Linux Recipes for Oracle DBAsLinux Recipes for Oracle DBAs is an example–based book on managing Oracle Database in a Linux environment. Covering commonly used distributions such as Red Hat Enterprise Linux and Oracle Enterprise Linux, the book is written for database administrators who need to get work done and lack the luxury of curling up fireside with a stack of Linux documentation. The book is task-oriented: Look up the task to perform. See the solution. Read up on the details. Get the job done.
Linux Recipes for Oracle DBAs is a book for Oracle database administrators who want to expertly operate Oracle databases on the Linux operating system. If you're new to Linux, or are migrating from a Unix platform, or just want detailed solutions for tasks that Oracle DBAs perform on Linux servers, this book is for you. ...
Learn Objective-C for Java DevelopersLearn Objective-C for Java Developers will guide experienced Java developers into the world of Objective-C. It will show them how to take their existing language knowledge and design patterns and transfer that experience to Objective-C and the Cocoa runtime library. This is the express train to productivity for every Java developer who has dreamed of developing for Mac OS X or iPhone, but felt that Objective-C was too intimidating. So hop on and enjoy the ride!
Experienced Java developers interested in developing native applications for Apple's Mac OS X operating system, iPhone, and iPod touch. ...
Intel Trusted Execution Technology for Server PlatformsIntel Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as well as establishing a launch control policy that he can use to customize the server's boot process to fit the datacenter's requirements. This book explains how the OS (typically a Virtual Machine Monitor or Hypervisor) and supporting software can build on the secure facilities afforded by Intel TXT to provide additional security features and functions. It provides examples how the datacenter can create and use trusted pools. ...
Practical OpenCVPractical OpenCV is a hands-on project book that shows you how to get the best results from OpenCV, the open-source computer vision library.
Computer vision is key to technologies like object recognition, shape detection, and depth estimation. OpenCV is an open-source library with over 2500 algorithms that you can use to do all of these, as well as track moving objects, extract 3D models, and overlay augmented reality. It's used by major companies like Google (in its autonomous car), Intel, and Sony; and it is the backbone of the Robot Operating System's computer vision capability. In short, if you're working with computer vision at all, you need to know OpenCV. ...
Pro Node.js for DevelopersSince it's creation in 2009, Node.js has grown into a powerful and increasingly popular asynchronous-development framework for creating highly-scalable network applications using JavaScript. Respected companies such as Dow Jones and LinkedIn are among the many organizations to have seen Node's potential and adopted it into their businesses.
Pro Node.js for Developers provides a comprehensive guide to this exciting new technology. We introduce you to Node – what it is, why it matters and how to set it up – before diving deeply into the key concepts and APIs that underpin its operation. ...
Windows 8 Apps Revealed Using HTML5 and JavaScriptWindows 8 contains Microsoft's revolutionary new application framework for building dynamic and responsive touch-enabled applications that target both desktops and mobile devices.
Experienced author Adam Freeman invites you to take a crash course in Windows 8 development. Using the open standards of HTML5 and JavaScript, he ensures you understand the changes that are being made to Windows development practices and puts you on the right course to creating innovative and elegant applications for this latest evolution of the world's most successful operating system. ...
Pro Puppet, 2nd EditionPro Puppet, Second Edition, now updated for Puppet 3, is an in-depth guide to installing, using, and developing the popular configuration management tool Puppet.
Puppet provides a way to automate everything from user management to server configuration. You'll learn how Puppet has changed in the latest version, how to use it on a variety of platforms, including Windows, how to work with Puppet modules, and how to use Hiera.
Puppet is a must-have tool for system administrators, and Pro Puppet will teach you how to maximize its capabilities and customize it for your environment. ...
Oracle Database 12c Performance Tuning RecipesPerformance problems are rarely "problems" per se. They are more often "crises" during which you're pressured for results by a manager standing outside your cubicle while your phone rings with queries from the help desk. You won't have the time for a leisurely perusal of the manuals, nor to lean back and read a book on theory. What you need in that situation is a book of solutions, and solutions are precisely what Oracle Database 12c Performance Tuning Recipes delivers.
Oracle Database 12c Performance Tuning Recipes is a ready reference for database administrators in need of immediate help with performance issues relating to Oracle Database. The book takes an example-based approach, wherein each chapter covers a specific problem domain. Within each chapter are "recipes," showing by example how to perform common tasks in that chapter's domain. Solutions in the recipes are backed by clear explanations of background and theory from the author team. Whateve ...
The Privacy Engineer's ManifestoThe Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy.
The authors, a uniquely skilled team of longtime industry experts, detail how you can build privacy into products, processes, applications, and systems. The book offers insight on translating the guiding light of OECD Privacy Guidelines, the Fair Information Practice Principles (FIPPs), Generally Accepted Privacy Principles (GAPP) and Privacy by Design (PbD) into concrete concepts that organizations, software/hardware engineers, and system administrators/owners can understand and apply throughout the product or process life cycle - regardless of development methodology - from inception to retirement, including data deletion and destruction. ...
Digital Asset ManagementDigital Asset Management: Content Architectures, Project Management, and Creating Order out of Media Chaos is for those who are planning a digital asset management system or interested in becoming digital asset managers. This book explains both the purpose of digital asset management systems and why an organization might need one. The text then walks readers step-by-step through the concerns involved in selecting, staffing, and maintaining a DAM. This book is dedicated to providing you with a solid base in the common concerns, both legal and technical, in launching a complex DAM capable of providing visual search results and workflow options.
Containing sample job models, case studies, return on investment models, and quotes from many top digital asset managers, this book provides a detailed resource for the vocabulary and procedures associated with digital asset management. It can even serve as a field guide for system and implementation requirements you may need to consider. ...