Title: Event Streams in Action: Real-time event systems with Kafka and Kinesis, Author: Valentin Crettaz
Title: Modellbasierte Softwareentwicklung für eingebettete Systeme verstehen und anwenden, Author: Tim Weilkiens
Title: Learn Selenium: Build data-driven test frameworks for mobile and web applications with Selenium Web Driver 3, Author: Unmesh Gundecha
Title: Kubernetes dlya DevOps: razvertyvanie, zapusk i masshtabirovanie v oblake, Author: Pol Meyson
Title: Write Great Code, Volume 3: Engineering Software, Author: Randall Hyde
Title: Collaborative Software Design: How to facilitate domain modeling decisions, Author: Evelyn van Kelle
Title: Design Patterns and Best Practices in Java: A comprehensive guide to building smart and reusable code in Java, Author: Kamalmeet Singh
Title: Lead Developer Career Guide, Author: Shelley Benhoff
Title: Design of Design, The: Essays from a Computer Scientist, Author: Frederick Brooks Jr.
Title: Developing Information Systems: Practical guidance for IT professionals, Author: Tahir Ahmed
Title: Expert Python Programming: Become a master in Python by learning coding best practices and advanced programming concepts in Python 3.7, Author: Michal Jaworski
Title: The Business Analysts's Handbook, Author: Howard Podeswa
Title: Simplifying Hybrid Cloud Adoption with AWS: Realize edge computing and build compelling hybrid solutions on premises with AWS Outposts, Author: Frankie Costa Negro
Title: Odoo 10 Implementation Cookbook: Comprehensive tasks covering Odoo 10 in the right way, Author: Mantavya Gajjar
Title: Becoming a Rockstar SRE: Electrify your site reliability engineering mindset to build reliable, resilient, and efficient systems, Author: Jeremy Proffitt
Title: System Design Guide for Software Professionals: Build scalable solutions - from fundamental concepts to cracking top tech company interviews, Author: Dhirendra Sinha
Title: Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition: Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition presents wireless pentesting from the ground up, and has been updated with the latest methodologies, includin, Author: Cameron Buchanan

Pagination Links