| | Cyber Security Essentials
The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and... | | Getting Started with NoSQL
Your guide to the world and technology of NoSQL
Overview
-
First hand, detailed information about NoSQL technology
-
Learn the differences between NoSQL and RDBMS and where each is useful
-
Understand the various data models for NoSQL
-
Compare and contrast some of the...
|