 |
|
 Expert Oracle Indexing and Access Paths: Maximum Performance for Your Database
Speed up the execution of important database queries by making good choices about which indexes to create. Choose correct index types for different scenarios. Avoid indexing pitfalls that can actually have indexes hurting performance rather than helping. Maintain indexes so as to provide consistent and predictable query response over... |  |  Big Data SMACK: A Guide to Apache Spark, Mesos, Akka, Cassandra, and Kafka
Learn how to integrate full-stack open source big data architecture and to choose the correct technologyâScala/Spark, Mesos, Akka, Cassandra, and Kafkaâin every layer.
Big data architecture is becoming a requirement for many different enterprises. So far, however, the focus has largely been on collecting,... |  |  Python Game Programming by Example
A pragmatic guide for developing your own games with Python
About This Book
-
Strengthen your fundamentals of game programming with Python language
-
Seven hands-on games to create 2D and 3D games rapidly from scratch
-
Illustrative guide to explore the different GUI libraries...
|
|
|
 Mastering Kali Linux for Advanced Penetration Testing
A practical guide to testing your network's security with Kali Linux - the preferred choice of penetration testers and hackers
About This Book
-
Conduct realistic and effective security tests on your network
-
Demonstrate how key data systems are stealthily exploited, and learn how to...
|  |  The Network Security Test Lab: A Step-by-Step Guide
The ultimate hands-on guide to IT security and proactivedefense
The Network Security Test Lab is a hands-on, step-by-stepguide to ultimate IT security implementation. Covering the fullcomplement of malware, viruses, and other attack technologies, thisessential guide walks you through the security assessment... |  |  The Hacker Playbook: Practical Guide To Penetration Testing
Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the... |
|
|
Result Page: 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 |