Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Microservices Architectural Patterns: Event-Based Java Microservices with Spring Boot and Spring Cloud
Practical Microservices Architectural Patterns: Event-Based Java Microservices with Spring Boot and Spring Cloud
Take your distributed applications to the next level and see what the reference architectures associated with microservices can do for you. This book begins by showing you the distributed computing architecture landscape and provides an in-depth view of microservices architecture. Following this, you will work with CQRS, an essential...
Python Interviews: Discussions with Python Experts
Python Interviews: Discussions with Python Experts

Mike Driscoll takes you on a journey talking to a hall-of-fame list of truly remarkable Python experts. You'll be inspired every time by their passion for the Python language, as they share with you their experiences, contributions, and careers in Python.

Key Features

  • Hear from these...
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.
Key Features
  • Intelligence processes and procedures for response mechanisms
  • Master F3EAD to drive processes based on intelligence
  • Threat modeling and intelligent frameworks
  • ...
Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer
Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer

Leverage the power of Hyperledger Fabric to develop Blockchain-based distributed ledgers with ease

Key Features

  • Write your own chaincode/smart contracts using Golang on hyperledger network
  • Build and deploy decentralized applications (DApps)
  • Dive into real...
Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions
Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions
Understand critical cybersecurity and risk perspectives, insights, and tools for the leaders of complex financial systems and markets. This book offers guidance for decision makers and helps establish a framework for communication between cyber leaders and front-line professionals. Information is provided to help in the analysis of...
Regular Expressions Cookbook
Regular Expressions Cookbook

This O'Reilly Cookbook provides more than a hundred recipes to help programmers use regular expressions to manipulate text and crunch data. Every programmer needs a grasp of regular expressions, but their power doesn't come without problems -- even seasoned users often have trouble tackling performance issues. With recipes for popular...

Hands-On Machine Learning with Scikit-Learn and TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems
Hands-On Machine Learning with Scikit-Learn and TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems

Graphics in this book are printed in black and white.

Through a series of recent breakthroughs, deep learning has boosted the entire field of machine learning. Now, even programmers who know close to nothing about this technology can use simple, efficient tools to implement programs capable of learning from data....

Artificial Intelligence for Fashion: How AI is Revolutionizing the Fashion Industry
Artificial Intelligence for Fashion: How AI is Revolutionizing the Fashion Industry
Artificial intelligence (AI) is becoming a part of the way we conduct business in every industry. The fashion industry is no exception. From product discovery to robotic manufacturing, AI has made its way into almost every segment of the fashion value chain.

The goal of this book
...
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)

Actionable guidance and expert perspective for real-world cybersecurity

The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world...

Mastering Blockchain: Distributed ledger technology, decentralization, and smart contracts explained, 2nd Edition
Mastering Blockchain: Distributed ledger technology, decentralization, and smart contracts explained, 2nd Edition

Learn about cryptography and cryptocurrencies, so you can build highly secure, decentralized applications and conduct trusted in-app transactions.

Key Features

  • Get to grips with the underlying technical principles and implementations of blockchain
  • Build powerful...
Remaining Relevant in Your Tech Career: When Change Is the Only Constant
Remaining Relevant in Your Tech Career: When Change Is the Only Constant
Remain relevant in the face of constant change during your career in technology. This book shows you how to proactively plan in anticipation of future changes. 

Many people find technology careers enticing because of the number of job opportunities, the high compensation, or simply because of fascination with
...
Information Security: The Complete Reference, Second Edition
Information Security: The Complete Reference, Second Edition

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Develop and implement an effective end-to-end security program

Today’s complex world of mobile platforms, cloud...

Result Page: 35 34 33 32 31 30 29 28 27 26 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy