Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Software Architect's Handbook: Become a successful software architect by implementing effective architecture concepts
Software Architect's Handbook: Become a successful software architect by implementing effective architecture concepts

A comprehensive guide to exploring software architecture concepts and implementing best practices

Key Features

  • Enhance your skills to grow your career as a software architect
  • Design efficient software architectures using patterns and best practices
  • Learn...
Test-Driven Java Development - Second Edition: Invoke TDD principles for end-to-end application development
Test-Driven Java Development - Second Edition: Invoke TDD principles for end-to-end application development

This book will teach the concepts of test driven development in Java so you can build clean, maintainable and robust code

Key Features

  • Explore the most popular TDD tools and frameworks and become more proficient in building applications
  • Create applications with better code...
DevOps: Continuous Delivery, Integration, and Deployment with DevOps: Dive into the core DevOps strategies
DevOps: Continuous Delivery, Integration, and Deployment with DevOps: Dive into the core DevOps strategies

Explore the high-in demand core DevOps strategies with powerful DevOps tools such as Ansible, Jenkins, and Chef

Key Features

  • Get acquainted with methodologies and tools of the DevOps framework
  • Perform continuous integration, delivery, deployment, and monitoring using...
Statistical and Machine-Learning Data Mining: Techniques for Better Predictive Modeling and Analysis of Big Data, Second Edition
Statistical and Machine-Learning Data Mining: Techniques for Better Predictive Modeling and Analysis of Big Data, Second Edition

The second edition of a bestseller, Statistical and Machine-Learning Data Mining: Techniques for Better Predictive Modeling and Analysis of Big Data is still the only book, to date, to distinguish between statistical data mining and machine-learning data mining. The first edition, titled Statistical Modeling and...

Hands-On Continuous Integration and Delivery: Build and release quality software at scale with Jenkins, Travis CI, and CircleCI
Hands-On Continuous Integration and Delivery: Build and release quality software at scale with Jenkins, Travis CI, and CircleCI

Understand various tools and practices for building a continuous integration and delivery pipeline effectively

Key Features

  • Get up and running with the patterns of continuous integration
  • Learn Jenkins UI for developing plugins and build an effective Jenkins pipeline
  • ...
Maximum Likelihood Estimation and Inference: With Examples in R, SAS and ADMB
Maximum Likelihood Estimation and Inference: With Examples in R, SAS and ADMB
This book takes a fresh look at the popular and well-established method of maximum likelihood for statistical estimation and inference. It begins with an intuitive introduction to the concepts and background of likelihood, and moves through to the latest developments in maximum likelihood methodology, including general latent variable...
How to Conduct Behavioral Research over the Internet: A Beginner's Guide to HTML and CGI/Perl (Methodology in the Social Sciences)
How to Conduct Behavioral Research over the Internet: A Beginner's Guide to HTML and CGI/Perl (Methodology in the Social Sciences)
Requiring no prior knowledge of programming or web site design, this easy-to-follow, step-by-step guide helps professionals as well as students create interactive behavioral research instruments online. With this volume, anyone can learn to write programs in HTML and CGI/Perl that will enable them to take full advantage of all the...
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network

This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical...

Pixel Art for Game Developers
Pixel Art for Game Developers

Is the art for your video game taking too long to create? Learning to create Pixel Art may be the answer to your development troubles. Uncover the secrets to creating stunning graphics with Pixel Art for Game Developers. The premier how-to book on Pixel Art and Pixel Art software, it focuses on the universal principles of the...

Applied SOA: Service-Oriented Architecture and Design Strategies
Applied SOA: Service-Oriented Architecture and Design Strategies
You need more than theory to make SOA work.

You need this practical guide.

The challenge today's IT professionals face is not how to build a service. It's how to build a quality service, based on solid design principles and integrated into an architecture that enhances overall business...

Mastering Modern Web Penetration Testing
Mastering Modern Web Penetration Testing

Key Features

  • This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
  • Penetrate and secure your web application using various techniques
  • Get this comprehensive...
Objects, Components, and Frameworks with UML: The Catalysis(SM) Approach
Objects, Components, and Frameworks with UML: The Catalysis(SM) Approach

". . . We found Catalysis to be the first comprehensive object-oriented methodology to unify the concepts of objects, frameworks, and component technologies."
John McGehee, Senior Architect, Texas Instruments Works Project

Objects, Components, and Frameworks with UML: The Catalysis Approach is where you will...

Result Page: 80 79 78 77 76 75 74 73 72 71 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy