|
|
|
|
How Linux Works: What Every Superuser Should Know
Unlike some operating systems, Linux doesn't try to hide the important bits from you—it gives you full control of your computer. But to truly master Linux, you need to understand its internals, like how the system boots, how networking works, and what the kernel actually does.
In this completely revised second... | | UNIX for Programmers and Users (3rd Edition)
For an introductory course on UNIX.
UNIX for Programmers and Users, Third Edition follows in the tradition of previous editions to provide students with complete, up-to-date coverage of UNIX. In this new edition they will find information on basic concepts,... | | Windows® 7 Administrator's Pocket Consultant
Writing Windows 7 Administrator’s Pocket Consultant was a lot of fun—and a lot of work. As I set out to write this book, my initial goals were to determine how Windows 7 was different from Windows Vista and Windows XP and what new administration options were available. As with any new operating system—but especially with... |
|
Microsoft SQL Server 2012 Internals (Developer Reference)
Dive deep inside the architecture of SQL Server 2012
Explore the core engine of Microsoft SQL Server 2012—and put that practical knowledge to work. Led by a team of SQL Server experts, you’ll learn the skills you need to exploit key architectural features. Go behind the scenes to understand internal operations... | | PostgreSQLThe definitive guide to working with the powerful PostgreSQL open source database system.
PostgreSQL leads the reader through the internals of the powerful PostgreSQL open source database. Throughout the book, readers will find explanations of data structures and... | | |
|
The Merb Way“Foy is a gifted writer and his descriptions of the philosophies that( impacted the design and implementation of Merb are definitely useful to( everyone affected by the changes in Rails 3.”
–Obie Fernandez, Series Editor
... | | Securing Hadoop
Implement robust end-to-end security for your Hadoop ecosystem
Overview
-
Master the key concepts behind Hadoop security as well as how to secure a Hadoop-based Big Data ecosystem
-
Understand and deploy authentication, authorization, and data encryption in a Hadoop-based Big Data platform
... | | Beginning Hybrid Mobile Application Development
Today, a mobile device user prefers installed application over browsing internet; e.g. booking cab, buying movie tickets, watching you tube videos etc. Market share of mobile devices based on android, iOS & Windows Phone is considerable. Creating an installable application targeting these multiple devices involves too much of pain because... |
|
|
|
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |