Linux Server Security: Hack and Defend
Learn how to attack and defend the world’s most popular web server platform
Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server...
The Data Warehouse ETL Toolkit: Practical Techniques for Extracting, Cleanin
The Extract-Transform-Load (ETL) system is the foundation of the data
warehouse. A properly designed ETL system extracts data from the source
systems, enforces data quality and consistency standards, conforms data
so that separate sources can be used together, and finally delivers data
in a presentation-ready format so that...
Content Networking in the Mobile Internet
A cutting-edge guide to the next generation Mobile Internet architecture and applications
The last several years have witnessed dramatic changes in the wireless Web interface environment, specifically in the way that content is stored, distributed, and checked for consistency while leveraging location awareness. This phenomenon is...
|Result Page: 310 309 308 307 306 305 304 303 302 301 |