|
|
|
Pro HadoopYou’ve heard the hype about Hadoop: it runs petabyte–scale data mining tasks insanely fast, it runs gigantic tasks on clouds for absurdly cheap, it’s been heavily committed to by tech giants like IBM, Yahoo!, and the Apache Project, and it’s completely open source (thus free). But what exactly is it, and more... | | Pro AndroidAt a high level, this book is about writing mobile applications for devices that support the Android Platform. Specifically, the book teaches you how to write applications using the Android SDK.
Who This Book Is For
This book is for software developers interested in writing mobile applications with the Android SDK. Because... | | Lipids in Aquatic EcosystemsEvidence now suggests that the roles of essential fatty acids as growth promoters and as indices of health and nutrition are fundamentally similar in freshwater and marine ecosystems. "Lipids in Aquatic Ecosystems" integrates this divergent literature into a coordinated, digestible form. Chapters are organized so as to discuss and... |
|
Sams Teach Yourself Networking in 24 Hours (4th Edition)In just 24 sessions of one hour or less, learn how to use today’s key networking techniques and technologies to build, secure, and troubleshoot both wired and wireless networks. Using this book’s straightforward, step-by-step approach, you master every skill you need—from working with Ethernet and Bluetooth to spam prevention to... | | Blu-ray Disc DemystifiedThe Latest Tips and Techniques for Getting the Maximum from Blu-ray Technology
Blu-ray Disc Demystified provides the most current information and applications available for this popular high-definition optical disc format. Written by a team of experts with a wide range of experience in DVD and high-definition... | | Oracle Procure-to-Pay Guide (Osborne ORACLE Press Series)Some of the greatest technological advancements in business have been made in the procure-to-pay processes, not only in automation, but also in connectivity between the supplier and the purchaser. As with all areas, when technology steps in and automates the processes, the steps required to perform the automation are swept away, where they linger,... |
|
| | | | Beautiful Security: Leading Security Experts Explain How They ThinkIn this thought-provoking anthology, today's security experts describe bold and extraordinary methods used to secure computer systems in the face of ever-increasing threats. Beautiful Security features a collection of essays and insightful analyses by leaders such as Ben Edelman, Grant Geyer, John McManus, and a dozen others who have found... |
|
Result Page: 1309 1308 1307 1306 1305 1304 1303 1302 1301 1300 1299 1298 1297 1296 1295 1294 1293 1292 1291 |