Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Programming Persistent Memory: A Comprehensive Guide for Developers
Programming Persistent Memory: A Comprehensive Guide for Developers

Beginning and experienced programmers will use this comprehensive guide to persistent memory programming. You will understand how persistent memory brings together several new software/hardware requirements, and offers great promise for better performance and faster application startup times?a huge leap forward in byte-addressable...

Deployment of Microsoft Azure Cloud Solutions: A complete guide to cloud development using Microsoft Azure
Deployment of Microsoft Azure Cloud Solutions: A complete guide to cloud development using Microsoft Azure

Master all the important and tough decision-making aspects involved in architecting an Azure public cloud for your organization.

Key Features

  • Deploy Azure Active Directory and implement synchronization
  • Manage storage solutions with Azure network services
  • ...
Cloud Data Design, Orchestration, and Management Using Microsoft Azure: Master and Design a Solution Leveraging the Azure Data Platform
Cloud Data Design, Orchestration, and Management Using Microsoft Azure: Master and Design a Solution Leveraging the Azure Data Platform
Use Microsoft Azure to optimally design your data solutions and save time and money. Scenarios are presented covering analysis, design, integration, monitoring, and derivatives.

This book is about data and provides you with a wide range of possibilities to implement a data solution on Azure, from hybrid cloud to PaaS
...
Good Manufacturing Practices for Pharmaceuticals, Seventh Edition (Drugs and the Pharmaceutical Sciences)
Good Manufacturing Practices for Pharmaceuticals, Seventh Edition (Drugs and the Pharmaceutical Sciences)

This book provides insight into the world of pharmaceutical quality systems and the key elements that must be in place to change the business and organizational dynamics from task-oriented procedure-based cultures to truly integrated quality business systems that are self-detecting and correcting. Chapter flow has been changed to...

Data Breaches: Crisis and Opportunity
Data Breaches: Crisis and Opportunity
Protect Your Organization Against Massive Data Breaches and Their Consequences

Data breaches can be catastrophic, but they remain mysterious because victims don’t want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines a light on these events,
...
Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack
Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack

Secure public and private cloud workloads with this comprehensive learning guide.

Key Features

  • Take your cloud security functions to the next level by automation
  • Learn to automate your security functions on AWS and OpenStack
  • Practical approach towards...
Practical API Architecture and Development with Azure and AWS: Design and Implementation of APIs for the Cloud
Practical API Architecture and Development with Azure and AWS: Design and Implementation of APIs for the Cloud
Learn the business and technical importance of API design and architecture using the available cloud services from Azure and AWS.

This book starts off with an introduction to APIs and the concept of API Economy from a business and organizational perspective. You'll decide on a sustainable API strategy and API
...
The Definitive Guide to AWS Infrastructure Automation: Craft Infrastructure-as-Code Solutions
The Definitive Guide to AWS Infrastructure Automation: Craft Infrastructure-as-Code Solutions

Discover the pillars of AWS infrastructure automation, starting with API-driven infrastructure concepts and its immediate benefits such as increased agility, automation of the infrastructure life cycle, and flexibility in experimenting with new architectures. With this base established, the book discusses infrastructure-as-code...

Securing SQL Server: DBAs Defending the Database
Securing SQL Server: DBAs Defending the Database
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database enterprise. This new edition covers threat analysis, common attacks and countermeasures, and provides an introduction to compliance that is useful for meeting regulatory requirements such as the GDPR. The...
Hands-On Functional Programming in Rust: Build modular and reactive applications with functional programming techniques in Rust 2018
Hands-On Functional Programming in Rust: Build modular and reactive applications with functional programming techniques in Rust 2018

Explore the support Rust offers for creating functional applications in Rust. Learn about various design patterns, implementing concurrency, metaprogramming, and so on in the process

Key Features

  • Learn generics, organization, and design patterns in functional programming
  • ...
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
The only official study guide for the new CCSP exam

(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you...

Writing Effective Use Cases
Writing Effective Use Cases
Writing use cases as a means of capturing the behavioral requirements of software systems and business processes is a practice that is quickly gaining popularity. Use cases provide a beneficial means of project planning because they clearly show how people will ultimately use the system being designed. On the surface, use cases appear to be a...
Result Page: 166 165 164 163 162 161 160 159 158 157 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy