Big Data Made Easy: A Working Guide to the Complete Hadoop Toolset
Many corporations are finding that the size of their data sets are outgrowing the capability of their systems to store and process them. The data is becoming too big to manage and use with traditional tools. The solution: implementing a big data system.
As Big Data Made Easy: A Working...
Metasploit Penetration Testing Cookbook
Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...
Protecting Your Mobile App IP: The Mini Missing Manual
Learn four cost-effective ways to protect the applications you develop for mobile devices. The methods described in this Mini Missing Manual won't stop people from misappropriating your secrets, stealing your name, and copying your code. But if any of those things do...
|Result Page: 15 14 13 12 11 10 9 8 7 6 |