Home | Amazing | Today | Tags | Publishers | Years | Search 
Cassandra High Performance Cookbook
Cassandra High Performance Cookbook

Apache Cassandra is a fault-tolerant, distributed data store which offers linear scalability allowing it to be a storage platform for large high volume websites.

This book provides detailed recipes that describe how to use the features of Cassandra and improve its performance. Recipes cover topics ranging from setting up Cassandra...

CCNP Security Secure 642-637 Official Cert Guide
CCNP Security Secure 642-637 Official Cert Guide

Trust the best selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.

 

...
Building and Testing with Gradle
Building and Testing with Gradle

This book has a very clear aim: introduce you to the incredible simplicity and power of Gradle.

Gradle is a flexible yet model-driven JVM-based build tool. Gradle acknowledges and improves on the very best ideas from Make, Ant, Ivy, Maven, Rake, Gant, Scons, SBT, Leinengen, and Buildr. The best-of-breed features previously...

CCDA 640-864 Official Cert Guide (4th Edition)
CCDA 640-864 Official Cert Guide (4th Edition)

Trust the best selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.

 

...
Advanced Statistical Steganalysis (Information Security and Cryptography)
Advanced Statistical Steganalysis (Information Security and Cryptography)

Steganography and steganalysis, the hiding and detection of a covert payload within an innocent cover object, started to receive attention from the computer science, engineering, and mathematics communities in the 1990s. At first the problems were not clearly defined, but proper statistical foundations were proposed and mathematical...

Scriptin' with JavaScript and Ajax: A Designer's Guide (Voices That Matter)
Scriptin' with JavaScript and Ajax: A Designer's Guide (Voices That Matter)

Scriptin’ with JavaScript and Ajax is the third in a series of books aimed at introducing designers and programmers to the process of developing browser-based interfaces. The first, Stylin’ with CSS, focuses on the structure and styling of content, and the second, Codin’ for the Web, focuses on the three-tier...

Junos Enterprise Routing: A Practical Guide to Junos Routing and Certification
Junos Enterprise Routing: A Practical Guide to Junos Routing and Certification

The world of enterprise routing with Juniper Networks devices is getting very exciting—new technologies, products, and network developments are making the enterprise network environment one of the most dynamic places to be. However, we, the authors, hope to focus that energy by providing you with a detailed and practical...

Learning WCF: A Hands-on Guide
Learning WCF: A Hands-on Guide

My entire career has been about learning and applying new technologies. It has also been about taking on new challenges related to technology and business. I enjoy learning new things,and I like to share things that I have learned through writing and public speaking. I like to help others learn challenging subjects,in particular...

Introduction to Automata Theory, Languages and Computation (Addison-Wesley series in computer science)
Introduction to Automata Theory, Languages and Computation (Addison-Wesley series in computer science)

Ten years ago the authors undertook to produce a book covering the known material on formal languages, automata theory, and computational complexity. In retrospect, only a few significant results were overlooked in the 237 pages. In writing a new book on the subject, we find the field has expanded in so many new directions that a...

Making, Breaking Codes: Introduction to Cryptology
Making, Breaking Codes: Introduction to Cryptology

This book is an introduction to modern ideas in cryptology and how to employ these ideas. It includes the relevant material on number theory, probability, and abstract algebra, in addition to descriptions of ideas about algorithms and com plexity theory. Three somewhat different terms appear in the discussion of secure communications...

Optimization Based Data Mining: Theory and Applications (Advanced Information and Knowledge Processing)
Optimization Based Data Mining: Theory and Applications (Advanced Information and Knowledge Processing)

The purpose of this book is to provide up-to-date progress both in Multiple Criteria Programming (MCP) and Support Vector Machines (SVMs) that have become powerful tools in the field of data mining. Most of the content in this book are directly from the research and application activities that our research group has conducted over the...

Designing an IAM Framework with Oracle Identity and Access Management Suite (Oracle Press)
Designing an IAM Framework with Oracle Identity and Access Management Suite (Oracle Press)

Excuse me, but who are you, exactly?

You are a father or mother, a son or daughter, husband or wife, a significant other, a rock climber, a kite-flyer, a bicycle enthusiast, a marathon runner, a collector of old movies, a secret novelist, a boxing fan. You are the center of your universe. On the picture collage from the...

Result Page: 752 751 750 749 748 747 746 745 744 743 742 741 740 739 738 737 736 735 734 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy