Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Pro Active Record: Databases with Ruby and Rails
Pro Active Record: Databases with Ruby and Rails
Pro Active Record helps you take advantage of the full power of your database engine from within your Ruby programs and Rails applications. ActiveRecord, part of the magic that makes the Rails framework so powerful and easy to use, is the model element of Rail's model/view/controller framework. It's an object-relational mapping library...
Learning AWS OpsWorks
Learning AWS OpsWorks

Learn how to exploit advanced technologies to deploy and auto-scale web stacks

Overview

  • Discover how a DevOps cloud management solution can accelerate your path to delivering highly scalable infrastructure and applications
  • Learn about infrastructure automation, auto-scaling, and distributed...
Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer
Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer

Leverage the power of Hyperledger Fabric to develop Blockchain-based distributed ledgers with ease

Key Features

  • Write your own chaincode/smart contracts using Golang on hyperledger network
  • Build and deploy decentralized applications (DApps)
  • Dive into real...
Mac OS X Tiger Unleashed
Mac OS X Tiger Unleashed

A best-seller that once showed you how to reign in a panther can now show you how to tame a Tiger. Mac OS X Tiger Unleashed is the most comprehensive guide to unlocking the full power of Mac OS X Tiger that you can find. Written by Unix/BSD experts and Mac users, ...

The XP Files:  Windows' Hidden Tools for Secure Sharing, Communication, and Collaboration
The XP Files: Windows' Hidden Tools for Secure Sharing, Communication, and Collaboration

XP's Best-Kept Secrets--Revealed!

During the past decade, Microsoft has created the some of the best Internet communication programs in the world and has installed them on every Windows computer--free, but mostly hidden. Until now, only a few knowledgeable computer users knew how to exploit the potential of these programs--and understood...

Julia 1.0 Programming: Dynamic and high-performance programming to build fast scientific applications, 2nd Edition
Julia 1.0 Programming: Dynamic and high-performance programming to build fast scientific applications, 2nd Edition

Enter the exciting world of Julia, a high-performance language for technical computing

Key Features

  • Leverage Julia's high speed and efficiency for your applications
  • Work with Julia in a multi-core, distributed, and networked environment
  • Apply Julia to...
High Performance Oracle Database Applications: Performance and Tuning Techniques for Getting the Most from Your Oracle Database
High Performance Oracle Database Applications: Performance and Tuning Techniques for Getting the Most from Your Oracle Database

This book was written because I felt there was a need for a comprehensive text for the application developer and DBA who must implement fast, efficient, and reliable client/server applications. Unlike other theoretical books on this subject, Designing High-Performance Oracle Databases provides tangible examples and...

Mastering Kali Linux for Advanced Penetration Testing
Mastering Kali Linux for Advanced Penetration Testing

A practical guide to testing your network's security with Kali Linux - the preferred choice of penetration testers and hackers

About This Book

  • Conduct realistic and effective security tests on your network
  • Demonstrate how key data systems are stealthily exploited, and learn how to...
Knowledge Mapping and Management
Knowledge Mapping and Management

Knowledge Management is fast becoming a hot topic of discussion and research. The capture, use, production and storage of knowledge is an issue of paramount importance for businesses, universities, public and private organizations. Because this is such an important topic, it is essential for researchers, academicians and managers to...

Physical and Logical Security Convergence: Powered By Enterprise Security Management
Physical and Logical Security Convergence: Powered By Enterprise Security Management
Security in the post 9/11 world is about much more than just guns, guards and gates. The authors make a tremendous contribution to today's security debate by offering thoughtful and sensible recommendations that will help any reader understand the challenges of the networked world we now live in.- Roger Cresser, NBC News terrorism analyst
...
Chained Exploits: Advanced Hacking Attacks from Start to Finish
Chained Exploits: Advanced Hacking Attacks from Start to Finish
The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them

 

Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve...

Graph Analysis and Visualization: Discovering Business Opportunity in Linked Data
Graph Analysis and Visualization: Discovering Business Opportunity in Linked Data

Wring more out of the data with a scientific approach to analysis

Graph Analysis and Visualization brings graph theory out of the lab and into the real world. Using sophisticated methods and tools that span analysis functions, this guide shows you how to exploit graph and network analytic techniques to enable the...

unlimited object storage image
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy