Scalability Patterns: Best Practices for Designing High Volume Websites
In this book, the CEO of Cazton, Inc. and internationally-acclaimed speaker, Chander Dhall, demonstrates current website design scalability patterns and takes a pragmatic approach to explaining their pros and cons to show you how to select the appropriate pattern for your site. He then tests the patterns by deliberately...
Hadoop in Practice
Hadoop in Practice, Second Edition provides over 100 tested, instantly useful techniques that will help you conquer big data, using Hadoop. This revised new edition covers changes and new features in the Hadoop core architecture, including MapReduce 2. Brand new chapters cover YARN and integrating...
Building Modern Web Applications Using Angular
Learn about the core building blocks of Angular
Build and architect high performance web applications
Leverage the latest Angular features to get the most out of your web
Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...
PMP: Project Management Professional Exam Study Guide
The full coverage you need for the PMP Exam
Get the preparation you need for the challenging Project Management Professional (PMP) certification exam in this comprehensive study guide. In addition to coverage of all exam objectives, you'll find practical advice including "How This Applies to Your Current...
CISSP Exam Cram 2
Learn what you need to know to master the CISSP security technology and the certification exam with the CISSP Exam Cram 2. A perfect compliment to larger study guides, the CISSP Exam Cram 2 is a great way to find out exactly what will be expected of you during...
Windows Security Monitoring: Scenarios and Patterns
Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security
Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...
Building the Data Warehouse (3rd Edition) Learn the most recent advances in data warehousing technology from the "Father of Data Warehousing"
Since it was first published in 1990, W. H. Inmon’s Building the Data Warehouse has become the bible of data warehousing–– the first and best introduction to the subject. A lot has changed in data warehousing...
Network Security: A Beginner's Guide, Second Edition Essential Skills--Made Easy!
Protect your digital knowledge, data, and capabilities from misuse or tampering. This fully updated guidebook provides step-by-step instruction on implementing firewalls, wireless security, desktop protection, biometrics, and many of today's essential security measures. Understand the four primary forms of attack...
|Result Page: 49 48 47 46 45 44 43 42 41 40 |