 |
|
|
|
 |  |  Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Learn to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources.
You'll learn how to configure your network from the ground up, starting by setting up your... |  |  Game Hacking: Developing Autonomous Bots for Online Games
You don't need to be a wizard to transform a game you like into a game you love. Imagine if you could give your favorite PC game a more informative heads-up display or instantly collect all that loot from your latest epic battle.
Bring your knowledge of Windows-based development and memory management, and Game... |
|
 Instant InnoDB
InnoDB, the default storage engine for MySQL, is one of the most robust and commonly used in the world today. It can, however, be initially daunting to learn how to start implementing its features, and it can pose unique problems to the beginner user. This guide is written to address these problems.
"Instant InnoDB"... |  |  MySQL High Availability: Tools for Building Robust Data Centers
Server bottlenecks and failures are a fact of life in any database deployment, but they don’t have to bring everything to a halt. This practical book explains replication, cluster, and monitoring features that can help protect your MySQL system from outages, whether it’s running on hardware, virtual machines, or in the... |  |  Test Equating, Scaling, and Linking: Methods and Practices
This book provides an introduction to test equating, scaling and linking, including those concepts and practical issues that are critical for developers and all other testing professionals. In addition to statistical procedures, successful equating, scaling and linking involves many aspects of testing, including procedures to develop tests,... |
|
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 |