 |
|
|
 Getting Started with Istio Service Mesh: Manage Microservices in Kubernetes
Build an in-depth understanding of the Istio service mesh and see why a service mesh is required for a distributed application. This book covers the Istio architecture and its features using a hands-on approach with language-neutral examples. To get your Istio environment up and running, you will go through its setup and... |  |  Freedom and Evolution: Hierarchy in Nature, Society and Science
The book begins with familiar designs found all around and inside us (such as the ‘trees’ of river basins, human lungs, blood and city traffic). It then shows how all flow systems are driven by power from natural engines everywhere, and how they are endlessly shaped because of freedom. Finally, Professor Bejan explains ... |  |  Data Mining Tools for Malware Detection
Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop... |
|
|
|
Result Page: 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 |