 |
|
|
 Oracle9i Administration and Management
With Oracle8 and Oracle8i, Oracle Corporation began a trend in database modernization
that has culminated in the Oracle9i release. Many consider Oracle9i to actually be
8.2; I would argue that with the multitude of new features, structures, and capabilities,
9i qualifies as a new release.
Oracle’s power... |  |  Python Geospatial Analysis Cookbook
Over 60 recipes to work with topology, overlays, indoor routing, and web application analysis with Python
About This Book
-
Explore the practical process of using geospatial analysis to solve simple to complex problems with reusable recipes
-
Concise step-by-step instructions to teach you...
|  |  Go Design Patterns
Learn idiomatic, efficient, clean, and extensible Go design and concurrency patterns by using TDD
About This Book
-
A highly practical guide filled with numerous examples unleashing the power of design patterns with Go.
-
Discover an introduction of the CSP concurrency model by explaining...
|
|
|
 Programming in Lua, Second Edition
Lua is the language of choice for anyone who needs a scripting language that is simple, efficient, extensible, portable, and free. Currently, Lua is being used in areas ranging from embedded systems to Web development and is widely spread in the game industry, where knowledge of Lua is an indisputable asset. "Programming in Lua" is... |  |  Programming in Lua
Lua is the language of choice for anyone who needs a scripting language that is simple, efficient, extensible, portable, and free. Currently, Lua is being used in areas ranging from embedded systems to Web development and is widely spread in the game industry, where knowledge of Lua is an indisputable asset. Lua also has established itself as... |  |  Learning Penetration Testing with Python
Utilize Python scripting to execute effective and efficient penetration tests
About This Book
-
Understand how and where Python scripts meet the need for penetration testing
-
Familiarise yourself with the process of highlighting a specific methodology to exploit an environment to fetch...
|
|
Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 |