BeagleBone for Secret Agents
Browse anonymously, communicate secretly, and create custom security solutions with open source software, the BeagleBone Black, and cryptographic hardware
About This Book
Interface with cryptographic hardware to add security to your embedded project, securing you from external threats.
Building a BeagleBone Black Super Cluster
Build and configure your own parallel computing Beowulf cluster using BeagleBone Black ARM systems
About This Book
Configure your own cluster for high speed parallel computing
Benefit from your personally configured super computer which is a power efficient, low-cost, and highly scalable...
Linked Data: Structured Data on the Web
About this Book
Hadoop in Practice
Hadoop in Practice, Second Edition provides over 100 tested, instantly useful techniques that will help you conquer big data, using Hadoop. This revised new edition covers changes and new features in the Hadoop core architecture, including MapReduce 2. Brand new chapters cover YARN and integrating...
Getting Started with OpenShift
Intrigued by the possibilities of developing web applications in the cloud? With this concise book, you get a quick hands-on introduction to OpenShift, the open source Platform as a Service (PaaS) offering from Red Hat. You’ll learn the steps necessary to build, deploy, and host a complete real-world application on OpenShift,...
Expert Oracle RAC Performance Diagnostics and Tuning
Expert Oracle RAC Performance Diagnostics and Tuning provides comprehensive coverage of the features, technology and principles for testing and tuning RAC databases. The book takes a deep look at optimizing RAC databases by following a methodical approach based on scientific analysis rather than using a speculative approach, twisting...
Windows Server 2012 R2 Pocket Consultant Volume 2: Storage, Security, & Networking
Portable and precise, this pocket-sized guide delivers ready answers for administering storage, security, and networking features in Windows Server 2012 R2. Zero in on core tasks through quick-reference tables, instructions, and lists. You'll get the focused information you need to save time and get the job done - whether at your desk or...
You Don't Know JS: this & Object Prototypes
The Browser Hacker's Handbook
Hackers exploit browser vulnerabilities to attack deep within networks
The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security...
|Result Page: Previous 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Next |