 |
|
|
 Practical Neo4j
Why have developers at places like Facebook and Twitter increasingly turned to graph databases to manage their highly connected big data? The short answer is that graphs offer superior speed and flexibility to get the job done.
It’s time you added skills in graph databases to your toolkit.... |  |  RESPONSIBLE RESPONSIVE DESIGN
Contents: - Responsible Design - Sustainable Detection - Planning for Performance - Delivering Responsibly. "Responsive design has immeasurably improved multi-device, multi-browser visual layout-but it's only the first step in building responsively. Learn how to turn a critical eye on your designs as you develop for new contexts... |  |  Hadoop Backup and Recovery solutions
Learn the best strategies for data recovery from Hadoop backup clusters and troubleshoot problems
About This Book
-
Learn the fundamentals of Hadoop's backup needs, recovery strategy, and troubleshooting
-
Determine common failure points, intimate HBase, and explore different backup...
|
|
 Nmap 6: Network exploration and security auditing Cookbook
Want to master Nmap and its scripting engine? Then this book is for you – packed with practical tasks and precise instructions, it's a comprehensive guide to penetration testing and network monitoring. Security in depth.
Overview
-
Master the power of Nmap 6
-
Learn how the...
|  |  Orchestrating Docker
Manage and deploy Docker services to containerize applications efficiently
About This Book
-
Set up your own Heroku-like PaaS by getting accustomed to the Docker ecosystem
-
Run your applications on development machines, private servers, or the cloud, with minimal cost of a virtual...
|  |  Mastering SQL Server 2014 Data Mining
Master selecting, applying, and deploying data mining models to build powerful predictive analysis frameworks
About This Book
-
Understand the different phases of data mining, along with the tools used at each stage
-
Explore the different data mining algorithms in depth
-
Become...
|
|
 Penetration Testing with Perl
Harness the power of Perl to perform professional penetration testing
About This Book
-
Write your own custom information security tools using Perl and object-oriented Perl modules
-
Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
- ...
|  |  Mastering Nginx
Written for experienced systems administrators and engineers, this book teaches you from scratch how to configure Nginx for any situation. Step-by-step instructions and real-world code snippets clarify even the most complex areas.
Overview
-
An in-depth configuration guide to help you understand how to best...
|  |  Microsoft Project 2016 Step by Step
The quick way to learn Microsoft Project 2016!This is learning made easy. Get more done quickly with Project 2016. Jump in wherever you need answers–brisk lessons and colorful screenshots show you exactly what to do, step by step.
-
Quickly start a new plan, build task lists, and assign resources
- ...
|
|
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 |