This is the fundamental truth about data protection: backup is dead.
Or rather, backup and recovery, as a standalone topic, no longer has relevance in IT. As a standalone topic, it’s been killed off by seemingly exponential growth in storage and data, by the cloud, and by virtualization.
So what is data...
Mastering Elasticsearch, Second Edition
Further your knowledge of the Elasticsearch server by learning more about its internals, querying, and data handling
About This Book
Understand Apache Lucene and Elasticsearch's design and architecture
Design your index, configure it, and distribute it, not only with assumptions, but...
Set up Apache Kafka clusters and develop custom message producers and consumers using practical, hands-on examples
Write custom producers and consumers with message partition techniques
Integrate Kafka with Apache Hadoop and Storm for use cases such as processing streaming...
Hacker Disassembling Uncovered This text shows how to analyze programs without its source code, using a debugger and a disassembler, and covers hacking methods including virtual functions, local and global variables, branching, loops, objects and their hierarchy, and more.
This book is dedicated to the basics of hacking—methods of analyzing programs using a...
OAuth 2.0 Identity and Access Management Patterns
Want to learn the world’s most widely used authorization framework? This tutorial will have you implementing secure Oauth 2.0 grant flows without delay. Written for practical application and clear instruction, it’s the complete guide.
Build web, client-side, desktop, and server-side...
Professional Android Sensor Programming
ANDROIDS ARE ALIVE. THEY CAN LOCATE THEMSELVES, see, listen, and understand speech. They can sense radio signals and detect orientation, movement, and environmental properties. Can your computer do all of that?
The availability of sensors is one feature Android devices have that makes them different from other computers. Without...
|Result Page: 26 25 24 23 22 21 20 19 18 17 |