 |
|
|
 PostgreSQL 9 Admin Cookbook
PostgreSQL is a powerful, open source object-relational database system. An enterprise database, PostgreSQL includes features such as Multi-Version Concurrency Control (MVCC), point-in-time recovery, tablespaces, asynchronous replication, nested transactions (savepoints), online/hot backups, a sophisticated query planner/optimizer, and... |  |  C# for Programmers (2nd Edition)
The practicing programmer's DEITEL® guide to C# and the powerful Microsoft .NET Framework
Written for programmers with a background in C++, Java, or other high-level languages, this book applies the Deitel signature live-code approach to teaching programming and explores Microsoft's C#... |  |  Cassandra: The Definitive Guide
What could you do with data if scalability wasn't a problem? With this hands-on guide, you'll learn how Apache Cassandra handles hundreds of terabytes of data while remaining highly available across multiple data centers -- capabilities that have attracted Facebook, Twitter, and other data-intensive companies. Cassandra:... |
|
|
 Practical Android Projects (Books for Professionals by Professionals)
Take a practical approach to becoming a leading-edge Android developer, learning by example while combining the many technologies needed to create a successful, up-to-date web app.
Practical Android Projects introduces the Android software development kit and development tools of the trade, and then... |  |  Code in the Cloud (Pragmatic Programmers)
Cloud computing is an innovative and exciting style of programming and using computers. It creates tremendous opportunities for software developers: cloud computing can provide an amazing new platform for building new kinds applications. In this chapter, we’ll look at the basic concepts: what cloud computing is, when and why... |  |  Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
This book has been developed by and for security professionals who are dedicated to working in an ethical and responsible manner to improve the overall security posture of individuals, corporations, and nations.
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS
Thwart malicious network intrusion... |
|
| Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 |