Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced API Security: OAuth 2.0 and Beyond
Advanced API Security: OAuth 2.0 and Beyond
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs.
Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of
...
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.
Key Features
  • Intelligence processes and procedures for response mechanisms
  • Master F3EAD to drive processes based on intelligence
  • Threat modeling and intelligent frameworks
  • ...
eThekwini’s Green and Ecological Infrastructure Policy Landscape: Towards a Deeper Understanding
eThekwini’s Green and Ecological Infrastructure Policy Landscape: Towards a Deeper Understanding
This book offers the reader a deeper understanding of the eThekwini Metropolitan Municipality’s green and ecological infrastructure policy landscape. The author utilises the PULSE3 analytical framework to conduct an in-depth examination and to show how experts frame and implement the municipality’s green and ecological infrastructure...
Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer
Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer

Leverage the power of Hyperledger Fabric to develop Blockchain-based distributed ledgers with ease

Key Features

  • Write your own chaincode/smart contracts using Golang on hyperledger network
  • Build and deploy decentralized applications (DApps)
  • Dive into real...
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Develop blockchain application with step-by-step instructions, working example and helpful recommendations

Key Features

  • Understanding the blockchain technology from the cybersecurity perspective
  • Developing cyber security solutions with Ethereum blockchain technology
  • ...
Hands-On Machine Learning with Scikit-Learn and TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems
Hands-On Machine Learning with Scikit-Learn and TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems

Graphics in this book are printed in black and white.

Through a series of recent breakthroughs, deep learning has boosted the entire field of machine learning. Now, even programmers who know close to nothing about this technology can use simple, efficient tools to implement programs capable of learning from data....

Spark for Python Developers
Spark for Python Developers

Key Features

  • Set up real-time streaming and batch data intensive infrastructure using Spark and Python
  • Deliver insightful visualizations in a web app using Spark (PySpark)
  • Inject live data using Spark Streaming with real-time events

Book Description

Looking...

Data-intensive Systems: Principles and Fundamentals using Hadoop and Spark (Advanced Information and Knowledge Processing)
Data-intensive Systems: Principles and Fundamentals using Hadoop and Spark (Advanced Information and Knowledge Processing)
Data-intensive systems are a technological building block supporting Big Data and Data Science applications.This book familiarizes readers with core concepts that they should be aware of before continuing with independent work and the more advanced technical reference literature that dominates the current landscape.

...
PowerPoint 2010 All-in-One For Dummies
PowerPoint 2010 All-in-One For Dummies

A fully updated guide to creating dynamic presentations with PowerPoint 2010

PowerPoint dominates the presentation landscape. With the changes in PowerPoint 2010, including the availability of an online version, PowerPoint users need this comprehensive reference to make the most of the program.

PowerPoint 2010...

Practical Microservices Architectural Patterns: Event-Based Java Microservices with Spring Boot and Spring Cloud
Practical Microservices Architectural Patterns: Event-Based Java Microservices with Spring Boot and Spring Cloud
Take your distributed applications to the next level and see what the reference architectures associated with microservices can do for you. This book begins by showing you the distributed computing architecture landscape and provides an in-depth view of microservices architecture. Following this, you will work with CQRS, an essential...
General Relativity: A Concise Introduction
General Relativity: A Concise Introduction
Einstein's general theory of relativity -- currently our best theory of gravity -- is important not only to specialists, but to a much wider group of physicists. This short textbook on general relativity and gravitation offers students glimpses of the vast landscape of science connected to general relativity. It incorporates some of the...
Mastering Blockchain: Distributed ledger technology, decentralization, and smart contracts explained, 2nd Edition
Mastering Blockchain: Distributed ledger technology, decentralization, and smart contracts explained, 2nd Edition

Learn about cryptography and cryptocurrencies, so you can build highly secure, decentralized applications and conduct trusted in-app transactions.

Key Features

  • Get to grips with the underlying technical principles and implementations of blockchain
  • Build powerful...
unlimited object storage image
Result Page: 39 38 37 36 35 34 33 32 31 30 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy