Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learn Bitcoin and Blockchain: Understanding blockchain and Bitcoin architecture to build decentralized applications
Learn Bitcoin and Blockchain: Understanding blockchain and Bitcoin architecture to build decentralized applications

Get up and running with the fundamentals of Bitcoin and blockchain

Key Features

  • Learn quick, effective, and easy ways to master blockchain and Bitcoin
  • Understand the impact of decentralization and discover ways to tackle it
  • Explore the future of Bitcoin...
Rapid Java Persistence and Microservices: Persistence Made Easy Using Java EE8, JPA and Spring
Rapid Java Persistence and Microservices: Persistence Made Easy Using Java EE8, JPA and Spring
Gain all the essentials you need to create scalable microservices, which will help you solve real challenges when deploying services into production. This book will take you through creating a scalable data layer with polygot persistence. You’ll cover data access and query patterns in Spring and JPA in high-performance...
Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Develop, validate, and deploy powerful decentralized applications using blockchain 


Get the most out of cutting-edge blockchain technology using the hands-on information contained in this comprehensive resource. Written by a team of technology and legal experts, Blockchain:...
Essential C# 6.0 (5th Edition) (Addison-Wesley Microsoft Technology)
Essential C# 6.0 (5th Edition) (Addison-Wesley Microsoft Technology)

“Welcome to one of the greatest collaborations you could dream of in the world of C# books—and probably far beyond!”

—From the Foreword by Mads Torgersen, C# Program Manager, Microsoft

...

Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems

One of the most mysterious areas of information security is industrial system security.
No other area of information security contains that many myths, mistakes, misconceptions
and outright lies. Information available online, while voluminous, will
only lead information security professionals and industrial systems
...

Understanding Big Data: Analytics for Enterprise Class Hadoop and Streaming Data
Understanding Big Data: Analytics for Enterprise Class Hadoop and Streaming Data

Big Data represents a new era in data exploration and utilization, and IBM is uniquely positioned to help clients navigate this transformation. This book reveals how IBM is leveraging open source Big Data technology, infused with IBM technologies, to deliver a robust, secure, highly available, enterprise-class Big Data platform.

...
Machine Learning and Robot Perception (Studies in Computational Intelligence)
Machine Learning and Robot Perception (Studies in Computational Intelligence)
This book presents some of the most recent research results in the area of machine learning and robot perception. The book contains eight chapters.

Relevant progress has been done, within the Robotics field, in mechanical systems, actuators, control and planning. This fact, allows a wide application of industrial robots, where
...
Simple Steps to Data Encryption: A Practical Guide to Secure Computing
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who...

Securing SCADA Systems
Securing SCADA Systems
How to secure systems that weren't built for security

Worldwide, critical economic and governmental infrastructures have evolved into complex networks that facilitate communication, cost reduction, and efficiency. But the very features that create such benefits make these supervisory control and data acquisition, or SCADA, systems a security...

RESTful Java Web Services - Second Edition
RESTful Java Web Services - Second Edition

Design scalable and robust RESTful web services with JAX-RS and Jersey extension APIs

About This Book

  • Get to grips with the portable Java APIs used for JSON processing
  • Design solutions to produce, consume, and visualize RESTful web services using WADL, RAML, and Swagger
  • A...
Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Meet the world's top ethical hackers and explore the tools of the trade

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat...

Building an e-Commerce Application with MEAN
Building an e-Commerce Application with MEAN

Develop an end-to-end, real-time e-commerce application using the MEAN stack

About This Book

  • Build all the main components of an e-commerce website and extend its high-quality features as per your needs
  • Get to grips with the full-stack JavaScript to build attractive e-commerce sites and...
Result Page: 130 129 128 127 126 125 124 123 122 121 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy