Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Service-Oriented Crowdsourcing: Architecture, Protocols and Algorithms (SpringerBriefs in Computer Science)
Service-Oriented Crowdsourcing: Architecture, Protocols and Algorithms (SpringerBriefs in Computer Science)
At a fundamental level, service-oriented crowdsourcing applies the principles of service-oriented architecture (SOA) to the discovery, composition and selection of a scalable human workforce. Service-Oriented Crowdsourcing: Architecture, Protocols and Algorithms provides both an analysis of contemporary crowdsourcing systems, such as Amazon...
Unity 2018 Cookbook: Over 160 recipes to take your 2D and 3D game development to the next level, 3rd Edition
Unity 2018 Cookbook: Over 160 recipes to take your 2D and 3D game development to the next level, 3rd Edition

Develop quality game components and solve common gameplay problems with various game design patterns

Key Features

  • Become proficient at traditional 2D and 3D games and VR development
  • Build amazing interactive interfaces with Unity's UI system
  • Develop...
Pro RESTful APIs: Design, Build and Integrate with REST, JSON, XML and JAX-RS
Pro RESTful APIs: Design, Build and Integrate with REST, JSON, XML and JAX-RS

Discover the RESTful technologies, including REST, JSON, XML, JAX-RS web services, SOAP and more, for building today's microservices, big data applications, and web service applications.  This book is based on a course the Oracle-based author is teaching for UC Santa Cruz Silicon Valley which covers architecture, design best...

Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID

Protect your network with Snort: the high-performance, open source IDS

Snort gives network administrators an open source intrusion detection system that outperforms proprietary alternatives. Now, Rafeeq Ur Rehman explains and simplifies every aspect of deploying and managing Snort in your network. You'll discover how to monitor all...

Scala for Java Developers
Scala for Java Developers

Build reactive, scalable applications and integrate Java code with the power of Scala

Overview

  • Learn the syntax interactively to smoothly transition to Scala by reusing your Java code
  • Leverage the full power of modern web programming by building scalable and reactive applications
  • ...
Distributed .NET Programming in C#
Distributed .NET Programming in C#

This text describes how to use these new .NET technologies to build fast, scalable, and robust distributed applications, and answers the many questions about the .NET Remoting Framework.

  • Presents information using a style that has been tested while teaching professional developers
  • ...
Natural Language Annotation for Machine Learning
Natural Language Annotation for Machine Learning
This book is intended as a resource for people who are interested in using computers to help process natural language. A natural language refers to any language spoken by humans, either currently (e.g., English, Chinese, Spanish) or in the past (e.g., Latin, ancient Greek, Sanskrit). Annotation refers to the process...
Pro SharePoint 2010 Solution Development: Combining .NET, SharePoint, and Office
Pro SharePoint 2010 Solution Development: Combining .NET, SharePoint, and Office

This book takes a practical problem-solution approach to common business challenges. You’ll not only encounter interesting code samples, but also see how to combine these examples with the Microsoft collaboration platform’s services. The book’s solutions focus on using Visual Studio 2008 and its built-in Office development...

Murach's ADO.NET 4 Database Programming with C# 2010 (Murach: Training & Reference)
Murach's ADO.NET 4 Database Programming with C# 2010 (Murach: Training & Reference)

Now in its 4th Edition, this book shows C# developers how to use Visual Studio and ADO.NET to develop database applications the way the best professionals do. You'll learn how to:

  • quickly create Windows and web applications by dragging-and-dropping data controls in Visual Studio 2010
  • code your own...
XPath 2.0 Programmer's Reference (Programmer to Programmer)
XPath 2.0 Programmer's Reference (Programmer to Programmer)
From its origins as a sublanguage of XSLT, XPath has come into its own as a key element of XML. XPath 2.0 has emerged as a robust language twice the size of its predecessor, complex and capable of standing on its own.

This substantive volume, by the editor of the W3C® XSLT 2.0 specification, is the authoritative reference on XPath 2.0. It...

Mastering Modern Web Penetration Testing
Mastering Modern Web Penetration Testing

Key Features

  • This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
  • Penetrate and secure your web application using various techniques
  • Get this comprehensive...
Databases DeMYSTiFieD, 2nd Edition
Databases DeMYSTiFieD, 2nd Edition

Learning DATABASE fundamentals just got a whole lot EASIER!

Now you can design, build, and manage a fully functional database with ease. Thoroughly updated to cover the latest technologies and techniques, Databases Demystified, Second Edition gives you the hands-on help you need to get started.

Written in a...

Result Page: 124 123 122 121 120 119 118 117 116 115 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy