Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Accumulo: Application Development, Table Design, and Best Practices
Accumulo: Application Development, Table Design, and Best Practices

Get up to speed on Apache Accumulo, the flexible, high-performance key/value store created by the National Security Agency (Nsa) and based on Google’s BigTable data storage system. Written by former Nsa team members, this comprehensive tutorial and reference covers Accumulo architecture, application development, table design,...

First Look at ADO.NET and System Xml v 2.0
First Look at ADO.NET and System Xml v 2.0

Version 2.0 of the .NET Framework will offer powerful enhancements to ADO.NET that will give application and service developers unprecedented control over their data. In A First Look at ADO.NET and System.Xml v. 2.0, Microsoft's lead program manager on XML technologies joins with two leading .NET...

RFID Security
RFID Security

RFID (Radio Frequency Identification) is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that allow them to receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ passes to dogs to...

Agile Web Development with Rails: A Pragmatic Guide (Pragmatic Programmers)
Agile Web Development with Rails: A Pragmatic Guide (Pragmatic Programmers)

Rails is a full-stack, open source web framework that enables you to create full-featured, sophisticated web-based applications, but with a twist... A full Rails application probably has less total code than the XML you'd need to configure the same application in other frameworks. With this book you'll learn how to use...

Joomla! Cash
Joomla! Cash
So you want to be an entrepreneur? Or maybe you already are one. Maybe you want to earn some extra cash, but don't have the time to setup an eBay® store. Whatever the case is, this book is for you.

As a young man, I always dreamed of running my own business and being in control of my business destiny. Well, that dream is not only
...
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions

"Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic...

iPad Programming
iPad Programming

Hold an iPad in your hands and you'll know what the fuss is all about. Select an app and the device disappears as you find yourself immersed in the experience--the iPad defines a new category for devices. iPad Programming shows you how to build apps for the iPad that people will love to use.

This
...

Creating Mobile Apps with Appcelerator Titanium
Creating Mobile Apps with Appcelerator Titanium

Develop fully-featured mobile applications using a hands-on approach, and get inspired to develop more

Overview

  • Walk through the development of ten different mobile applications by leveraging your existing knowledge of JavaScript
  • Allows anyone familiar with some Object-oriented Programming...
Pro ASP.NET MVC 5 (Expert's Voice in ASP.Net)
Pro ASP.NET MVC 5 (Expert's Voice in ASP.Net)

The ASP.NET MVC 5 Framework is the latest evolution of Microsoft’s ASP.NET web platform. It provides a high-productivity programming model that promotes cleaner code architecture, test-driven development, and powerful extensibility, combined with all the benefits of ASP.NET.

ASP.NET MVC 5 contains a number of advances over...

Managing the Windows NT Registry
Managing the Windows NT Registry

The Windows NT Registry is the repository for all hardware, software, and application configuration settings, and Managing the Windows NT Registry is the system administrator's guide to maintaining, monitoring, and updating the Registry database. The book addresses four main areas:

  • What is the...
Hacking the Code: ASP.NET Web Application Security
Hacking the Code: ASP.NET Web Application Security

This unique book walks you through the many threats to your web application code, from managing and authorizing users and encrypting private data to filtering user input and securing XML. For every defined threat, it provides a menu of solutions and coding considerations. And, it offers coding examples and a set of security policies for each of...

SAS Intelligence Platform: Overview (Second Edition)
SAS Intelligence Platform: Overview (Second Edition)
This guide is the point-of-entry document for understanding the basics of the SAS Intelligence Platform. It discusses the benefits of the SAS Intelligence Platform to businesses, describes the architecture of the SAS Intelligence Platform, and provides an overview of each software component in the platform.

The SAS Intelligence Platform
...
unlimited object storage image
Result Page: 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy