Home | Amazing | Today | Tags | Publishers | Years | Search 
Big Data Glossary
Big Data Glossary

To help you navigate the large number of new data tools available, this guide describes 60 of the most recent innovations, from NoSQL databases and MapReduce approaches to machine learning and visualization tools. Descriptions are based on first-hand experience with these tools in a production environment.

This handy...

Mobile .NET
Mobile .NET

Mobile .NET begins by examining a wide variety of different wireless Internet devices. These devices are divided into two main divisions: those that are directly supported by .NET (Pocket PCs, i-Mode phones, and WAP devices) and those that are not (Palm OS and J2ME-powered devices). By the end of this book, you'll be able to make...

Practical Enterprise Software Development Techniques: Tools and Techniques for Large Scale Solutions
Practical Enterprise Software Development Techniques: Tools and Techniques for Large Scale Solutions

This expanded and updated edition of "Practical Enterprise Software Development Techniques" includes a new chapter which explains what makes enterprise scale software development different from other development endeavors. Chapter 4 has been expanded with additional coverage of code review, bug tracker systems and agile software...

Oracle DBA Pocket Guide
Oracle DBA Pocket Guide

The Oracle database is one of the most popular in the world, and for good reason. It's compatible, scalable, portable, and capable of performing incredibly fast. The advantages Oracle holds over its competition come with a price, however--it's a highly complex database that's becoming more complex with every release. And...

From Hacking to Report Writing: An Introduction to Security and Penetration Testing
From Hacking to Report Writing: An Introduction to Security and Penetration Testing

Learn everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing by breaking down each step of the process so that finding vulnerabilities and misconfigurations becomes easy. The book explains how to methodically locate, exploit, and professionally...

Hacking Exposed Mobile: Security Secrets & Solutions
Hacking Exposed Mobile: Security Secrets & Solutions

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Proven security tactics for today's mobile apps,devices, and networks

"A great overview of the new threats created...

CEH Certified Ethical Hacker All-in-One Exam Guide
CEH Certified Ethical Hacker All-in-One Exam Guide

Get complete coverage of all the objectives included on the EC-Council's Certified Ethical Hacker exam inside this comprehensive resource. Written by an IT security expert, this authoritative guide covers the vendor-neutral CEH exam in full detail. You'll find learning objectives at the beginning of each chapter, exam tips, practice...

Excel 2016 VBA and Macros (includes Content Update Program) (MrExcel Library)
Excel 2016 VBA and Macros (includes Content Update Program) (MrExcel Library)

MASTER CORE EXCEL 2016 TOOLS FOR BUILDING POWERFUL, RELIABLE SPREADSHEETS!

 

Use this guide to automate virtually any routine task: save yourself hours, days, maybe even weeks! Make Excel do things you thought were impossible, discover macro...

Python Web Penetration Testing Cookbook
Python Web Penetration Testing Cookbook

Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing

About This Book

  • Get useful guidance on writing Python scripts and using libraries to put websites and web apps through their paces
  • Find the script you need to deal with any...
Python Data Analysis
Python Data Analysis

Key Features

  • Find, manipulate, and analyze your data using the Python 3.5 libraries
  • Perform advanced, high-performance linear algebra and mathematical calculations with clean and efficient Python code
  • An easy-to-follow guide with realistic examples that are frequently used in real-world data...
Rails AntiPatterns: Best Practice Ruby on Rails Refactoring (Addison-Wesley Professional Ruby Series)
Rails AntiPatterns: Best Practice Ruby on Rails Refactoring (Addison-Wesley Professional Ruby Series)
The Complete Guide to Avoiding and Fixing Common Rails 3 Code and Design Problems

As developers worldwide have adopted the powerful Ruby on Rails web framework, many have fallen victim to common mistakes that reduce code quality, performance, reliability, stability, scalability, and maintainability.
...
Understanding Game Application Development: With Xamarin.Forms and ASP.NET
Understanding Game Application Development: With Xamarin.Forms and ASP.NET
Learn to build a simple data-driven mobile game application using the power of Xamarin.Forms, ASP.NET, the Web API, and SignalR with this short book. In it you will build a cross-platform mobile application that targets both iOS and Android, connect your app with your database using Entity Framework, and implement real-time...
Result Page: 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy