Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Docker Cookbook: Over 100 practical and insightful recipes to build distributed applications with Docker , 2nd Edition
Docker Cookbook: Over 100 practical and insightful recipes to build distributed applications with Docker , 2nd Edition

Leverage Docker to deploying software at scale

Key Features

  • Leverage practical examples to manage containers efficiently
  • Integrate with orchestration tools such as Kubernetes for controlled deployments
  • Learn to implement best practices on improving...
Build Supercomputers with Raspberry Pi 3
Build Supercomputers with Raspberry Pi 3

Key Features

  • Carlos R. Morrison from NASA will teach you to build a supercomputer with Raspberry Pi 3
  • Deepen your understanding of setting up host nodes, configuring networks, and automating mountable drives
  • Learn various math, physics, and engineering applications to solve complex...
Python in Practice: Create Better Programs Using Concurrency, Libraries, and Patterns (Developer's Library)
Python in Practice: Create Better Programs Using Concurrency, Libraries, and Patterns (Developer's Library)

Winner of the 2014 Jolt Award for "Best Book"

 

“Whether you are an experienced programmer or are starting your career, Python in Practice is full of valuable advice and example to help you improve your craft by thinking about...

Practical Raspberry Pi (Technology in Action)
Practical Raspberry Pi (Technology in Action)

Practical Raspberry Pi takes you quickly through the hardware and software basics of the Raspberry Pi. Author Brendan Horan then gets you started on a series of fun and practical projects, including a simple temperature sensor, a media center, a real-time clock, and even a security monitoring device, all of which require minimal...

AD HOC NETWORKS: Technologies and Protocols
AD HOC NETWORKS: Technologies and Protocols
Wireless mobile networks and devices are becoming increasingly popular as
they provide users access to information and communication anytime and anywhere.
Conventional wireless mobile communications are usually supported
by a wired fixed infrastructure. A mobile device would use a single-hop wireless
radio communication to
...
Policy-Based Network Management: Solutions for the Next Generation (The Morgan Kaufmann Series in Networking)
Policy-Based Network Management: Solutions for the Next Generation (The Morgan Kaufmann Series in Networking)
Policy-Based Network Management (PBNM) systems enable business rules and procedures to be translated into policies that configure and control the network and its services. Those who manage network systems are aware that this approach can benefit both network management as well as the development of applications that use network services; however,...
Queueing Theory with Applications to Packet Telecommunication
Queueing Theory with Applications to Packet Telecommunication
Soon after Samuel Morse’s telegraphing device led to a deployed electrical
telecommunications system in 1843, waiting lines began to form by those
wanting to use the system. At this writing queueing is still a significant factor in
designing and operating communications services, whether they are provided
over the Internet
...
Getting Your PhD: A Practical Insider's Guide (Survival Skills for Scholars)
Getting Your PhD: A Practical Insider's Guide (Survival Skills for Scholars)
Packed with practical advice on all aspects of the PhD process, new and continuing research students should find this book of great help.

Professor Malcolm Tight, Lancaster University, UK

How to get your Ph.D is an original study guide aimed at prospective and current postgraduate students, covering the process of
...

Botnets: The Killer Web App
Botnets: The Killer Web App
This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise!

The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world
...
Protocols and Architectures for Wireless Sensor Networks
Protocols and Architectures for Wireless Sensor Networks
Wireless sensor networks will revolutionise applications such as environmental monitoring, home automation, and logistics.

Protocols and Architectures for Wireless Sensor Networks provides a thorough description of the most important issues and questions that have to be addressed in a wireless sensor network....

Data Networks, IP and the Internet: Protocols, Design and Operation
Data Networks, IP and the Internet: Protocols, Design and Operation
Modern data networks are all based on the Internet or on IP (Internet Protocol). But many people remain confused by multiprotocol networks. How do all the protocols fit together? How do I build a network? What do all the components do? What sort of problems should I expect?

Data Networks, IP and the Internet is intended not only for...

TCP/IP Network Administration (3rd Edition; O'Reilly Networking)
TCP/IP Network Administration (3rd Edition; O'Reilly Networking)

The first edition of TCP/IP Network Administration was written in 1992. In the decade since, many things have changed, yet some things remain the same. TCP/IP is still the preeminent communications protocol for linking together diverse computer systems. It remains the basis of interoperable...

unlimited object storage image
Result Page: 190 189 188 187 186 185 184 183 182 181 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy