Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building Microservices with Go
Building Microservices with Go

Key Features

  • This short, concise, and practical guide is packed with real-world examples of building microservices with Go
  • It is easy to read and will benefit smaller teams who want to extend the functionality of their existing systems
  • Using this practical approach will save your money in...
Securing the Cloud: Cloud Computer Security Techniques and Tactics
Securing the Cloud: Cloud Computer Security Techniques and Tactics

This book will prove to be a practical resource for anyone who is considering using, building, or securing a cloud implementation. Security professionals may refer to this book as a source of detailed information for evaluating and verifying cloud security policy and requirements. Cloud infrastructure engineers, cloud services...

Building RESTful Web Services with Spring 5 - Second Edition: Leverage the power of Spring 5.0, Java SE 9, and Spring Boot 2.0
Building RESTful Web Services with Spring 5 - Second Edition: Leverage the power of Spring 5.0, Java SE 9, and Spring Boot 2.0

Find out how to implement the REST architecture to build resilient software in Java with the help of the Spring 5.0 framework.

Key Features

  • Follow best practices and explore techniques such as clustering and caching to achieve a reactive, scalable web service,
  • Leverage...
Finite Frames: Theory and Applications (Applied and Numerical Harmonic Analysis)
Finite Frames: Theory and Applications (Applied and Numerical Harmonic Analysis)

Hilbert space frames have long served as a valuable tool for signal and image processing due to their resilience to additive noise, quantization, and erasures, as well as their ability to capture valuable signal characteristics.  More recently, finite frame theory has grown into an important research topic in its own right, with a myriad...

Compressed Video Communications
Compressed Video Communications
Compressed Video Communications addresses the compression and transmission of coded video streams over mobile IP networks. By analysing a broad spectrum of compression techniques and error resilience algorithms this book provides realistic solutions to the problems of quality degradation and transmission error.

Features include:

...
Seven Concurrency Models in Seven Weeks: When Threads Unravel (The Pragmatic Programmers)
Seven Concurrency Models in Seven Weeks: When Threads Unravel (The Pragmatic Programmers)

Your software needs to leverage multiple cores, handle thousands of users and terabytes of data, and continue working in the face of both hardware and software failure. Concurrency and parallelism are the keys, and Seven Concurrency Models in Seven Weeks equips you for this new world. See how emerging technologies such as actors and...

ESD Basics: From Semiconductor Manufacturing to Product Use
ESD Basics: From Semiconductor Manufacturing to Product Use

Electrostatic discharge (ESD) continues to impact semiconductor manufacturing, semiconductor components and systems, as technologies scale from micro- to nano electronics. This book introduces the fundamentals of ESD, electrical overstress (EOS), electromagnetic interference (EMI), electromagnetic compatibility (EMC), and latchup, as well as...

Transforming Enterprise Cloud Services
Transforming Enterprise Cloud Services

Transforming Enterprise Cloud Services addresses the fundamental ideology of Cloud Services and how enterprises in commercial, federal, and defense industries can transform their current information technology and management models to adopt this new method. It goes beyond the mere description of service frameworks in relation to...

A Culture of Purpose: How to Choose the Right People and Make the Right People Choose You
A Culture of Purpose: How to Choose the Right People and Make the Right People Choose You

How innovative leaders create meaningful cultures that attract and retain top talent

Building a culture of purpose is one of the greatest challenges facing modern leaders, as today's best minds are looking for meaning, not just jobs. More than any other single factor, cultures of purpose power winning organizations,...

Citrix Access Suite 4 for Windows Server 2003: The Official Guide, Third Edition
Citrix Access Suite 4 for Windows Server 2003: The Official Guide, Third Edition
Build, secure, scale, and maintain Citrix on Windows

New and existing Citrix engineers will learn to design and deploy an enterprise-level server-based computing (SBC) environment on Windows Server 2003 using Citrix Access Suite 4.0. This official guide explains how to maximize the suite components to enable and...

Introducing Erlang
Introducing Erlang

If you’re new to Erlang, its functional style can seem difficult, but with help from this hands-on introduction, you’ll scale the learning curve and discover how enjoyable, powerful, and fun this language can be.

Author Simon St. Laurent shows you how to write simple Erlang programs by teaching you one basic...

Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011
Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011

These are the proceedings of TCC 2011, the 8th Theory of Cryptography Conference, which was held in Brown University, Providence, RI, during March 28–30, 2011. The conference was sponsored by the International Association for Cryptologic Research (IACR). The General Chair was Anna Lysyanskaya.

The Program Committee,...

Result Page: 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy