Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Accumulo: Application Development, Table Design, and Best Practices
Accumulo: Application Development, Table Design, and Best Practices

Get up to speed on Apache Accumulo, the flexible, high-performance key/value store created by the National Security Agency (Nsa) and based on Google’s BigTable data storage system. Written by former Nsa team members, this comprehensive tutorial and reference covers Accumulo architecture, application development, table design,...

ASP.NET MVC 4 Recipes: A Problem-Solution Approach (The Expert's Voice in .Net)
ASP.NET MVC 4 Recipes: A Problem-Solution Approach (The Expert's Voice in .Net)

ASP.NET MVC 4 Recipes is a practical guide for developers creating modern web applications, cutting through the complexities of ASP.NET, jQuery, Knockout.js and HTML 5 to provide straightforward solutions to common web development problems using proven methods based on best practices. The problem-solution approach gets you in,...

PGP & GPG: Email for the Practical Paranoid
PGP & GPG: Email for the Practical Paranoid
"...The World's first user-friendly book on email privacy...unless you're a cryptographer, or never use email, you should read this book." —Len Sassaman, CodeCon Founder

"Today, most email is sent like a postcard. We all should want to put our mail back into secure envelopes again. PGP and GPG are two of the leading tools...

Instant Kali Linux
Instant Kali Linux

Kali Linux is currently the de-facto standard operating system of the security industry. It acts as a Swiss army knife and is a one-stop solution to most of the problems faced by security professionals. The availability of different open source and free tools under a single banner makes it easy and quick while dealing with security...

The Most Important Thing: Discovering Truth at the Heart of Life
The Most Important Thing: Discovering Truth at the Heart of Life

From esteemed teacher Adyashanti, a collection of writings on the search for the ultimate reality beneath the narrative of our lives

"Our inner lives are every bit as astonishing, baffling, and mysterious as the infinite vastness of the cosmos." ?Adyashanti

We all define
...

IBM Lotus Sametime 8 Essentials: A User's Guide
IBM Lotus Sametime 8 Essentials: A User's Guide

IBM Lotus Sametime software allows you to collaborate and communicate with others in real time. By using Sametime, you can communicate with your peers and teammates with the Sametime Connect client, embedded Sametime integration with Lotus Notes or Microsoft Outlook e-mail, or on mobile devices like a Blackberry. You will be able to connect...

Client-Server Web Apps with JavaScript and Java
Client-Server Web Apps with JavaScript and Java

As a Java programmer, how can you tackle the disruptive client-server approach to web development? With this comprehensive guide, you’ll learn how today’s client-side technologies and web APIs work with various Java tools. Author Casimir Saternos provides the big picture of client-server development, and then takes you...

Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python

Become a master at penetration testing using machine learning with Python

Key Features

  • Identify ambiguities and breach intelligent security systems
  • Perform unique cyber attacks to breach robust systems
  • Learn to leverage machine learning algorithms
  • ...
Foundation Website Creation with HTML5, CSS3, and JavaScript
Foundation Website Creation with HTML5, CSS3, and JavaScript

Foundation Website Creation with HTML5, CSS3, and JavaScript shows the entire process of building a website. This process involves much more than just technical knowledge, and this book provides all the information you'll need to understand the concepts behind designing and developing for the Web, as well as the best means...

802.11 Wireless Networks: The Definitive Guide, Second Edition
802.11 Wireless Networks: The Definitive Guide, Second Edition

As we all know by now, wireless networks offer many advantages over fixed (or wired) networks. Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you...

IT Auditing: Using Controls to Protect Information Assets
IT Auditing: Using Controls to Protect Information Assets

Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and...

.NET Wireless Programming
.NET Wireless Programming

Microsoft’s .NET strategy embraces a vision for integrating diverse elements of computing technology and data services. The wireless Internet and mobile devices are core components of that strategy. Visual Studio .NET includes a powerful set of toolsthe Mobile Internet Toolkitfor developing websites and applications...

unlimited object storage image
Result Page: 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy