Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Pro DevOps with Google Cloud Platform: With Docker, Jenkins, and Kubernetes
Pro DevOps with Google Cloud Platform: With Docker, Jenkins, and Kubernetes
Use DevOps principles with Google Cloud Platform (GCP) to develop applications and services. This book builds chapter by chapter to a complete real-life scenario, explaining how to build, monitor, and maintain a complete application using DevOps in practice.

Starting with core DevOps concepts, continuous...
Deep Learning for Computer Vision: Expert techniques to train advanced neural networks using TensorFlow and Keras
Deep Learning for Computer Vision: Expert techniques to train advanced neural networks using TensorFlow and Keras

Learn how to model and train advanced neural networks to implement a variety of Computer Vision tasks

Key Features

  • Train different kinds of deep learning model from scratch to solve specific problems in Computer Vision
  • Combine the power of Python, Keras, and TensorFlow to...
Cells and Robots: Modeling and Control of Large-Size Agent Populations (Springer Tracts in Advanced Robotics)
Cells and Robots: Modeling and Control of Large-Size Agent Populations (Springer Tracts in Advanced Robotics)
From the reviews:

"This interesting monograph is devoted to the study of multi-agent, populations of biological cells and robot teams. … The main objective of the approach is to provide solutions to the problem of how dynamics of an individual agent propagates to the population dynamics. … This original monograph has a wide...

Spring 2.5 Aspect Oriented Programming
Spring 2.5 Aspect Oriented Programming

Developing powerful web applications with clean, manageable code makes the maintenance process much easier. Aspect-Oriented Programming (AOP) is the easiest and quickest way to achieve such results. Spring is the only Java framework to offer AOP features. The combined power of Spring and AOP gives a powerful and flexible platform to develop and...

Remote Sensing Monitoring and Evaluation of Degraded Grassland in China: Accounting of Grassland Carbon Source and Carbon Sink (Springer Geography)
Remote Sensing Monitoring and Evaluation of Degraded Grassland in China: Accounting of Grassland Carbon Source and Carbon Sink (Springer Geography)
This book focuses on grassland ecosystem evaluation including vegetation coverage, net primary productivity, carbon sink accounting, and grassland degradation evaluation based on mutual data resource, ecosystem model simulation, remote sensing monitoring and driving mechanism exploration. It aims to provide a guide seeking to understand the...
Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer
Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer

Leverage the power of Hyperledger Fabric to develop Blockchain-based distributed ledgers with ease

Key Features

  • Write your own chaincode/smart contracts using Golang on hyperledger network
  • Build and deploy decentralized applications (DApps)
  • Dive into real...
MySQL 8 for Big Data: Effective data processing with MySQL 8, Hadoop, NoSQL APIs, and other Big Data tools
MySQL 8 for Big Data: Effective data processing with MySQL 8, Hadoop, NoSQL APIs, and other Big Data tools

Uncover the power of MySQL 8 for Big Data

About This Book

  • Combine the powers of MySQL and Hadoop to build a solid Big Data solution for your organization
  • Integrate MySQL with different NoSQL APIs and Big Data tools such as Apache Sqoop
  • A comprehensive guide with practical...
Software Testing using Visual Studio 2012
Software Testing using Visual Studio 2012

Testing is one of the main phases in the software development lifecycle. Managing the test scenarios, test cases, defects, and linking each one of these is bit of a challenge without using any tools. For frequently changing businesses, it is essential to address testing requirements by matching the pace of the business. This can only be...

CCIE Self-Study: CCIE Security Exam Certification Guide, Second Edition
CCIE Self-Study: CCIE Security Exam Certification Guide, Second Edition
The Cisco authorized self-study test preparation guide for CCIE Security 2.0 350-018 written exam The only official, Cisco endorsed study guide for the CCIE Security 2.0 written exam Includes best-of-breed self-assessment series features, including a CD-ROM test engine, "Do I Know This Already?" quizzes, topic lists/foundation...
Pro Data Backup and Recovery
Pro Data Backup and Recovery

Pro Data Backup and Recovery has come from the many views of people that I have interacted with during my career as a systems administrator, systems engineer, and consultant. This book is primarily geared toward the systems engineers and architects within an organization, but it will also be useful for the day-to-day functions of systems...

Big Data in Practice: How 45 Successful Companies Used Big Data Analytics to Deliver Extraordinary Results
Big Data in Practice: How 45 Successful Companies Used Big Data Analytics to Deliver Extraordinary Results

The best-selling author of Big Data is back, this time with a unique and in-depth insight into how specific companies use big data.

Big data is on the tip of everyone's tongue. Everyone understands its power and importance, but many fail to grasp the actionable steps and resources required to utilise it effectively. This...

Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Result Page: 22 21 20 19 18 17 16 15 14 13 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy