Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
MySQL 8 for Big Data: Effective data processing with MySQL 8, Hadoop, NoSQL APIs, and other Big Data tools
MySQL 8 for Big Data: Effective data processing with MySQL 8, Hadoop, NoSQL APIs, and other Big Data tools

Uncover the power of MySQL 8 for Big Data

About This Book

  • Combine the powers of MySQL and Hadoop to build a solid Big Data solution for your organization
  • Integrate MySQL with different NoSQL APIs and Big Data tools such as Apache Sqoop
  • A comprehensive guide with practical...
Windows Security Monitoring: Scenarios and Patterns
Windows Security Monitoring: Scenarios and Patterns

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...

Kali Linux CTF Blueprints
Kali Linux CTF Blueprints

Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux

About This Book

  • Put the skills of the experts to the test with these tough and customisable pentesting projects
  • Develop each challenge to suit your specific...
OAuth 2.0 Identity and Access Management Patterns
OAuth 2.0 Identity and Access Management Patterns

Want to learn the world’s most widely used authorization framework? This tutorial will have you implementing secure Oauth 2.0 grant flows without delay. Written for practical application and clear instruction, it’s the complete guide.

Overview

  • Build web, client-side, desktop, and server-side...
Big Data in Practice: How 45 Successful Companies Used Big Data Analytics to Deliver Extraordinary Results
Big Data in Practice: How 45 Successful Companies Used Big Data Analytics to Deliver Extraordinary Results

The best-selling author of Big Data is back, this time with a unique and in-depth insight into how specific companies use big data.

Big data is on the tip of everyone's tongue. Everyone understands its power and importance, but many fail to grasp the actionable steps and resources required to utilise it effectively. This...

Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Statistics for Business and Economics (Book Only)
Statistics for Business and Economics (Book Only)

Discover how the most trusted approach to statistics today is Simply Powerful. The latest market-leading text from respected authors Anderson/Sweeney/Williams, STATISTICS FOR BUSINESS AND ECONOMICS, 11e, introduces sound statistical methodology within a strong applications setting like no other text. The authors clearly demonstrate how...

Essentials of Statistics for Business and Economics (with CD-ROM)
Essentials of Statistics for Business and Economics (with CD-ROM)

Trust the latest version of this market-leading essentials text to introduce sound statistical methodology in a proven applications setting. ESSENTIALS OF STATISTICS FOR BUSINESS AND ECONOMICS, 5e, includes all of the strengths of the longer best-selling Anderson/Sweeney/Williams STATISTICS FOR BUSINESS AND ECONOMICS, with a focus on the most...

Financial Modeling in Excel For Dummies
Financial Modeling in Excel For Dummies

Make informed business decisions with the beginner's guide to financial modeling using Microsoft Excel

Financial Modeling in Excel For Dummies is your comprehensive guide to learning how to create informative, enlightening financial models today. Not a math whiz or an Excel power-user? No problem! All you need is...

Modern Cryptography: Theory and Practice
Modern Cryptography: Theory and Practice
Leading HP security expert Wenbo Mao explains why "textbook" crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario attacks. Next, he shows how to realize cryptographic systems and protocols that are truly "fit for application"--and formally demonstrates their fitness. Mao presents...
Corporate Finance Demystified 2/E
Corporate Finance Demystified 2/E

The simple way to master corporate finance

The math, the formulas, the problem solving . . . does corporate finance make your head spin? You're not alone. It's one of the toughest subjects for business students―which is why Corporate Finance DeMYSTiFieD is written in a way that makes learning it easier than...

AngularJS Directives
AngularJS Directives

Learn how to craft dynamic directives to fuel your single-page web applications using AngularJS

Overview

  • Learn how to build an AngularJS directive
  • Create extendable modules for plug-and-play usability
  • Build apps that react in real-time to changes in your data model
  • ...
Result Page: 20 19 18 17 16 15 14 13 12 11 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy