Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Rapid Java Persistence and Microservices: Persistence Made Easy Using Java EE8, JPA and Spring
Rapid Java Persistence and Microservices: Persistence Made Easy Using Java EE8, JPA and Spring
Gain all the essentials you need to create scalable microservices, which will help you solve real challenges when deploying services into production. This book will take you through creating a scalable data layer with polygot persistence. You’ll cover data access and query patterns in Spring and JPA in high-performance...
Hands-On System Programming with Go: Build modern and concurrent applications for Unix and Linux systems using Golang
Hands-On System Programming with Go: Build modern and concurrent applications for Unix and Linux systems using Golang

Explore the fundamentals of systems programming starting from kernel API and filesystem to network programming and process communications

Key Features

  • Learn how to write Unix and Linux system code in Golang v1.12
  • Perform inter-process communication using pipes, message...
Reactive Design Patterns
Reactive Design Patterns

Summary

Reactive Design Patterns is a clearly written guide for building message-driven distributed systems that are resilient, responsive, and elastic. In this book you'll find patterns for messaging, flow control, resource management, and concurrency, along with practical issues like test-friendly...

Simple Steps to Data Encryption: A Practical Guide to Secure Computing
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who...

Practical Modern SCADA Protocols: DNP3, 60870.5 and Related Systems (IDC Technology)
Practical Modern SCADA Protocols: DNP3, 60870.5 and Related Systems (IDC Technology)
This is a comprehensive book covering the essentials of SCADA communication systems focusing on
DNP3 and the other new developments in this area. It commences with a brief review of the
fundamentals of SCADA systems hardware, software and the typical communications systems (such
as RS-232, RS-485, Ethernet and TCP/IP) that connect
...
Deploying Node.js
Deploying Node.js

Learn how to build, test, deploy, monitor, and maintain your Node.js applications at scale

About This Book

  • Gain comprehensive information on scaling Node.js both vertically and horizontally in the cloud and across virtual machines
  • Learn how to use Gulp, Mocha, Chai, PhantomJS, Git,...
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers

Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! 

After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère
...

100 SOA Questions: Asked and Answered
100 SOA Questions: Asked and Answered

100 SOA Questions brings together authoritative answers to the most crucial questions business, technical, and architectural decision-makers ask about SOA. It draws on the immense experience of two SOA experts who’ve participated in more than 100 SOA projects in the roles of architect, designer,...

How to Run Seminars and Workshops: Presentation Skills for Consultants, Trainers, Teachers, and Salespeople
How to Run Seminars and Workshops: Presentation Skills for Consultants, Trainers, Teachers, and Salespeople

Make your message stick with expert help from this classic trainer's resource

How to Run Seminars and Workshops is the classic guide for trainers and presenters in any industry. Packed with clear advice and real-world practicality, this book covers all aspects including planning, setup, delivery, coaching, and...

Cryptography Engineering: Design Principles and Practical Applications
Cryptography Engineering: Design Principles and Practical Applications

The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts.

Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the...

Programming Language Pragmatics, Second Edition
Programming Language Pragmatics, Second Edition
"Michael Scott's book could have been entitled: Why Programming Languages Work. It takes a fresh look at programming languages by bringing together ideas and techniques usually covered in disparate language design, compiler, computer architecture, and operating system courses. Its comprehensive and integrated presentation of language...
Windows Communication Foundation 4 Step by Step
Windows Communication Foundation 4 Step by Step

Microsoft Windows Communication Foundation (WCF), alongside Windows Workflow Foundation (WF) and Windows Presentation Foundation (WPF), has become part of the primary framework for building the next wave of business applications for the Microsoft Windows operating system. WCF provides the underpinning technology driving distributed solutions...

Result Page: 50 49 48 47 46 45 44 43 42 41 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy