eBooks-it.org Logo
eBooks-IT.org Inner Image

Feb 24 2015 Added eBooks Page 2

Download free Feb 24 2015 Added eBooks Page 2

Microsoft Exchange Server 2010

Unleashed
Microsoft Exchange Server 2010 Image
Microsoft Exchange Server 2010 Unleashed is the ultimate guide to designing, deploying, managing, troubleshooting, and supporting any Exchange Server 2010 environment, no matter how large or complex. Drawing on their extensive experience with hundreds of enterprise Exchange Server environments--including Exchange Server 2010 early adopters--the authors thoroughly cover every stage of the Exchange Server 2010 lifecycle. They present detailed recommendations, proven tips and tricks, and step-by-step techniques for implementation and migration planning, architecture, installation, administration, security, monitoring, integration, availability, optimization, and much more. Rand Morimoto and his expert colleagues also offer indispensable practical gu...

Handbook of Fingerprint Recognition

Handbook of Fingerprint Recognition Image
With their proven individuality and stability over time, fingerprints continue to be the most widely used physiological characteristic in systems that automatically recognize a person's identity. This handbook on automatic fingerprint recognition provides in-depth coverage of the most recent advances and practices. Readers will find comprehensive and authoritative coverage of all the major concepts, topics, and security methods associated with fingerprint recognition systems. Coverage includes: sensing, feature extraction and matching, synthetic fingerprint image generation, indexing, and multimodal systems. Features Benefits: * Covers the latest research in fingerprint-based recognition algorithms and techniques * Provides introductory material o...

Black Hat Physical Device Security

Exploiting Hardware and Software
Black Hat Physical Device Security Image
Black Hat, Inc. is the premier, worldwide provider of security training, consulting, and conferences. In this book the Black Hat experts show readers the types of attacks that can be done to physical devices such as motion detectors, video monitoring and closed circuit systems, authentication systems, thumbprint and voice print devices, retina scans, and more.The Black Hat Briefings held every year in Las Vegas, Washington DC, Amsterdam, and Singapore continually expose the greatest threats to cyber security and provide IT mind leaders with ground breaking defensive techniques. There are no books that show security and networking professionals how to protect physical security devices. This unique book provides step-by-step instructions for assessing ...

Hadoop in Action

Hadoop in Action Image
Hadoop in Action teaches readers how to use Hadoop and write MapReduce programs. The intended readers are programmers, architects, and project managers who have to process large amounts of data offline. Hadoop in Action will lead the reader from obtaining a copy of Hadoop to setting it up in a cluster and writing data analytic programs. The book begins by making the basic idea of Hadoop and MapReduce easier to grasp by applying the default Hadoop installation to a few easy-to-follow tasks, such as analyzing changes in word frequency across a body of documents. The book continues through the basic concepts of MapReduce applications developed using Hadoop, including a close look at framework components, use of Hadoop for a variety of data analysis task...

HBase

The Definitive Guide
HBase Image
If you're looking for a scalable storage solution to accommodate a virtually endless amount of data, this book shows you how Apache HBase can fulfill your needs. As the open source implementation of Google's BigTable architecture, HBase scales to billions of rows and millions of columns, while ensuring that write and read performance remain constant. Many IT executives are asking pointed questions about HBase. This book provides meaningful answers, whether you're evaluating this non-relational database or planning to put it into practice right away.Discover how tight integration with Hadoop makes scalability with HBase easierDistribute large datasets across an inexpensive cluster of commodity serversAccess HBase with native Java clients, or with gate...


2007 - 2017 © eBooks-IT.org