“Computing Networks” explores the core of the new distributed computing infrastructures we are using today: the networking systems of clusters, grids and clouds. It helps network designers and distributed-application developers and users to better understand the technologies, specificities, constraints and benefits of these...
The Spring Framework is a widely adopted enterprise and general Java framework. The release of Spring Framework 3.0 has added many improvements and new features for Spring development. Written by Gary Mak of the best-selling Spring Recipes and Josh Long, an expert Spring user and developer, Spring...
Get your mountain of data under control with Hadoop. This guide requires no prior knowledge of the software or cloud services - just a willingness to learn the basics from this practical step-by-step tutorial.
Overview
Learn tools and techniques that let you approach big data with relish and not...
Plan how to build a better app, grow it into a business, and earn money from your hard work using Firebase. In this book, Laurence Moroney, Staff Developer Advocate at Google, takes you through each of the 15 Firebase technologies, showing you how to use them with concrete examples. You’ll see how to build cross-platform...
The book constitutes the refereed proceedings of the 13th EAI International Conference on Communications and Networking, held in October 2018 in Chengdu, China. The 71 papers presented were carefully selected from 114 submissions. The papers are organized in topical sections on wireless communications and networking, next...
Written for the IT professional and business owner, this book provides the business and technical insight necessary to migrate your business to the cloud using Microsoft Office 365. This is a practical look at cloud migration and the use of different technologies to support that migration. Numerous examples of cloud migration with technical...
The first edition of this book used the Bukkit modding server and library, which was taken down due to a legal dispute in September 2014. This new edition has been completely revised to replace Bukkit with the CanaryMod library.
The bestselling, kid-tested book for Minecraft is now updated for CanaryMod! Write your own...
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...