Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Pro Spring Boot 2: An Authoritative Guide to Building Microservices, Web and Enterprise Applications, and Best Practices
Pro Spring Boot 2: An Authoritative Guide to Building Microservices, Web and Enterprise Applications, and Best Practices

Quickly and productively develop complex Spring applications and microservices out of the box, with minimal concern over things like configurations. This revised book will show you how to fully leverage the Spring Boot 2 technology and how to apply it to create enterprise ready applications that just work.  It will also cover...

Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.
Key Features
  • Intelligence processes and procedures for response mechanisms
  • Master F3EAD to drive processes based on intelligence
  • Threat modeling and intelligent frameworks
  • ...
Python and AWS Cookbook
Python and AWS Cookbook

If you intend to use Amazon Web Services (AWS) for remote computing and storage, Python is an ideal programming language for developing applications and controlling your cloud-based infrastructure. This cookbook gets you started with more than two dozen recipes for using Python with AWS, based on the author’s boto library.

...
Business Intelligence with SQL Server Reporting Services
Business Intelligence with SQL Server Reporting Services

Business Intelligence with SQL Server Reporting Services helps you deliver business intelligence with panache. Harness the power of the Reporting Services toolkit to combine charts, gauges, sparklines, indicators, and maps into compelling dashboards and scorecards. Create compelling visualizations that seize your audience’s...

Nonlinear Distortion in Wireless Systems: Modeling and Simulation with MATLAB
Nonlinear Distortion in Wireless Systems: Modeling and Simulation with MATLAB
This book covers the principles of modeling and simulation of nonlinear distortion in wireless communication systems with MATLAB simulations and techniques

In this book, the author describes the principles of modeling and simulation of nonlinear distortion in single and multichannel wireless communication systems using both...

Information Security Science: Measuring the Vulnerability to Data Compromises
Information Security Science: Measuring the Vulnerability to Data Compromises

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically...

Learning Heroku Postgres
Learning Heroku Postgres

Efficiently design, implement, and manage a successful PostgreSQL database with Heroku

About This Book

  • Manage and optimize your PostgreSQL database with Heroku Postgres
  • Secure your database with rollback, followers and forks functionalities
  • A step-by-step tutorial with...
Java Unit Testing with JUnit 5: Test Driven Development with JUnit 5
Java Unit Testing with JUnit 5: Test Driven Development with JUnit 5
Explore the new way of building and maintaining test cases with Java test driven development (TDD) using JUnit 5. This book doesn't just talk about the new concepts, it shows you ways of applying them in TDD and Java 8 to continuously deliver code that excels in all metrics. 


Unit testing...
Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps
Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps

Protect your organization's security at all levels by introducing the latest strategies for securing DevOps

Key Features

  • Integrate security at each layer of the DevOps pipeline
  • Discover security practices to protect your cloud services by detecting fraud and...
Memory Allocation Problems in Embedded Systems: Optimization Methods (ISTE)
Memory Allocation Problems in Embedded Systems: Optimization Methods (ISTE)

Embedded systems are everywhere in contemporary life and are supposed to make our lives more comfortable. In industry, embedded systems are used to manage and control complex systems (e.g. nuclear power plants, telecommunications and flight control) and they are also taking an important place in our daily activities (e.g. smartphones,...

Software Metrics and Software Metrology
Software Metrics and Software Metrology

Most of the software measures currently proposed to the industry bring few real benefits to either software managers or developers. This book looks at the classical metrology concepts from science and engineering, using them as criteria to propose an approach to analyze the design of current software measures and then design new software...

Dynamic Oracle Performance Analytics: Using Normalized Metrics to Improve Database Speed
Dynamic Oracle Performance Analytics: Using Normalized Metrics to Improve Database Speed
In the practice of performance tuning, change is inevitable. New techniques are created; old ones are updated. The volume of metrics, especially those contained in Oracle’s Automatic Workload Repository (AWR), is multiplying almost daily. Despite the autonomous database, monitoring tools, and other similar tools, the level...
Result Page: 28 27 26 25 24 23 22 21 20 19 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy