Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Effective Java
Effective Java

The Definitive Guide to Java Platform Best Practices–Updated for Java 7, 8, and 9

 

Java has changed dramatically since the previous edition of Effective Java was published shortly after the release of Java 6. This Jolt...

Database Benchmarking and Stress Testing: An Evidence-Based Approach to Decisions on Architecture and Technology
Database Benchmarking and Stress Testing: An Evidence-Based Approach to Decisions on Architecture and Technology
Provide evidence-based answers that can be measured and relied upon by your business. Database administrators will be able to make sound architectural decisions in a fast-changing landscape of virtualized servers and container-based solutions based on the empirical method presented in this book for answering “what if”...
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring...
Software Architect's Handbook: Become a successful software architect by implementing effective architecture concepts
Software Architect's Handbook: Become a successful software architect by implementing effective architecture concepts

A comprehensive guide to exploring software architecture concepts and implementing best practices

Key Features

  • Enhance your skills to grow your career as a software architect
  • Design efficient software architectures using patterns and best practices
  • Learn...
The Linux Philosophy for SysAdmins: And Everyone Who Wants To Be One
The Linux Philosophy for SysAdmins: And Everyone Who Wants To Be One

Reveals and illustrates the awesome power and flexibility of the command line, and the design and usage philosophies that support those traits. This understanding of how to extract the most from the Linux command line can help you become a better SysAdmin. Understand why many things in the Linux and Unix worlds are done as...

Machine Learning Algorithms: Popular algorithms for data science and machine learning, 2nd Edition
Machine Learning Algorithms: Popular algorithms for data science and machine learning, 2nd Edition

An easy-to-follow, step-by-step guide for getting to grips with the real-world application of machine learning algorithms

Key Features

  • Explore statistics and complex mathematics for data-intensive applications
  • Discover new developments in EM algorithm, PCA, and bayesian...
Docker on Windows: From 101 to production with Docker on Windows, 2nd Edition
Docker on Windows: From 101 to production with Docker on Windows, 2nd Edition

Learn how to run new and old applications in Docker containers on Windows - modernizing the architecture, improving security and maximizing efficiency.

Key Features

  • Run .NET Framework and .NET Core apps in Docker containers for efficiency, security and portability
  • Design...
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents

Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support.

Surviving an incident, or a...

MySQL Connector/Python Revealed: SQL and NoSQL Data Storage Using MySQL for Python Programmers
MySQL Connector/Python Revealed: SQL and NoSQL Data Storage Using MySQL for Python Programmers
Move data back and forth between database and application. The must-have knowledge in this book helps programmers learn how to use the official driver, MySQL Connector/Python, by which Python programs communicate with the MySQL database. 

This book takes you from the initial installation of the connector through
...
TensorFlow Machine Learning Cookbook: Over 60 recipes to build intelligent machine learning systems with the power of Python, 2nd Edition
TensorFlow Machine Learning Cookbook: Over 60 recipes to build intelligent machine learning systems with the power of Python, 2nd Edition

Skip the theory and get the most out of Tensorflow to build production-ready machine learning models

Key Features

  • Exploit the features of Tensorflow to build and deploy machine learning models
  • Train neural networks to tackle real-world problems in Computer Vision and...
Cloud-Native Applications in Java: Build microservice-based cloud-native applications that dynamically scale
Cloud-Native Applications in Java: Build microservice-based cloud-native applications that dynamically scale

Highly available microservice-based web apps for Cloud with Java

Key Features

  • Take advantage of the simplicity of Spring to build a full-fledged application
  • Let your applications run faster while generating smaller cloud service bills
  • Integrate your...
Network Analysis Using Wireshark 2 Cookbook: Practical recipes to analyze and secure your network using Wireshark 2, 2nd Edition
Network Analysis Using Wireshark 2 Cookbook: Practical recipes to analyze and secure your network using Wireshark 2, 2nd Edition

Over 100 recipes to analyze and troubleshoot network problems using Wireshark 2

Key Features

  • Place Wireshark 2 in your network and configure it for effective network analysis
  • Deep dive into the enhanced functionalities of Wireshark 2 and protect your network with ease
  • ...
Result Page: 322 321 320 319 318 317 316 315 314 313 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy