Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
TypeScript Revealed
TypeScript Revealed

TypeScript Revealed is a quick 100-page guide to Anders Hejlsberg's new take on JavaScript. With this brief, fast-paced introduction to TypeScript, .NET, Web and Windows 8 application developers who are already familiar with JavaScript will easily get up to speed with TypeScript and decide whether or not to start incorporating it...

Data Mining: Practical Machine Learning Tools and Techniques, Second Edition
Data Mining: Practical Machine Learning Tools and Techniques, Second Edition
This book presents this new discipline in a very accessible form: both as a text to train the next generation of practitioners and researchers, and to inform lifelong learners like myself. Witten and Frank have a passion for simple and elegant solutions. They approach each topic with this mindset, grounding all concepts in concrete examples,...
CISA Certified Information Systems Auditor Study Guide
CISA Certified Information Systems Auditor Study Guide

The industry-leading study guide for the CISA exam, fully updated

More than 27,000 IT professionals take the Certified Information Systems Auditor exam each year. SC Magazine lists the CISA as the top certification for security professionals. Compliances, regulations, and best practices for IS auditing are updated...

Docker Orchestration
Docker Orchestration

Key Features

  • Explore the new features added to the core Docker Engine to make multi-container orchestration easy
  • Leverage tools such as Docker Machine, Swarm, Compose, and third-party tools such as Kubernetes, Mesosphere, and CoreOS to orchestrate containers
  • Use Docker Compose with Swarm and...
Essentials of Knowledge Management
Essentials of Knowledge Management
"Managing knowledge has become a critical competency for organizations. Despite its importance, knowledge management is often seen as a complex, diffuse, and difficult-to-understand management practice. In his new book, Essentials of Knowledge Management, Bryan Bergeron continues to display his remarkable ability to thoughtfully,...
Kubernetes Microservices with Docker
Kubernetes Microservices with Docker

Start using Kubernetes in complex big data and enterprise applications, including Docker containers. Starting with installing Kubernetes on a single node, the book introduces Kubernetes with a simple Hello example and discusses using environment variables in Kubernetes. 
 

Next, Kubernetes Microservices with...
The Compiler Design Handbook: Optimizations and Machine Code Generation, Second Edition
The Compiler Design Handbook: Optimizations and Machine Code Generation, Second Edition
Todays embedded devices and sensor networks are becoming more and more sophisticated, requiring more efficient and highly flexible compilers. Engineers are discovering that many of the compilers in use today are ill-suited to meet the demands of more advanced computer architectures.

Updated to include the latest techniques, The
...
Domain-Driven Design Using Naked Objects
Domain-Driven Design Using Naked Objects

Domain-driven design (DDD) focuses on what matters in enterprise applications: the core business domain. Using object-oriented principles, you can develop a domain model that all team members-including business experts and technical specialists-can understand. Even better, this model is directly related to the underlying...

Exploring C++ 11 (Expert's Voice in C++)
Exploring C++ 11 (Expert's Voice in C++)

Exploring C++ divides C++ up into bite-sized chunks that will help you learn the language one step at a time. Assuming no familiarity with C++, or any other C-based language, you’ll be taught everything you need to know in a logical progression of small lessons that you can work through as quickly or as slowly as you need.

...
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Develop blockchain application with step-by-step instructions, working example and helpful recommendations

Key Features

  • Understanding the blockchain technology from the cybersecurity perspective
  • Developing cyber security solutions with Ethereum blockchain technology
  • ...
The Compiler Design Handbook: Optimizations & Machine Code Generation
The Compiler Design Handbook: Optimizations & Machine Code Generation

In the last few years, changes have had a profound influence on the problems addressed by compiler designers. First, the proliferation in machine architectures has necessitated the fine-tuning of compiler back ends to exploit features such as multiple memory banks, pipelines and clustered architectures. These features provide potential for...

One Giant Leap: The Impossible Mission That Flew Us to the Moon
One Giant Leap: The Impossible Mission That Flew Us to the Moon
The remarkable story of the trailblazers and the ordinary Americans on the front lines of the epic mission to reach the moon.

President John F. Kennedy astonished the world on May 25, 1961, when he announced to Congress that the United States should land a man on the Moon by 1970. No group was more surprised than the
...
Result Page: 341 340 339 338 337 336 335 334 333 332 331 330 329 328 327 326 325 324 323 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy