|
|
|
|
|
Performance Analysis for Java WebsitesHow well a Web site performs while receiving heavy user traffic is an essential factor in an organization's overall success. How can you be sure your site will hold up under pressure?
Performance Analysis for Java(TM) Web Sites is an information-packed guide to... | | Time Management for System Administrators
Time is a precious commodity, especially if you're a system administrator. No other job pulls people in so many directions at once. Users interrupt you constantly with requests, preventing you from getting anything done. Your managers want you to get long-term projects done but flood you with requests for quick-fixes that... | | Node Web Development - Second Edition
Node.js is a JavaScript platform using an event-driven, non-blocking I/O model allowing users to build fast and scalable data-intensive applications that run in real time.
This book gives you an excellent starting point and goes straight to the heart of developing web applications with Node.js. You will go from a rudimentary... |
|
Getting Started with PhantomJS
Harness the strength and capabilities of PhantomJS to interact with the web and perform website testing with a headless browser based on WebKit
Overview
-
Writing scripts that can interact directly with web services and pages
-
Interacting with social media websites using PhantomJS scripts
... | | Understanding the Linux KernelIn order to thoroughly understand what makes Linux tick and why it works so well on a wide variety of systems, you need to delve deep into the heart of the kernel. The kernel handles all interactions between the CPU and the external world, and determines which programs will share processor time, in what order. It manages limited... | | Security Strategy: From Requirements to Reality
Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and... |
|
|
|
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 |