can be combined to build complex, scalable systems and applications.

This book introduces you to the Scala programming language, its object-oriented and functional programming characteristics, and...

Common Warehouse Metamodel: An Introduction to the Standard for Data Warehouse Integration
Common Warehouse Metamodel: An Introduction to the Standard for Data Warehouse Integration
"The time has come for the consumers themselves to step forward and to specify a standard for meta data semantics and meta data exchange. This book is an important first step in that direction."
–W. H. Inmon, from the Foreword

The Common Warehouse Metamodel (CWM) is rapidly gaining momentum within the data warehousing...

RFID Explained (Synthesis Lectures on Mobile and Pervasive Computing)
RFID Explained (Synthesis Lectures on Mobile and Pervasive Computing)
This lecture provides an introduction to Radio Frequency Identification (RFID), a technology enabling automatic identification of objects at a distance without requiring line-of-sight. Electronic tagging can be divided into technologies that have a power source (active tags), and those that are powered by the tag interrogation signal (passive...
RFID Technology and Applications
RFID Technology and Applications
This book is addressed to business management and project managers as well as researchers who are evaluating the use of radio frequency identification (RFID) for tracking uniquely identified objects. In an effort to make RFID project management less of an art form and more of a science RFID Technology and Applications brings together pioneering...
Functional Programming in Scala
Functional Programming in Scala

Summary

Functional Programming in Scala is a serious tutorial for programmers looking to learn FP and apply it to the everyday business of coding. The book guides readers from basic techniques to advanced topics in a logical, concise, and clear progression. In it, you'll find concrete examples and...

Building And Integrating Virtual Private Networks With Openswan
Building And Integrating Virtual Private Networks With Openswan
With the widespread use of wireless networking and the integration of VPN capabilities in most
modern laptops, PDAs, and even cellular phones, there is a growing desire for encrypting more
and more communications to prevent eavesdropping. Can you trust the coffee shop's wireless
network? Is your neighbor snooping on your WiFi
...
Mastering Julia
Mastering Julia

Key Features

  • Build statistical models with linear regression and analysis of variance (ANOVA)
  • Create your own modules and contribute to the Julia package system
  • Complete an extensive data science project through the entire cycle from ETL to analytics and data visualization

...

Pro Spring 5: An In-Depth Guide to the Spring Framework and Its Tools
Pro Spring 5: An In-Depth Guide to the Spring Framework and Its Tools

Master Spring basics and core topics, and share the authors’ insights and real–world experiences with remoting, Hibernate, and EJB. Beyond the basics, you'll learn how to leverage the Spring Framework to build the various tiers and parts of an enterprise Java application: transactions, web and presentation tiers, deployment,...

Elm Web Development: An introductory guide to building functional web apps using Elm
Elm Web Development: An introductory guide to building functional web apps using Elm

Explore why ELM is a great alternative to using pure JavaScript and other JS-based solutions by building complete apps and websites.

Key Features

  • Develop your own scalable and modular web applications with Elm to make web development less messy compared to your JavaScript apps
  • ...
Petri Nets: Fundamental Models, Verification and Applications
Petri Nets: Fundamental Models, Verification and Applications

A Petri net is a mathematical representation of a network. This book first introduces the basic models including time and stochastic extensions, in particular place-transition and high level Petri nets. Their modeling and design capabilities are illustrated by a set of representations of interest in operating and communication systems. The...

Result Page: 24 23 22 21 20 19 18 17 16 15 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy