Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Big Data SMACK: A Guide to Apache Spark, Mesos, Akka, Cassandra, and Kafka
Big Data SMACK: A Guide to Apache Spark, Mesos, Akka, Cassandra, and Kafka

Learn how to integrate full-stack open source big data architecture and to choose the correct technology―Scala/Spark, Mesos, Akka, Cassandra, and Kafka―in every layer. 

Big data architecture is becoming a requirement for many different enterprises. So far, however, the focus has largely been on collecting,...

The Basics of Web Hacking: Tools and Techniques to Attack the Web
The Basics of Web Hacking: Tools and Techniques to Attack the Web

The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect...

Lymphoma (Methods in Molecular Medicine)
Lymphoma (Methods in Molecular Medicine)

A cutting-edge collection of readily reproducible molecular techniques to better understand, classify, and treat lymphoma. Among the highlights are methods to use immunoglobulin gene rearrangements as markers of clonality, to exploit patterns of somatic mutation in the variable regions to indicate at which stage transformation occurred, and...

Rootkits: Subverting the Windows Kernel
Rootkits: Subverting the Windows Kernel

Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James...

The Micro Cap Investor: Strategies for Making Big Returns in Small Companies
The Micro Cap Investor: Strategies for Making Big Returns in Small Companies
Are you looking to trade a little security and stability for the opportunity to get in early on the next Microsoft? Study after study reveals that investing in micro cap stocks has generated greater long-term returns than investing in blue chips. Yet because micro caps are by nature more volatile than their blue-chip counterparts, and often trade...
Oracle GoldenGate 12c Implementer's Guide
Oracle GoldenGate 12c Implementer's Guide

Leverage the power of real-time data access for designing, building, and tuning your GoldenGate Enterprise

About This Book

  • Orchestrate the rich features of GoldenGate 12c and exploit the performance-enhancing features and manageability in your Enterprise environment
  • Master data...
Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)
Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)

Uncovering the development of the hacking toolset under Linux, this book teaches programmers the methodology behind hacker programming techniques so that they can think like an attacker when developing a defense. Analyses and cutting-edge programming are provided of aspects of each hacking item and its source code—including ping...

Mastering Python Design Patterns: A guide to creating smart, efficient, and reusable software, 2nd Edition
Mastering Python Design Patterns: A guide to creating smart, efficient, and reusable software, 2nd Edition

Exploit various design patterns to master the art of solving problems using Python

Key Features

  • Master the application design using the core design patterns and latest features of Python 3.7
  • Learn tricks to solve common design and architectural challenges
  • ...
Spring Persistence with Hibernate
Spring Persistence with Hibernate

Spring is the leading platform to build and run enterprise Java applications. Spring's Hibernate integration makes it easy to mix and match persistence methodologies simplifying your Hibernate applications. You can incorporate lots of Inversion of Control (IoC) convenience features to address many typical Hibernate integration issues,...

Matlab: A Practical Introduction to Programming and Problem Solving
Matlab: A Practical Introduction to Programming and Problem Solving

MatLab, Third Edition is the only book that gives a full introduction to programming in MATLAB combined with an explanation of the software’s powerful functions, enabling engineers to fully exploit its extensive capabilities in solving engineering problems. The book provides a systematic, step-by-step approach, building on...

PostScript(R) Language Reference (3rd Edition)
PostScript(R) Language Reference (3rd Edition)

IN THE 1980S, ADOBE DEVISED a powerful graphics imaging model that over time has formed the basis for the Adobe PostScript technologies. These technologies— a combination of the PostScript language and PostScript language–based graphics and text-formatting applications, drivers, and imaging systems—have forever changed the...

Introducing Microsoft Teams: Understanding the New Chat-Based Workspace in Office 365
Introducing Microsoft Teams: Understanding the New Chat-Based Workspace in Office 365
Gain industry best practices from planning to implementing Microsoft Teams and learn how to enable, configure, and integrate user provisioning, management, and monitoring. This book also covers troubleshooting Teams with step-by-step instructions and examples. Introducing Microsoft Teams gives you the...
unlimited object storage image
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy