Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
RabbitMQ Cookbook
RabbitMQ Cookbook

Knowing a reliable enterprise messaging system based on the AMQP standard can be an essential for today’s software developers. This cookbook helps you learn all the basics of RabbitMQ through recipes, code, and real-life examples.

Overview

  • Create scalable distributed applications with RabbitMQ
  • ...
Vaccinia Virus and Poxvirology: Methods and Protocols (Methods in Molecular Biology)
Vaccinia Virus and Poxvirology: Methods and Protocols (Methods in Molecular Biology)

A comprehensive collection of cutting-edge methods to study and work with the vaccinia virus and other poxvirus gene transcriptions. These readily reproducible techniques can be used for the construction and characterization of recombinant viruses; for the study of poxvirus gene transcription and DNA replication; for the investigation of the...

CCNA Practical Studies
CCNA Practical Studies

Understanding the concepts covered on the Cisco Certified Network Associate exam is no longer sufficient to succeed on the test. With the release of CCNA exam #640-607, Cisco has introduced performance-based testing elements to measure your ability to perform hands-on tasks in a time critical environment. In order to be completely prepared...

Learning Python Networking: A complete guide to build and deploy strong networking capabilities using Python 3.7 and Ansible , 2nd Edition
Learning Python Networking: A complete guide to build and deploy strong networking capabilities using Python 3.7 and Ansible , 2nd Edition

Achieve improved network programmability and automation by leveraging powerful network programming concepts, algorithms, and tools

Key Features

  • Deal with remote network servers using SSH, FTP, SNMP and LDAP protocols.
  • Design multi threaded and event-driven architectures...
Herpes Simplex Virus: Methods and Protocols (Methods in Molecular Biology)
Herpes Simplex Virus: Methods and Protocols (Methods in Molecular Biology)
This second edition volume expands on the previous edition with a discussion of new and updated methods used to study the Herpes Simplex Virus (HSV), along with a look at the latest developing technologies such as next generation sequencing, CRISPR/Cas9 engineering, and the use of BioID to identify protein-protein interactions....
Security in Ad-hoc and Sensor Networks (Computer and Network Security)
Security in Ad-hoc and Sensor Networks (Computer and Network Security)

Ad hoc and sensor networks continue to have a growing impact on communication. These cost-effective wireless networks provide location independent computing in environments ranging from military battlefields to in-home patient monitoring systems. However, having real-time connectivity to critical information over an open...

LDAP Directories Explained: An Introduction and Analysis
LDAP Directories Explained: An Introduction and Analysis

Directory technology promises to solve the problem of decentralized information that has arisen with the explosion of distributed computing. Lightweight Directory Access Protocol (LDAP) is a set of protocols that has become the Internet standard for accessing information directories. Until now, however, those curious about...

Designing Solutions With Com+ Technologies
Designing Solutions With Com+ Technologies

If you were hoping the recent announcements about the Microsoft .NET Framework would prevent you from having to learn the COM+ programming development model, you will be disappointed.

COM+ has gone through many evolutions since the introduction of OLE technology in the early releases of Microsoft Windows. The alphabet soup of OLE,...

Foundations of Python Network Programming
Foundations of Python Network Programming

Foundations of Python Network Programming, Third Edition, covers all of the classic topics found in the second edition of this book, including network protocols, network data and errors, email, server architecture, and HTTP and web applications, plus updates for Python 3.

Some of the new topics in this edition...

Twisted Network Programming Essentials
Twisted Network Programming Essentials

Twisted Network Programming Essentials from O'Reilly is a task-oriented look at this new open source, Python-based technology. The book begins with recommendations for various plug-ins and add-ons to enhance the basic package as installed. It then details Twisted's collection simple network...

Real 802.11 Security: Wi-Fi Protected Access and 802.11i
Real 802.11 Security: Wi-Fi Protected Access and 802.11i

"Real 802.11 Security provides clear descriptions of current and emerging security techniques. The authors handle complex topics nicely, and offer significant clarification of IEEE draft standards."
-Russ Housley, IETF Security Area Director and founder of Vigil Security, LLC

"This...

Mobile and Web Messaging: Messaging Protocols for Web and Mobile Devices
Mobile and Web Messaging: Messaging Protocols for Web and Mobile Devices

Learn how to use messaging technologies to build responsive and resilient applications for mobile devices and web browsers. With this hands-on guide, you’ll use the Stomp and Mqtt messaging protocols to write iOs and web applications capable of sending and receiving Gps and device sensor data, text messages, and alerts.

...
unlimited object storage image
Result Page: 98 97 96 95 94 93 92 91 90 89 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy