|
|
|
|
|
Inside Microsoft Windows SharePoint Services 3.0 (Pro Developer)Get in-depth architectural insights for building enterprise solutions-straight from the experts.
Focus is on the internals of the Windows SharePoint Services 3.0 platform with this in-depth, straightforward reference. You get expert insights, task-oriented guidance, and extensive code samples to help you master the intricacies of... | | Linux System Programming: Talking Directly to the Kernel and C LibraryThis book is about writing software that makes the most effective use of the system you're running on -- code that interfaces directly with the kernel and core system libraries, including the shell, text editor, compiler, debugger, core utilities, and system daemons. The majority of both Unix and Linux code is still written at the system level, and... | | Mastering ElasticSearch
Extend your knowledge on ElasticSearch, and querying and data handling, along with its internal workings
Overview
-
Learn about Apache Lucene and ElasticSearch design and architecture to fully understand how this great search engine works
-
Design, configure, and distribute your index, coupled...
|
|
Accumulo: Application Development, Table Design, and Best Practices
Get up to speed on Apache Accumulo, the flexible, high-performance key/value store created by the National Security Agency (Nsa) and based on Google’s BigTable data storage system. Written by former Nsa team members, this comprehensive tutorial and reference covers Accumulo architecture, application development, table design,... | | Real 802.11 Security: Wi-Fi Protected Access and 802.11i"Real 802.11 Security provides clear descriptions of current and emerging security techniques. The authors handle complex topics nicely, and offer significant clarification of IEEE draft standards." -Russ Housley, IETF Security Area Director and founder of Vigil Security, LLC
"This... | | Practical Unix & Internet Security, Second EditionThis book is a practical guide to UNIX security. For users, we explain what computer security is, describe some of the dangers that you may face, and tell you how to keep your data safe and sound. For administrators, we explain in greater detail how UNIX security mechanisms work and tell how to configure and administer your computer for maximum... |
|
|
|
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 |