 |
|
 Cassandra High Performance Cookbook
Apache Cassandra is a fault-tolerant, distributed data store which offers linear scalability allowing it to be a storage platform for large high volume websites.
This book provides detailed recipes that describe how to use the features of Cassandra and improve its performance. Recipes cover topics ranging from setting up Cassandra... |  |  CCNP Security Secure 642-637 Official Cert Guide
Trust the best selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.
... |  |  Building and Testing with Gradle
This book has a very clear aim: introduce you to the incredible simplicity and power
of Gradle.
Gradle is a flexible yet model-driven JVM-based build tool. Gradle acknowledges and
improves on the very best ideas from Make, Ant, Ivy, Maven, Rake, Gant, Scons, SBT,
Leinengen, and Buildr. The best-of-breed features previously... |
|
 CCDA 640-864 Official Cert Guide (4th Edition)
Trust the best selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.
... |  |  Advanced Statistical Steganalysis (Information Security and Cryptography)
Steganography and steganalysis, the hiding and detection of a covert payload
within an innocent cover object, started to receive attention from the computer
science, engineering, and mathematics communities in the 1990s. At
first the problems were not clearly defined, but proper statistical foundations
were proposed and mathematical... |  |  |
|
|
 Making, Breaking Codes: Introduction to Cryptology
This book is an introduction to modern ideas in cryptology and how to employ
these ideas. It includes the relevant material on number theory, probability, and
abstract algebra, in addition to descriptions of ideas about algorithms and com
plexity theory. Three somewhat different terms appear in the discussion of secure
communications... |  |  |  |  Designing an IAM Framework with Oracle Identity and Access Management Suite (Oracle Press)
Excuse me, but who are you, exactly?
You are a father or mother, a son or daughter, husband or wife, a significant other, a rock
climber, a kite-flyer, a bicycle enthusiast, a marathon runner, a collector of old movies, a
secret novelist, a boxing fan. You are the center of your universe. On the picture collage from
the... |
|
| Result Page: 752 751 750 749 748 747 746 745 744 743 742 741 740 739 738 737 736 735 734 |