Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
HBase: The Definitive Guide
HBase: The Definitive Guide

You may be reading this book for many reasons. It could be because you heard all about Hadoop and what it can do to crunch petabytes of data in a reasonable amount of time. While reading into Hadoop you found that, for random access to the accumulated data, there is something called HBase. Or it was the hype that is prevalent these days...

Gamification by Design: Implementing Game Mechanics in Web and Mobile Apps
Gamification by Design: Implementing Game Mechanics in Web and Mobile Apps

Gamification may be a new term, but the idea of using game-thinking and game mechanics to solve problems and engage audiences isn’t exactly new. The military has been using games and simulations for hundreds (if not thousands) of years, and the U.S. military has been a pioneer in the use of video games across branches. Three...

Agile IT Security Implementation Methodology
Agile IT Security Implementation Methodology

Agile methodologies attack risk at its core. To identify risk early and often is the premise of agile security. Risk comes in many forms. Organizations face security threats every day. Risks are in the delivery and maintenance of the countermeasures. Agile IT Security focuses on the details of the steps in delivering and maintaining...

Lessons in IT Transformation: Technology Expert to Business Leader
Lessons in IT Transformation: Technology Expert to Business Leader
Why should I read this book? Be honest—that’s what you are really trying to figure out before you decide to invest the time and money required to read any book. There are thousands of books available on the topic of leadership. Why is this book different, and why should you care? Here are a few answers to your...
Information Security for Automatic Speaker Identification
Information Security for Automatic Speaker Identification
Speaker identification is a widely used technique in several security systems. In remote access systems, speaker utterances are recoded and communicated through a communication channel to a receiver that performs the identification process. Speaker identification is based on characterizing each speaker with a set of features...
Mobile Design for iPhone and iPad
Mobile Design for iPhone and iPad
Web designers know that their industry changes quickly. Continuous adaption and development of skills is necessary in order to always stay up to date. Over the past few years, mobile web usage has increased to a point that web designers can no longer afford to ignore it. As a result, web designers have a growing need to be...
Galaxy S II: The Missing Manual (Missing Manuals)
Galaxy S II: The Missing Manual (Missing Manuals)

Unlock the potential of Samsung's Galaxy S II with this jargon-free guide from technology guru Preston Gralla. You’ll quickly learn how to shoot high-res photos and HD video, keep your schedule, stay in touch, and enjoy your favorite media. Every page is packed with illustrations and valuable advice to help you get the most...

Between Crown and Commerce: Marseille and the Early Modern Mediterranean (The Johns Hopkins University Studies in Historical and Political Science)
Between Crown and Commerce: Marseille and the Early Modern Mediterranean (The Johns Hopkins University Studies in Historical and Political Science)

Between Crown and Commerce examines the relationship between French royal statecraft, mercantilism, and civic republicanism in the context of the globalizing economy of the early modern Mediterranean world.

This is the story of how the French Crown and local institutions accommodated one another as they sought to forge...

BackTrack 4: Assuring Security by Penetration Testing
BackTrack 4: Assuring Security by Penetration Testing

BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your...

The Complete Idiot's Guide to WordPress
The Complete Idiot's Guide to WordPress

Congratulations! You made an excellent decision in choosing WordPress as your blogging application. Becoming a part of the social web as a blogger is exciting and surprising, and you won’t regret your choice to establish your own space in the online world.

You’ve made another great decision by picking up this...

CCNP Security VPN 642-647 Official Cert Guide
CCNP Security VPN 642-647 Official Cert Guide

This book is designed to help you prepare for the Cisco VPN certification exam. The VPN exam is one in a series of exams required for the Cisco Certified Network Professional - Security (CCNP - Security) certification. This exam focuses on the application of security principles with regard to Cisco IOS routers,...

Amazon Web Services: Migrating Your .NET Enterprise Application
Amazon Web Services: Migrating Your .NET Enterprise Application

Amazon Web Services is an Infrastructure as a Service (IaaS) platform in the Cloud, which businesses can take advantage of as their needs demand. The Amazon Cloud provides the enterprise with the flexibility to choose whichever solution is required to solve specific problems, ultimately reducing costs by only paying for what you use.

...

Result Page: Previous 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 Next 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy