Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mesos in Action
Mesos in Action

Summary

Mesos in Action introduces readers to the Apache Mesos cluster manager and the concept of application-centric infrastructure. Filled with helpful figures and hands-on instructions, this book guides you from your first steps creating a highly-available Mesos cluster through deploying applications in...

Learning Cython Programming
Learning Cython Programming

Developers who like C/C++ will love the added dynamism of Cython. This practical guide gives you everything you need to start programming with Cython and enhancing your existing applications. It could change your working life.

Overview

  • Extend C applications with pure Python code
  • Expand...
Mastering Nginx
Mastering Nginx

Written for experienced systems administrators and engineers, this book teaches you from scratch how to configure Nginx for any situation. Step-by-step instructions and real-world code snippets clarify even the most complex areas.

Overview

  • An in-depth configuration guide to help you understand how to best...
Secure Java: For Web Application Development
Secure Java: For Web Application Development

Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure...

DevOps for Serverless Applications: Design, deploy, and monitor your serverless applications using DevOps practices
DevOps for Serverless Applications: Design, deploy, and monitor your serverless applications using DevOps practices

Set up complete CI and CD pipelines for your serverless applications using DevOps principles

Key Features

  • Understand various services for designing serverless architecture
  • Build CD pipelines using various cloud providers for your serverless applications
  • ...
CO2 Injection in the Network of Carbonate Fractures (Petroleum Engineering)
CO2 Injection in the Network of Carbonate Fractures (Petroleum Engineering)

This book presents guidelines for the design, operation and monitoring of CO2 injection in fractured carbonates, with low permeability in the rock matrix, for geological storage in permanent trapping. 

CO2 migration is dominated by fractures in formations where the hydrodynamic and geochemical effects induced by the...

Developer's Guide to Microsoft Enterprise Library, Visual Basic Edition (Patterns & Practices)
Developer's Guide to Microsoft Enterprise Library, Visual Basic Edition (Patterns & Practices)

You are holding in your hands a book that will make your life as an enterprise developer a whole lot easier.

It’s a guide on Microsoft Enterprise Library and it’s meant to guide you through how to apply .NET for enterprise development. Enterprise Library, developed by the patterns & practices group, is a collection...

Hands-On System Programming with Linux: Explore Linux system programming interfaces, theory, and practice
Hands-On System Programming with Linux: Explore Linux system programming interfaces, theory, and practice

Get up and running with system programming concepts in Linux

Key Features

  • Acquire insight on Linux system architecture and its programming interfaces
  • Get to grips with core concepts such as process management, signalling and pthreads
  • Packed with industry...
Apache Kafka
Apache Kafka

Set up Apache Kafka clusters and develop custom message producers and consumers using practical, hands-on examples

Overview

  • Write custom producers and consumers with message partition techniques
  • Integrate Kafka with Apache Hadoop and Storm for use cases such as processing streaming...
Cisco Security Professional's Guide to Secure Intrusion Detection Systems
Cisco Security Professional's Guide to Secure Intrusion Detection Systems

This book presents a combination of intrusion detection systems (IDS) and security theory, Cisco security models, and detailed information regarding specific Cisco-based IDS solutions. Cisco Security Professional’s Guide to Secure Intrusion Detection Systems also serves as a guide for security administrators studying for the Cisco...

Pro J2ME Polish: Open Source Wireless Java Tools Suite
Pro J2ME Polish: Open Source Wireless Java Tools Suite

Pro J2ME Polish: Open Source Wireless Java Tools Suite is written for wireless and other mobile Java programmers who want to "polish" their efficiency and acquire in-depth knowledge about programming real-world J2ME applications. It also uncovers all common device limitations and quirks, and explains how these can be...

Shell Scripting Recipes: A Problem-Solution Approach (Expert's Voice in Open Source)
Shell Scripting Recipes: A Problem-Solution Approach (Expert's Voice in Open Source)

In today’s IT environment, harried system administrators are finding themselves more overworked than ever. This book helps them regain some of the lost time spent creating and testing shell scripts, and guides readers through more than 150 much-needed and practical real-world examples.

Because all scripts found in this book are...

unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy