Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
IoT, AI, and Blockchain for .NET: Building a Next-Generation Application from the Ground Up
IoT, AI, and Blockchain for .NET: Building a Next-Generation Application from the Ground Up
Create applications using Industry 4.0. Discover how artificial intelligence (AI) and machine learning (ML) capabilities can be enhanced using the Internet of things (IoT) and secured using Blockchain, so your latest app can be not just smarter but also more connected and more secure than ever before. This book covers the latest...
Oracle 12c: SQL
Oracle 12c: SQL

Now you can master the latest version of the fundamental SQL language used in all relational databases today with ORACLE 12C: SQL, 3E. Much more than a study guide, this edition helps you transform a basic knowledge of databases into proficiency with the latest SQL and Oracle concepts and techniques. You learn to use Oracle 12c SQL most...

Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the...

The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that...
ATDD by Example: A Practical Guide to Acceptance Test-Driven Development
ATDD by Example: A Practical Guide to Acceptance Test-Driven Development
There is a curious symmetry to the way this book presents Acceptance Test- Driven Development and the way software is developed with ATDD. Just as there is an art to picking the specific examples of program behavior that will elicit the correct general behavior for the system, there is an art to picking specific examples of a...
Lonely Planet Discover Egypt (Country Guide)
Lonely Planet Discover Egypt (Country Guide)

Experience The Best of Egypt
The Pyramids of Giza, Siwa Oasis, Luxor Museum – we’ve selected the most iconic sights and incredible places so you can enjoy the real Egypt with the minimum of fuss.

Highlights reveal the must-see attractions and unbeatable experiences
Itineraries
...

Securing the Cloud: Cloud Computer Security Techniques and Tactics
Securing the Cloud: Cloud Computer Security Techniques and Tactics

This book will prove to be a practical resource for anyone who is considering using, building, or securing a cloud implementation. Security professionals may refer to this book as a source of detailed information for evaluating and verifying cloud security policy and requirements. Cloud infrastructure engineers, cloud services...

Book Yourself Solid Illustrated: The Fastest, Easiest, and Most Reliable System for Getting More Clients Than You Can Handle Even if You Hate Marketing and Selling
Book Yourself Solid Illustrated: The Fastest, Easiest, and Most Reliable System for Getting More Clients Than You Can Handle Even if You Hate Marketing and Selling

A visual way to easily access the strategies and tactics in Book Yourself Solid

Learning new concepts is easier when you can see the solution. Book Yourself Solid Illustrated, a remarkable, one-of-a-kind work of art, transforms the Book Yourself Solid system into a more compelling and...

Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges
Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges
Peer-to-peer computing, at least on a conceptual level, is a genuine paradigm shift—intelligence is at the edge, computing is completely decentralized, and the network is just there to knit the distributed intelligence together. Indeed, with advancements in hardware technology, proliferation of the open source development...
Great Big Agile: An OS for Agile Leaders
Great Big Agile: An OS for Agile Leaders
Big Agile leaders need an empirical, "high-trust" model that provides guidance for scaling and sustaining agility and capability throughout a modern technology organization. This book presents the Agile Performance Holarchy (APH)?a "how-ability" model that provides agile leaders and teams with an operating system to...
Intrusion Detection in Wireless Ad-Hoc Networks
Intrusion Detection in Wireless Ad-Hoc Networks

Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including...

Managing Trust in Cyberspace
Managing Trust in Cyberspace

In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis...

Result Page: 32 31 30 29 28 27 26 25 24 23 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy