Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Nginx High Performance
Nginx High Performance

Optimize NGINX for high-performance, scalable web applications

About This Book

  • Configure Nginx for best performance, with configuration examples and explanations
  • Step–by-step tutorials for performance testing using open source software
  • Tune the TCP stack to make the...
IBM Cognos 8 Business Intelligence: The Official Guide
IBM Cognos 8 Business Intelligence: The Official Guide

The Only Authorized Guide to IBM Cognos 8 Business Intelligence

Develop, deploy, and maintain a complete BI solution across your enterprise. IBM Cognos 8 Business Intelligence: The Official Guide shows you how to take full advantage of the robust service-oriented architecture and simplified role-based user...

Security Metrics: Replacing Fear, Uncertainty, and Doubt
Security Metrics: Replacing Fear, Uncertainty, and Doubt
The Definitive Guide to Quantifying, Classifying, and Measuring Enterprise IT Security Operations

 

Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise....

Radar Cross Section, 2nd Edition (Scitech Radar and Defense)
Radar Cross Section, 2nd Edition (Scitech Radar and Defense)
This is the second edition of the first and foremost book on this subject for self-study, training, and course work. Radar cross section (RCS) is a comparison of two radar signal strengths. One is the strength of the radar beam sweeping over a target, the other is the strength of the reflected echo sensed by the receiver. This book shows how the...
Going Stealth: Transgender Politics and U.S. Surveillance Practices
Going Stealth: Transgender Politics and U.S. Surveillance Practices
In Going Stealth Toby Beauchamp demonstrates how the enforcement of gender conformity is linked to state surveillance practices that identify threats based on racial, gender, national, and ableist categories of difference. Positioning surveillance as central to our understanding of transgender politics, Beauchamp examines a...
Computer Vision with Maker Tech: Detecting People With a Raspberry Pi, a Thermal Camera, and Machine Learning
Computer Vision with Maker Tech: Detecting People With a Raspberry Pi, a Thermal Camera, and Machine Learning

Harness the untapped potential of combining a decentralized Internet of Things (IoT) with the ability to make predictions on real-world fuzzy data. This book covers the theory behind machine learning models and shows you how to program and assemble a voice-controlled security.

You’ll learn the differences between...

Critical Chain Project Management (Artech House Professional Development Library)
Critical Chain Project Management (Artech House Professional Development Library)
Plan and manage projects that yield successful results all the time in half the time you?re used to with this new guide. Providing the theory, tools and techniques you need to implement critical chain project management in your organization, you learn how to reduce stress on a project team, eliminate cost and scheduling over-runs, effectively...
The Fuzzy Systems Handbook: A Practitioner's Guide to Building, Using, and Maintaining Fuzzy Systems/Book and Disk
The Fuzzy Systems Handbook: A Practitioner's Guide to Building, Using, and Maintaining Fuzzy Systems/Book and Disk
My 1965 paper on fuzzy sets was motivated in large measure by the conviction that traditional methods of systems analysis are unsuited for dealing with systems in which relations between variables do not lend themselves to representation in terms of differential or difference equations. Such systems are the norm in biology, sociology, economics...
Enterprise Cloud Computing: Technology, Architecture, Applications
Enterprise Cloud Computing: Technology, Architecture, Applications

In today’s world virtually all available information on any technical topic is just a few clicks away on the web. This is especially true of an emerging area such as cloud computing. So why write a book, and, who should read this book and why?

Every few years a new ‘buzzword’ becomes the rage of the...

Manager's Guide to Business Planning (Briefcase Books)
Manager's Guide to Business Planning (Briefcase Books)

Get the business results you want by creating and executing a solid plan!

One simple thing usually makes the difference between business success and failure: a well-laid plan. Whether you want to enact a long-term strategic initiative or set short-term revenue targets, Manager’s Guide to Business...

SELinux System Administration
SELinux System Administration

NSA Security-Enhanced Linux (SELinux) is a set of patches and added utilities to the Linux kernel to incorporate a strong, flexible, mandatory access control architecture into the major subsystems of the kernel. With its fine-grained yet flexible approach, it is no wonder Linux distributions are firing up SELinux as a default security...

Bayesian Argumentation: The practical side of probability (Synthese Library)
Bayesian Argumentation: The practical side of probability (Synthese Library)

Relevant to, and drawing from, a range of disciplines, the chapters in this collection show the diversity, and applicability, of research in Bayesian argumentation. Together, they form a challenge to philosophers versed in both the use and criticism of Bayesian models who have largely overlooked their potential in argumentation. Selected from...

unlimited object storage image
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy