Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Secret Recipes of the Python Ninja: Over 70 recipes that uncover powerful programming tactics in Python
Secret Recipes of the Python Ninja: Over 70 recipes that uncover powerful programming tactics in Python

Test your Python programming skills by solving real-world problems

Key Features

  • Access built-in documentation tools and improve your code.
  • Discover how to make the best use of decorator and generator functions
  • Enhance speed and improve concurrency by...
Design Patterns in Modern C++: Reusable Approaches for Object-Oriented Software Design
Design Patterns in Modern C++: Reusable Approaches for Object-Oriented Software Design
Apply modern C++17 to the implementations of classic design patterns. As well as covering traditional design patterns, this book fleshes out new patterns and approaches that will be useful to C++ developers. The author presents concepts as a fun investigation of how problems can be solved in different ways, along the way using varying...
UX Fundamentals for Non-UX Professionals: User Experience Principles for Managers, Writers, Designers, and Developers
UX Fundamentals for Non-UX Professionals: User Experience Principles for Managers, Writers, Designers, and Developers
What can a WWII-era tank teach us about design? What does a small, blue flower tell us about audiences? What do drunk, French marathon-runners show us about software? In 40+ chapters and stories, you will learn the ways in which UX has influenced history and vice versa, and how it continues to change our daily lives. ...
Bad Programming Practices 101: Become a Better Coder by Learning How (Not) to Program
Bad Programming Practices 101: Become a Better Coder by Learning How (Not) to Program
This book takes a humorous slant on the programming practice manual by reversing the usual approach: under the pretence of teaching you how to become the world’s worst programmer who generally causes chaos, the book teaches you how to avoid the kind of bad habits that introduce bugs or cause code contributions to be rejected....
Pro JavaFX 9: A Definitive Guide to Building Desktop, Mobile, and Embedded Java Clients
Pro JavaFX 9: A Definitive Guide to Building Desktop, Mobile, and Embedded Java Clients

At the annual JavaOne conference in May 2007, Sun Microsystems announced a new product family named JavaFX. Its stated purpose includes enabling the development and deployment of content-rich applications on consumer devices such as cell phones, televisions, in-dash car systems, and browsers. Josh Marinacci, a software engineer at Sun, made...

Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer
Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer

Leverage the power of Hyperledger Fabric to develop Blockchain-based distributed ledgers with ease

Key Features

  • Write your own chaincode/smart contracts using Golang on hyperledger network
  • Build and deploy decentralized applications (DApps)
  • Dive into real...
Network Analysis Using Wireshark 2 Cookbook: Practical recipes to analyze and secure your network using Wireshark 2, 2nd Edition
Network Analysis Using Wireshark 2 Cookbook: Practical recipes to analyze and secure your network using Wireshark 2, 2nd Edition

Over 100 recipes to analyze and troubleshoot network problems using Wireshark 2

Key Features

  • Place Wireshark 2 in your network and configure it for effective network analysis
  • Deep dive into the enhanced functionalities of Wireshark 2 and protect your network with ease
  • ...
Keras Reinforcement Learning Projects: 9 projects exploring popular reinforcement learning techniques to build self-learning agents
Keras Reinforcement Learning Projects: 9 projects exploring popular reinforcement learning techniques to build self-learning agents

A practical guide to mastering reinforcement learning algorithms using Keras

Key Features

  • Build projects across robotics, gaming, and finance fields, putting reinforcement learning (RL) into action
  • Get to grips with Keras and practice on real-world unstructured...
Introducing the MySQL 8 Document Store
Introducing the MySQL 8 Document Store
NoSQL has been given a lot of hype in recent years. As with most new technologies, the underlying principles are rarely truly new, rather, it is the unique combination of known technologies that forms and transforms the whole to become more than the sum of its parts. This is especially true for MySQL 8 and the new MySQL Document...
R Deep Learning Projects: Master the techniques to design and develop neural network models in R
R Deep Learning Projects: Master the techniques to design and develop neural network models in R

5 real-world projects to help you master deep learning concepts

Key Features

  • Master the different deep learning paradigms and build real-world projects related to text generation, sentiment analysis, fraud detection, and more
  • Get to grips with R's impressive range of...
Microsoft Azure Cosmos DB Revealed: A Multi-Model Database Designed for the Cloud
Microsoft Azure Cosmos DB Revealed: A Multi-Model Database Designed for the Cloud
The database space has been greatly dominated by relational database management systems (or RDBMSs) such as Microsoft® SQL Server or Oracle. This dominance was made possible in part by the wide range of solutions that can be built on top of those systems but also because of the powerful products that are available. There is,...
Building Serverless Microservices in Python: A complete guide to building, testing, and deploying microservices using serverless computing on AWS
Building Serverless Microservices in Python: A complete guide to building, testing, and deploying microservices using serverless computing on AWS

A practical guide for developing end-to-end serverless microservices in Python for developers, DevOps, and architects.

Key Features

  • Create a secure, cost-effective, and scalable serverless data API
  • Use identity management and authentication for a user-specific and secure...
Result Page: 104 103 102 101 100 99 98 97 96 95 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy