Tags
Language
Tags
June 2024
Su Mo Tu We Th Fr Sa
26 27 28 29 30 31 1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30 1 2 3 4 5 6

Modern API Design with gRPC: Efficient Solutions to Design Modern APIs with gRPC Using Golang for Scalable Distributed S

Posted By: arundhati
Modern API Design with gRPC: Efficient Solutions to Design Modern APIs with gRPC Using Golang for Scalable Distributed S

Hitesh Pattanayak, "Modern API Design with gRPC: Efficient Solutions to Design Modern APIs with gRPC Using Golang for Scalable Distributed S"
English | ISBN: 8197081832 | 2024 | 397 pages | EPUB | 3 MB

The Art of Working Remotely: How to Thrive in a Distributed Workplace

Posted By: roxul
The Art of Working Remotely: How to Thrive in a Distributed Workplace

Scott Dawson, "The Art of Working Remotely: How to Thrive in a Distributed Workplace"
English | ISBN: 1733991301 | 2019 | 176 pages | EPUB | 227 KB

Advanced Data Management: For Sql, Nosql, Cloud And Distributed Databases

Posted By: arundhati
Advanced Data Management: For Sql, Nosql, Cloud And Distributed Databases

Lena Wiese, "Advanced Data Management: For Sql, Nosql, Cloud And Distributed Databases "
English | ISBN: 3110441403 | 2015 | 374 pages | PDF | 2 MB

Distributed Systems

Posted By: arundhati
Distributed Systems

Maarten van Steen, "Distributed Systems"
English | ISBN: 9081540637 | 2023 | 683 pages | PDF | 32 MB

Distributed Denial of Service Attack and Defense

Posted By: AvaxGenius
Distributed Denial of Service Attack and Defense

Distributed Denial of Service Attack and Defense by Shui Yu
English | PDF | 2014 | 104 Pages | ISBN : 1461494907 | 1.6 MB

This brief provides readers a complete and self-contained resource for information about DDoS attacks and how to defend against them. It presents the latest developments in this increasingly crucial field along with background context and survey material. The book also supplies an overview of DDoS attack issues, DDoS attack detection methods, DDoS attack source traceback, and details on how hackers organize DDoS attacks. The author concludes with future directions of the field, including the impact of DDoS attacks on cloud computing and cloud technology. The concise yet comprehensive nature of this brief makes it an ideal reference for researchers and professionals studying DDoS attacks. It is also a useful resource for graduate students interested in cyberterrorism and networking.