Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Database Benchmarking and Stress Testing: An Evidence-Based Approach to Decisions on Architecture and Technology
Database Benchmarking and Stress Testing: An Evidence-Based Approach to Decisions on Architecture and Technology
Provide evidence-based answers that can be measured and relied upon by your business. Database administrators will be able to make sound architectural decisions in a fast-changing landscape of virtualized servers and container-based solutions based on the empirical method presented in this book for answering “what if”...
Rust High Performance: Learn to skyrocket the performance of your Rust applications
Rust High Performance: Learn to skyrocket the performance of your Rust applications

Find bottlenecks, identify the proper algorithm to use, optimize performance, and create really efficient Rust applications

Key Features

  • Understand common performance pitfalls and improve the performance of your applications.
  • Get to grips with parallel programming and...
Fixing Bad UX Designs: Master proven approaches, tools, and techniques to make your user experience great again
Fixing Bad UX Designs: Master proven approaches, tools, and techniques to make your user experience great again

A practical guide filled with case studies and easy solutions to solve the most common user experience issues

Key Features

  • Understand and fix the pain points of a bad UX design to ensure greater customer satisfaction.
  • Correct UX issues at various stages of a UX Design with...
C++ High Performance: Boost and optimize the performance of your C++17 code
C++ High Performance: Boost and optimize the performance of your C++17 code

Write code that scales across CPU registers, multi-core, and machine clusters

Key Features

  • Explore concurrent programming in C++
  • Identify memory management problems
  • Use SIMD and STL containers for performance improvement

Book...

Information Security Science: Measuring the Vulnerability to Data Compromises
Information Security Science: Measuring the Vulnerability to Data Compromises

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically...

Software Design X-Rays: Fix Technical Debt with Behavioral Code Analysis
Software Design X-Rays: Fix Technical Debt with Behavioral Code Analysis

Are you working on a codebase where cost overruns, death marches, and heroic fights with legacy code monsters are the norm? Battle these adversaries with novel ways to identify and prioritize technical debt, based on behavioral data from how developers work with code. And that's just for starters. Because good code involves...

Performance Management: Integrating Strategy Execution, Methodologies, Risk, and Analytics
Performance Management: Integrating Strategy Execution, Methodologies, Risk, and Analytics

Praise for Praise for Performance Management: Integrating Strategy Execution, Methodologies, Risk, and Analytics

"A highly accessible collection of essays on contemporary thinking in performance management. Readers will get excellent overviews on the Balanced Scorecard, strategy maps, incentives, management...

The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)

Actionable guidance and expert perspective for real-world cybersecurity

The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world...

Data Mining: Concepts, Models, Methods, and Algorithms, Second Edition
Data Mining: Concepts, Models, Methods, and Algorithms, Second Edition
Now updated—the systematic introductory guide to modern analysis of large data sets

As data sets continue to grow in size and complexity, there has been an inevitable move towards indirect, automatic, and intelligent data analysis in which the analyst works via more complex and sophisticated software tools. This book...

Clojure High Performance Programming - Second Edition
Clojure High Performance Programming - Second Edition

Become an expert at writing fast and high performant code in Clojure 1.7.0

About This Book

  • Enhance code performance by using appropriate Clojure features
  • Improve the efficiency of applications and plan their deployment
  • A hands-on guide to designing Clojure programs to get...
Beginning ARKit for iPhone and iPad: Augmented Reality App Development for iOS
Beginning ARKit for iPhone and iPad: Augmented Reality App Development for iOS

Explore how to use ARKit to create iOS apps and learn the basics of augmented reality while diving into ARKit specific topics. This book reveals how augmented reality allows you to view the screen on an iOS device, aim the camera at a nearby scene, and view both the real items in that scene as well as a graphic image overlaid on to...

Effective Monitoring and Alerting: For Web Operations
Effective Monitoring and Alerting: For Web Operations

With this practical book, you’ll discover how to catch complications in your distributed system before they develop into costly problems. Based on his extensive experience in systems ops at large technology companies, author Slawek Ligus describes an effective data-driven approach for monitoring and alerting that enables you to...

Result Page: 21 20 19 18 17 16 15 14 13 12 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy