Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Real-time Analytics with Storm and Cassandra
Real-time Analytics with Storm and Cassandra

This book will teach you how to use Storm for real-time data processing and to make your applications highly available with no downtime using Cassandra.

The book starts off with the basics of Storm and its components along with setting up the environment for...

Integrating ISA Server 2006 with Microsoft Exchange 2007
Integrating ISA Server 2006 with Microsoft Exchange 2007
Everything IT pros need to know about using ISA Server 2006 to defend their companies' email and remote users from hack attacks!

This book is a convenient, targeted, single-source guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike longwinded "comprehensive resources" it doesn't waste time
...
C++ Unleashed
C++ Unleashed
C++ Unleashed is a survey of advanced topics in C++. The goal of this book is to provide
a focused examination of each of these topics, covering the essential information
you need to fully exploit the power of the C++ language.

Many of the topics in this book deserve a book in their own right. Because it is not possible,...
Modern Python Standard Library Cookbook: Over 100 recipes to fully leverage the features of the standard library in Python
Modern Python Standard Library Cookbook: Over 100 recipes to fully leverage the features of the standard library in Python

Build optimized applications in Python by smartly implementing the standard library

Key Features

  • Strategic recipes for effective application development in Python
  • Techniques to create GUIs and implement security through cryptography
  • Best practices for...
Applied Cryptography in .NET and Azure Key Vault: A Practical Guide to Encryption in .NET and .NET Core
Applied Cryptography in .NET and Azure Key Vault: A Practical Guide to Encryption in .NET and .NET Core
Benefit from Microsoft's robust suite of security and cryptography primitives to create a complete, hybrid encryption scheme that will protect your data against breaches. This highly practical book teaches you how to use the .NET encryption APIs and Azure Key Vault, and how they can work together to produce a robust...
Microsoft Enterprise Library 5.0
Microsoft Enterprise Library 5.0

Microsoft Enterprise Library is a collection of reusable software components (also known as Application Blocks) that are designed to assist developers with common enterprise development challenges. Before using an Application block, you should have a good understanding of your application requirements and of the scenarios that the Application...

Beginning Algorithms (Wrox Beginning Guides)
Beginning Algorithms (Wrox Beginning Guides)
Beginning Algorithms

A good understanding of algorithms, and the knowledge of when to apply them, is crucial to producing software that not only works correctly, but also performs efficiently. This is the only book to impart all this essential information—from the basics of algorithms, data structures, and performance characteristics to...

Practical Forensic Imaging: Securing Digital Evidence with Linux Tools
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools

Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.

Practical
...

Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013, Proceedings (Lecture Notes in Computer Science)
Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013, Proceedings (Lecture Notes in Computer Science)

This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security and Privacy, ACISP 2013, held in Brisbane, Australia, in July 2013. The 28 revised full papers presented were carefully selected from 78 submissions. Conference papers are organized in technical sessions, covering topics of...

A Comparative Study of Very Large Data Bases (Lecture Notes in Computer Science)
A Comparative Study of Very Large Data Bases (Lecture Notes in Computer Science)

This monograph presents a comparison of methods for organizing very large amounts of stored data called a very large database to facilitate fast retrieval of desired information on direct access storage devices. In a very large data base involving retrieval and updating, the major factor of immediate concern is the average number of accesses...

Transactions on Data Hiding and Multimedia Security VI
Transactions on Data Hiding and Multimedia Security VI
This issue consists mainly of a Special Section on “Content Protection and Forensics” with four papers edited by Sabu Emmanuel, Mohan S. Kankanhalli, Shih-Fu Chang, Regunathan Radhakrishnan, Fulong Ma and Li Zhao. For a detailed introduction of these four papers, please refer to the Preface written by the organizers...
Beginning ASP.NET Security (Wrox Programmer to Programmer)
Beginning ASP.NET Security (Wrox Programmer to Programmer)

Programmers: protect and defend your Web apps against attack!

You may know ASP.NET, but if you don't understand how to secure your applications, you need this book. This vital guide explores the often-overlooked topic of teaching programmers how to design ASP.NET Web applications so as to prevent online thefts and...

unlimited object storage image
Result Page: 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy