Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Java EE 7 Development with WildFly
Java EE 7 Development with WildFly

Leverage the power of the WildFly application server from JBoss to develop modern Java EE 7 applications

About This Book

  • Develop Java EE 7 applications using the WildFly platform
  • Discover how to manage your WildFly production environment
  • A step-by-step tutorial guide to...
The Official (ISC)2 Guide to the CCSP CBK
The Official (ISC)2 Guide to the CCSP CBK

Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)the CCSP credential is the ideal way to match marketability and credibility to your cloud security skill set. The Official (ISC)2 Guide to the CCSPSM CBK Second Edition is your ticket for expert...

Requirements Management Using IBM(R) Rational(R) RequisitePro(R)
Requirements Management Using IBM(R) Rational(R) RequisitePro(R)
Optimize Your Entire Requirements Process–and Use Requirements to Build More Successful Software

 

Using IBM® Rational® RequisitePro®, you can systematically improve the way you create and maintain requirements–and use those requirements to build...

Computer Systems: A Programmer's Perspective (2nd Edition)
Computer Systems: A Programmer's Perspective (2nd Edition)

This book (CS:APP) is for computer scientists, computer engineers, and others

who want to be able to write better programs by learning what is going on “under the hood” of a computer system.

Our aim is to explain the enduring concepts underlying all
...
Google Visualization API Essentials
Google Visualization API Essentials

Make sense of your data: make it visual with the Google Visualization API

Overview

  • Wrangle all sorts of data into a visual format, without being an expert programmer.
  • Visualize new or existing spreadsheet data through charts, graphs, and maps.
  • Full of diagrams, core concept...
Mastering AutoCAD 2019 and AutoCAD LT 2019
Mastering AutoCAD 2019 and AutoCAD LT 2019

The world’s favorite guide to everything AutoCAD and AutoCAD LT—updated for 2019!

Mastering AutoCAD 2019 and AutoCAD LT 2019 is the world’s all-time best-selling guide to the world’s most popular drafting software. Packed with tips, tricks, techniques, and tutorials, this guide covers every...

wxPython Recipes: A Problem - Solution Approach
wxPython Recipes: A Problem - Solution Approach

Quickly discover solutions to common problems, learn best practices, and understand everything wxPython has to offer. This book is for anyone wanting to learn more about how to use the wxPython desktop GUI toolkit. It assumes some prior knowledge of Python and a general understanding of wxPython or GUI development, and contains more than 50...

Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a

Do you want to learn ethical hacking/ penetration testing but not sure where to begin? Does the amount of information on the web make you feel overwhelmed and confused? Or maybe your looking to start a career as an ethical hacker and want to further your skills? How about step by step, methodical, literally foolproof approaches to be...

Introduction to AutoCAD 2008: 2D and 3D Design
Introduction to AutoCAD 2008: 2D and 3D Design
Master the art of 2D and 3D technical drawing with Alf Yarwood's comprehensive and highly practical introductory guide

Taking the reader step-by-step through the features of AutoCAD, Alf Yarwood provides a practical, structured course of work matched to the latest release of this software. After
...
Deep Belief Nets in C++ and CUDA C: Volume 1: Restricted Boltzmann Machines and Supervised Feedforward Networks
Deep Belief Nets in C++ and CUDA C: Volume 1: Restricted Boltzmann Machines and Supervised Feedforward Networks
Discover the essential building blocks of the most common forms of deep belief networks. At each step this book provides intuitive motivation, a summary of the most important equations relevant to the topic, and concludes with highly commented code for threaded computation on modern CPUs as well as massive parallel processing on computers...
Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response
Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response

Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and systematic analysis and investigation of the attack is conducted to...

Programming Spiders, Bots, and Aggregators in Java
Programming Spiders, Bots, and Aggregators in Java
The content and services available on the web continue to be accessed mostly through direct human control. But this is changing. Increasingly, users rely on automated agents that save them time and effort by programmatically retrieving content, performing complex interactions, and aggregating data from diverse sources. Programming Spiders,...
Result Page: 468 467 466 465 464 463 462 461 460 459 458 457 456 455 454 453 452 451 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy