Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Kubernetes on Azure: Run your applications securely and at scale on the most widely adopted orchestration platform
Hands-On Kubernetes on Azure: Run your applications securely and at scale on the most widely adopted orchestration platform

Efficiently deploy and manage Kubernetes clusters on a cloud

Key Features

  • Deploy highly scalable applications with Kubernetes on Azure
  • Leverage AKS to deploy, manage, and operations of Kubernetes
  • Gain best practices from this guide to increase efficiency...
The Art of Error Correcting Coding
The Art of Error Correcting Coding
Building on the success of the first edition, which offered a practical introductory approach to the techniques of error concealment, this book, now fully revised and updated, provides a comprehensive treatment of the subject and includes a wealth of additional features. The Art of Error Correcting Coding, Second Edition explores...
IBM DB2 9.7 Advanced Application Developer Cookbook
IBM DB2 9.7 Advanced Application Developer Cookbook
Welcome to the DB2 9.7 Advanced Application Developer Cookbook. DB2 9.7 is a truly incredible database product from IBM, which offers an excellent mix of application performance, reliability, and ease of development enablement. In this cookbook, you can find both: hands-on and real world practical application development examples, as well...
Embedded Linux Projects Using Yocto Project Cookbook
Embedded Linux Projects Using Yocto Project Cookbook

Over 70 hands-on recipes for professional embedded Linux developers to optimize and boost their Yocto know-how

About This Book

  • Explore best practices for all embedded product development stages
  • Use what is quickly becoming the standard embedded Linux product builder framework, the Yocto...
Multihop Wireless Networks: Opportunistic Routing (Wireless Communications and Mobile Computing)
Multihop Wireless Networks: Opportunistic Routing (Wireless Communications and Mobile Computing)

This book provides an introduction to opportunistic routing an emerging technology designed to improve the packet forwarding reliability, network capacity and energy efficiency of multihop wireless networks

This book presents a comprehensive background to the technological challenges lying behind opportunistic routing. The...

Network Flow Analysis
Network Flow Analysis

You know that servers have log files and performance measuring tools and that traditional network devices have LEDs that blink when a port does something. You may have tools that tell you how busy an interface is, but mostly a network device is a black box. Network Flow Analysis opens that black box, demonstrating how to use...

Full-Stack Web Development with Vue.js and Node: Build scalable and powerful web apps with modern web stack: MongoDB, Vue, Node.js, and Express
Full-Stack Web Development with Vue.js and Node: Build scalable and powerful web apps with modern web stack: MongoDB, Vue, Node.js, and Express

Bring the frontend and backend together with Vue, Vuex, and Node.js

Key Features

  • Construct modern web applications with Node 10, Express.js, MongoDB, and Vue
  • Leverage the latest web standards to increase code performance, readability, and cross-compatibility
  • ...
Natural Computing: 4th International Workshop on Natural Computing
Natural Computing: 4th International Workshop on Natural Computing

The complex behavior of systems in nature is rooted in intricate mechanisms of interaction that often supersede human-made systems in terms of reliability, power efficiency, and computational capacity. Researchers have begun to realize that natural systems are a great source of inspiration for novel algorithms in computation and communication...

IEEE Recommended Practice for the Design of Reliable Industrial and Commercial Power Systems
IEEE Recommended Practice for the Design of Reliable Industrial and Commercial Power Systems
The design of reliable industrial and commercial power systems is of considerable interest to many people. Prior to 1962, a qualitative viewpoint was taken when attempting to achieve this objective. The need for a quantitative approach was first recognized in the early 1960s when a small group of pioneers led by W. H. Dickinson...
Risk and Interdependencies in Critical Infrastructures: A Guideline for Analysis (Springer Series in Reliability Engineering)
Risk and Interdependencies in Critical Infrastructures: A Guideline for Analysis (Springer Series in Reliability Engineering)

Today’s society is completely dependent on critical networks such as  water supply, sewage, electricity, ICT and transportation. Risk and vulnerability analyses are needed to grasp the impact of threats and hazards. However, these become quite complex as there are strong interdependencies both within and between infrastructure...

Solaris 8: The Complete Reference
Solaris 8: The Complete Reference
Clients often ask why we choose Solaris as an operating environment. Is it a decision based on price? Is it an attraction to the latest gizmo features, each with its own four-letter acronym? Do we have a cozy arrangement with Sun Microsystems to promote their operating system? The answer to each of these questions is no, no, NO!  ...
PC Hacks : 100 Industrial-Strength Tips &Tools
PC Hacks : 100 Industrial-Strength Tips &Tools
Covering both Windows and Linux, PC Hacks combines the bestselling Hacks series style with the world's most popular computing hardware. Hacks for enhancing performance and preventing problems with your PC include overclocking CPU and video cards, tweaking RAM timing, selecting the best performing components,...
Result Page: 52 51 50 49 48 47 46 45 44 43 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy