|
|
|
|
Introduction to Contextual Processing: Theory and Applications
Contextual computing has been around for several years with a variety of names such as pervasive computation and omnipresent computing. Recently there has been a drive toward making personal digital assistants (PDAs) more aware of their environment. For example, a cell phone may sense that it is in a conference room and reason that it should... | | PowerShell in Depth: An administrator's guide
Summary
PowerShell in Depth is the kind of book you'll want open on your desk most of the time. With 40 short chapters, each focused on a specific area of PowerShell, you'll be able to find the answers you need quickly. Each chapter is concise and to-the-point, so you can spend less time reading and... | | Learning Cloudera Impala
Perform interactive, real-time in-memory analytics on large amounts of data using the massive parallel processing engine Cloudera Impala
Overview
-
Step-by-step guidance to get you started with Impala on your Hadoop cluster
-
Manipulate your data rapidly by writing proper SQL statements
... |
|
The Hacker Playbook: Practical Guide To Penetration Testing
Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the... | | Microsoft IIS 6.0: Administrator's Pocket ConsultantThis precise pocket-sized guide delivers immediate answers for the day-to-day administration of Web servers running Microsoft Information Services (IIS) 6.0. Zero in on core IIS support procedures and everyday tasks using quick-reference tables, step-by-step instructions, and lists. You get the focused, streamlined information you need to... | | Microsoft(r) Windows(r) 2000 Server Administrator's CompanionMICROSOFT WINDOWS 2000 SERVER ADMINISTRATOR'S COMPANION brings network administrators, systems engineers, and other MIS professionals up to speed on the latest features of Windows 2000 Server, including Active Directory(tm) services, Microsoft Internet Information Server 4.0, the new, integrated console for administrative tools, and more. It's the... |
|
| | Practical Hacking Techniques and CountermeasuresExamining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results.
It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to... | | Cisco ISP EssentialsA comprehensive guide to the best common practices for Internet service providersLearn the best common practices for configuring routers on the Internet from experts who helped build the InternetGain specific advice through comprehensive coverage of all Cisco routers and current versions of Cisco IOS SoftwareUnderstand the Cisco IOS tools essential... |
|
|
|
Result Page: 361 360 359 358 357 356 355 354 353 352 351 350 349 348 347 346 345 344 343 |