Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Rapid Java Persistence and Microservices: Persistence Made Easy Using Java EE8, JPA and Spring
Rapid Java Persistence and Microservices: Persistence Made Easy Using Java EE8, JPA and Spring
Gain all the essentials you need to create scalable microservices, which will help you solve real challenges when deploying services into production. This book will take you through creating a scalable data layer with polygot persistence. You’ll cover data access and query patterns in Spring and JPA in high-performance...
Characterization of Minerals, Metals, and Materials 2019 (The Minerals, Metals & Materials Series)
Characterization of Minerals, Metals, and Materials 2019 (The Minerals, Metals & Materials Series)
The interrelationships among composition, structure, property, process, and per formance of a material is the fundamental for materials research, development, manufacturing, and application. Materials characterization is the key to reveal these relationships throughout the entire circulation process of materials, from...
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Unsupervised Learning with R
Unsupervised Learning with R

Work with over 40 packages to draw inferences from complex datasets and find hidden patterns in raw unstructured data

About This Book

  • Unlock and discover how to tackle clusters of raw data through practical examples in R
  • Explore your data and create your own models from scratch
  • ...
Beginning Python Visualization: Crafting Visual Transformation Scripts
Beginning Python Visualization: Crafting Visual Transformation Scripts

We are visual animals. But before we can see the world in its true splendor, our brains, just like our computers, have to sort and organize raw data, and then transform that data to produce new images of the world. Beginning Python Visualization: Crafting Visual Transformation Scripts, Second Edition discusses turning many types of...

Java 11 and 12 – New Features: Learn about Project Amber and the latest developments in the Java language and platform
Java 11 and 12 – New Features: Learn about Project Amber and the latest developments in the Java language and platform

Enhance your development skills with Java's state-of-the-art features and projects to make your applications leaner and faster

Key Features

  • Overcome the challenges involved in migrating to new versions of Java
  • Discover how Oracle has bridged the gap between Java and...
SQL Primer: An Accelerated Introduction to SQL Basics
SQL Primer: An Accelerated Introduction to SQL Basics

Modern society is driven by data. Whether it is at a personal level, like a notebook containing scribbled notes; or at a countrywide level like Census data, it has permeated all our workflows. There is always a growing need to efficiently store and organize it so that meaningful information can be extracted out of raw data.

A
...

Quantum Cryptography and Secret-Key Distillation
Quantum Cryptography and Secret-Key Distillation
This book aims at giving an introduction to the principles and techniques of quantum cryptography, including secret-key distillation, as well as some more advanced topics. As quantum cryptography is now becoming a practical reality with products available commercially, it is important to focus not only on the theory of quantum...
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...

Digital Photography: Expert Techniques
Digital Photography: Expert Techniques

Ready to take digital imaging to the professional level? This advanced strategy book offers expert advice to help you become more competent in your work routine, but it is not your ordinary workflow book. Through step-by-step procedures based on hard-nosed experience, professional photographer Ken Milburn covers much more...

Hands-On Oracle Application Express Security: Building Secure Apex Applications
Hands-On Oracle Application Express Security: Building Secure Apex Applications
AT RECX we’ve been involved in the world of IT Security for more than a decade. We were involved in some of the fi rst penetration tests performed in the UK, where large organizations and government departments allowed ethical hackers into their networks to determine the risk they faced from what are now known as cyber attacks....
The Career Programmer: Guerilla Tactics for an Imperfect World (Expert's Voice)
The Career Programmer: Guerilla Tactics for an Imperfect World (Expert's Voice)

The crucial wisdom-guide to surviving within the programming industry in 2006. Provides raw material for surviving and thinking smart in today's industry. Delivered with the wit and aplomb to make a serious topic entertaining and palatable

TE Conquer Master self-defense techniques to shield yourself, your project,...

Result Page: 28 27 26 25 24 23 22 21 20 19 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy