Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced API Security: OAuth 2.0 and Beyond
Advanced API Security: OAuth 2.0 and Beyond
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs.
Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of
...
Spark for Python Developers
Spark for Python Developers

Key Features

  • Set up real-time streaming and batch data intensive infrastructure using Spark and Python
  • Deliver insightful visualizations in a web app using Spark (PySpark)
  • Inject live data using Spark Streaming with real-time events

Book Description

Looking...

Alan Turing: His Work and Impact
Alan Turing: His Work and Impact

In this 2013 winner of the prestigious R.R. Hawkins Award from the Association of American Publishers, as well as the 2013 PROSE Awards for Mathematics and Best in Physical Sciences & Mathematics, also from the AAP, readers will find many of the most significant contributions from the four-volume set of the Collected Works of A. M....

Adopting Elixir: From Concept to Production
Adopting Elixir: From Concept to Production

Adoption is more than programming. Elixir is an exciting new language, but to successfully get your application from start to finish, you're going to need to know more than just the language. The case studies and strategies in this book will get you there. Learn the best practices for the whole life of your application, from...

Groovy 2 Cookbook
Groovy 2 Cookbook

Over 90 recipes that provide solutions to everyday programming challenges using the powerful features of Groovy 2

Overview

  • Simple and more advanced recipes to cover a broad number of topics and challenges
  • With scores of practical examples, this book will help you to build efficient,...
The Measure of All Minds: Evaluating Natural and Artificial Intelligence
The Measure of All Minds: Evaluating Natural and Artificial Intelligence

Are psychometric tests valid for a new reality of artificial intelligence systems, technology-enhanced humans, and hybrids yet to come? Are the Turing Test, the ubiquitous CAPTCHAs, and the various animal cognition tests the best alternatives? In this fascinating and provocative book, José Hernández-Orallo formulates major...

Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Develop blockchain application with step-by-step instructions, working example and helpful recommendations

Key Features

  • Understanding the blockchain technology from the cybersecurity perspective
  • Developing cyber security solutions with Ethereum blockchain technology
  • ...
Professional Java, JDK 5 Edition
Professional Java, JDK 5 Edition
Java continues to be the dominant language for building server applications, and the latest update to the Java platform—JDK 5—boasts many new features, including a metadata facility, generics, autoboxing, and improved user interface performance. Building upon Ivor Horton's Beginning Java, this book provides insight into these...
Photoshop Compositing Secrets: Unlocking the Key to Perfect Selections and Amazing Photoshop Effects for Totally Realistic Composites
Photoshop Compositing Secrets: Unlocking the Key to Perfect Selections and Amazing Photoshop Effects for Totally Realistic Composites

 

Photoshop compositing has really blown up over the last few years. You see composites everywhere from magazine ads and covers, to movie posters, to athletic portraits, to, well, just about any kind of portrait. It really is everywhere. Clients and customers are very aware of Photoshop now and
...
Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China

The New Global Hub of IT Outsourcing

Welcome to the new technology outsourcing services industry reality: China!

The factors that point to a country's potential and success as an outsourcing destination inevitably lead to the one country that is rapidly becoming the new hub for IT...

Pro Windows Phone App Development (Professional Apress)
Pro Windows Phone App Development (Professional Apress)
Windows Phone, updated in Windows Phone 7.5, presents an exciting opportunity for developers to build and monetize mobile applications. It represents a major new investment into mobile computing by Microsoft, and in many ways is a major break from the past. To build applications for Windows Phone, it is important to understand its...
Hands-On Machine Learning with Scikit-Learn and TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems
Hands-On Machine Learning with Scikit-Learn and TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems

Graphics in this book are printed in black and white.

Through a series of recent breakthroughs, deep learning has boosted the entire field of machine learning. Now, even programmers who know close to nothing about this technology can use simple, efficient tools to implement programs capable of learning from data....

unlimited object storage image
Result Page: 40 39 38 37 36 35 34 33 32 31 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy