 |
|
|
|
|
 A Guide to Kernel Exploitation: Attacking the Core
The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop... |  |  Data Management and Query Processing in Semantic Web Databases
The Semantic Web, which is intended to establish a machine-understandable Web, is currently changing from being an emerging trend to a technology used in complex real-world applications. A number of standards and techniques have been developed by the World Wide Web Consortium (W3C), e.g., the Resource Description Framework (RDF), which... |  |  Scaling MongoDB
This text is for MongoDB users who are interested in sharding. It is a comprehensive look at how to set up and use a cluster.
This is not an introduction to MongoDB; I assume that you understand what a document, collection, and database are, how to read and write data, what an index is, and how and why to set up a... |
|
Result Page: 289 288 287 286 285 284 283 282 281 280 279 278 277 276 275 274 273 272 271 |