Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Pro Spring Boot 2: An Authoritative Guide to Building Microservices, Web and Enterprise Applications, and Best Practices
Pro Spring Boot 2: An Authoritative Guide to Building Microservices, Web and Enterprise Applications, and Best Practices

Quickly and productively develop complex Spring applications and microservices out of the box, with minimal concern over things like configurations. This revised book will show you how to fully leverage the Spring Boot 2 technology and how to apply it to create enterprise ready applications that just work.  It will also cover...

Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

Secure Information Management Using Linguistic Threshold Approach (Advanced Information and Knowledge Processing)
Secure Information Management Using Linguistic Threshold Approach (Advanced Information and Knowledge Processing)

In recent years, cryptographic techniques for protecting and hiding secret information have been included in directions of research on intelligent information management. Data can be managed securely due to the use of algorithms for ensuring the confidentiality of data, information splitting techniques as well as protocols for sharing...

The Pragmatist's Guide to Corporate Lean Strategy: Incorporating Lean Startup and Lean Enterprise Practices in Your Business
The Pragmatist's Guide to Corporate Lean Strategy: Incorporating Lean Startup and Lean Enterprise Practices in Your Business
Use this practical, step-by-step guide on lean agile strategy to harness technological disruption at your large business to successfully advance your business rather than suffer a loss of business. The lean agile enterprise concept is demystified and translated into action as the author shares his experience with both success and major...
Broadband Access Networks: Technologies and Deployments (Optical Networks)
Broadband Access Networks: Technologies and Deployments (Optical Networks)

Considering the key evolutions within the access network technologies as well as the unprecedented levels of bandwidth demands by end users, this book condenses the relentless research, design, and deployment experience of state-of-the-art access networks. Furthermore, it shares the critical steps and details of the developments and deployment...

Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions
Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions

A must-have, hands-on guide for working in the cybersecurity profession

Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This...

Intel Galileo and Intel Galileo Gen 2: API Features and Arduino Projects for Linux Programmers
Intel Galileo and Intel Galileo Gen 2: API Features and Arduino Projects for Linux Programmers

Intel® Galileo and Intel® Galileo Gen 2: API Features and Arduino Projects for Linux Programmers provides detailed information about Intel® Galileo and Intel® Galileo Gen 2 boards for all software developers interested in Arduino and the Linux platform. The book covers the new Arduino APIs and is an introduction for...

Complete Guide to Open Source Big Data Stack
Complete Guide to Open Source Big Data Stack

See a Mesos-based big data stack created and the components used. You will use currently available Apache full and incubating systems. The components are introduced by example and you learn how they work together.

In the Complete Guide to Open Source Big Data Stack, the author begins by creating a private...

Podcasting For Dummies (Computer/Tech)
Podcasting For Dummies (Computer/Tech)
New tools have made it easier to create a podcast. The second edition of Podcasting For Dummies shows you how you can create and distribute your own online recordings using tools you already have. This edition also covers what you need to build a top-notch podcasting studio. Expert podcasters Tee Morris and Evo Terra are joined on this edition by a...
Scrapbooking with Photoshop Elements: The Creative Cropping Cookbook
Scrapbooking with Photoshop Elements: The Creative Cropping Cookbook
Today's advancements in digital technology are transforming the traditional art of scrapbooking. With a computer, digital camera, scanner, ink-jet printer, and Photoshop Elements—Adobe's popular digital imaging software for home users—you have all the ingredients you need to create a truly astounding and unforgettable...
Filmmaking For Dummies (Career/Education)
Filmmaking For Dummies (Career/Education)
"I found Filmmaking For Dummies a thorough and informative read: a complete A to Z that demystifies not only production, but pre- and post- production as well. Stoller paints a picture of filmmaking so basic that you'd have to be not just a dummy but completely braindead if you're unable to make your own movie after closing the...
Trustworthy Compilers (Quantitative Software Engineering Series)
Trustworthy Compilers (Quantitative Software Engineering Series)

The Most Complete, Real-World Guide to Compiler

Development—and the Principles of Trustworthy Compilers

Drawing on the author's over thirty years of expertise in compiler development, research, and instruction, Trustworthy Compilers introduces and analyzes the concept of trustworthy compilers and the principles...

Result Page: 35 34 33 32 31 30 29 28 27 26 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy