Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
How to Kill the Scrum Monster: Quick Start to Agile Scrum Methodology and the Scrum Master Role
How to Kill the Scrum Monster: Quick Start to Agile Scrum Methodology and the Scrum Master Role

Implement Scrum or improve how Scrum works in your team or organization using this concise, sharp, and programmatic book. You will quickly learn what you need to know without getting confused with unnecessary details.

What You'll Learn

  • Become familiar with Agile concepts and understand...
Python Interviews: Discussions with Python Experts
Python Interviews: Discussions with Python Experts

Mike Driscoll takes you on a journey talking to a hall-of-fame list of truly remarkable Python experts. You'll be inspired every time by their passion for the Python language, as they share with you their experiences, contributions, and careers in Python.

Key Features

  • Hear from these...
Java 9 Dependency Injection: Write loosely coupled code with Spring 5 and Guice
Java 9 Dependency Injection: Write loosely coupled code with Spring 5 and Guice

Create clean code with Dependency Injection principles

Key Features

  • Use DI to make your code loosely coupled to manage and test your applications easily on Spring 5 and Google Guice
  • Learn the best practices and methodologies to implement DI
  • Write more...
Qt 5 Projects: Develop cross-platform applications with modern UIs using the powerful Qt framework
Qt 5 Projects: Develop cross-platform applications with modern UIs using the powerful Qt framework

Design, build, and deploy powerful applications with amazing user interfaces on embedded, mobile, and desktop platforms

Key Features

  • Easily compile, run, and debug your applications from the powerful Qt Creator IDE
  • Future-proof your applications with Qt Test and modern...
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents

Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support.

Surviving an incident, or a...

Internet of Things for Architects: Architecting IoT solutions by implementing sensors, communication infrastructure, edge computing, analytics, and security
Internet of Things for Architects: Architecting IoT solutions by implementing sensors, communication infrastructure, edge computing, analytics, and security

Learn to design, implement and secure your IoT infrastructure

Key Features

  • Build a complete IoT system that is the best fit for your organization
  • Learn about different concepts, technologies, and tradeoffs in the IoT architectural stack
  • Understand the...
Clean Code in Python: Refactor your legacy code base
Clean Code in Python: Refactor your legacy code base

Getting the most out of Python to improve your codebase

Key Features

  • Save maintenance costs by learning to fix your legacy codebase
  • Learn the principles and techniques of refactoring
  • Apply microservices to your legacy systems by implementing practical...
Veracity of Big Data: Machine Learning and Other Approaches to Verifying Truthfulness
Veracity of Big Data: Machine Learning and Other Approaches to Verifying Truthfulness
Examine the problem of maintaining the quality of big data and discover novel solutions. You will learn the four V’s of big data, including veracity, and study the problem from various angles. The solutions discussed are drawn from diverse areas of engineering and math, including machine learning, statistics, formal methods, and...
Reinforcement Learning with TensorFlow: A beginner's guide to designing self-learning systems with TensorFlow and OpenAI Gym
Reinforcement Learning with TensorFlow: A beginner's guide to designing self-learning systems with TensorFlow and OpenAI Gym

Leverage the power of reinforcement learning techniques to develop self-learning systems using TensorFlow

Key Features

  • Explore reinforcement learning concepts and their implementation using TensorFlow
  • Discover different problem-solving methods for reinforcement...
API Development: A Practical Guide for Business Implementation Success
API Development: A Practical Guide for Business Implementation Success

Implement application programming interface (API) usability, security, availability, reliability, and scalability to extend your company’s market and potentially generate revenue. Businesses know they need to extend their markets into the digital world, and expose internal data to the Internet. This book shows how stakeholders...

Pro PowerShell Desired State Configuration: An In-Depth Guide to Windows PowerShell DSC
Pro PowerShell Desired State Configuration: An In-Depth Guide to Windows PowerShell DSC

Use Windows PowerShell Desired State Configuration (DSC) to configure your infrastructure on-premises and in the cloud. In an environment where changes and deployments are happening all the time, DSC makes the necessary adjustments to the system so you don’t have to. Pro PowerShell Desired State Configuration shows...

Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Develop blockchain application with step-by-step instructions, working example and helpful recommendations

Key Features

  • Understanding the blockchain technology from the cybersecurity perspective
  • Developing cyber security solutions with Ethereum blockchain technology
  • ...
Result Page: 186 185 184 183 182 181 180 179 178 177 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy