Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microsoft SQL Server 2012 Analysis Services: The BISM Tabular Model
Microsoft SQL Server 2012 Analysis Services: The BISM Tabular Model

When we, the authors of this book, first learned what Microsoft’s plans were for Analysis Services in the SQL Server 2012 release, we were not happy. Analysis Services hadn’t acquired much in the way of new features since 2005, even though in the meantime it had grown to become the biggest-selling OLAP tool. It seemed as...

Windows PowerShell Best Practices
Windows PowerShell Best Practices

Expert recommendations, pragmatically applied.

Automate system administration using Windows PowerShell best practices—and optimize your operational efficiency. With this practical guide, Windows PowerShell expert and instructor Ed Wilson delivers field-tested tips, real-world examples, and candid advice culled from...

Windows Server 2012 R2 Pocket Consultant Volume 2: Storage, Security, & Networking
Windows Server 2012 R2 Pocket Consultant Volume 2: Storage, Security, & Networking

Portable and precise, this pocket-sized guide delivers ready answers for administering storage, security, and networking features in Windows Server 2012 R2. Zero in on core tasks through quick-reference tables, instructions, and lists. You'll get the focused information you need to save time and get the job done - whether at your desk or...

Microsoft ADO.NET Entity Framework Step by Step (Step By Step (Microsoft))
Microsoft ADO.NET Entity Framework Step by Step (Step By Step (Microsoft))
Gaining access to data in a managed way without a lot of coding—that’s a tall order! The Entity Framework fulfills this promise and far more. Each version of the Entity Framework is more capable than the last. The latest version, Entity Framework version 5, provides you with access to far more database features with less...
Inside Windows Debugging: A Practical Guide to Debugging and Tracing Strategies in Windows
Inside Windows Debugging: A Practical Guide to Debugging and Tracing Strategies in Windows
One exciting aspect of software programming is that there are usually many ways to accomplish the same goal. Unfortunately, this also presents software engineers with unique challenges when trying to make the best design or implementation choice for each situation. Experience plays a major role, and the learning...
Windows Server 2008 PKI and Certificate Security (PRO-Other)
Windows Server 2008 PKI and Certificate Security (PRO-Other)
Get in-depth guidance for designing and implementing certificate-based security solutions straight from PKI expert Brian Komar. No need to buy or outsource costly PKI services when you can use the robust PKI and certificate-based security services already built into Windows Server 2008! This in-depth reference teaches you how to design and...
Inside Ole (Microsoft Programming Series)
Inside Ole (Microsoft Programming Series)
In writing this book, I assumed that readers are familiar with the Windows API (primarily the Win32 API) because OLE itself, unlike Win32, is not a technology for writing a complete application (although you could build one out of OLE components). I don't describe how to use Windows API functions, nor do I describe any of the intricate details of...
Developing International Software for Windows 95 and Windows NT (Microsoft Programming Series)
Developing International Software for Windows 95 and Windows NT (Microsoft Programming Series)

In the late 1980s, Microsoft's International Product Group (IPG), the team responsible for creating most of the localized versions of Microsoft products, distributed a booklet internally that contained guidelines for writing code that accommodated the needs of international developers and users. The International Handbook for Software...

Writing Secure Code
Writing Secure Code

Improving security was a major focus while we were developing Windows 2000. At one point, we decided to run an unusual experiment to test the product’s mettle before we released it. We set up a Windows 2000 Web server called “Windows2000test.com,” put it out there, and waited to see what happened. We made no...

Building Secure Microsoft ASP.NET Applications: Authentication, Authorization, and Secure Communication
Building Secure Microsoft ASP.NET Applications: Authentication, Authorization, and Secure Communication

Building secure distributed Web applications can be challenging. It usually involves integrating several different technologies and products—yet your complete application will only be as secure as its weakest link. This guide presents a practical, scenario-driven approach to designing and building secure ASP.NET applications for...

Optimizing Windows 7 Pocket Consultant
Optimizing Windows 7 Pocket Consultant

Portable and precise, this pocket-sized guide delivers ready answers for optimizing the performance of your Windows 7-based PC. Zero in on core tuning, customization, and troubleshooting tasks using quick-reference tables, instructions, and lists. Topics include system boot and startup, software and hardware, search and indexing, system...

Microsoft Office 365 Administration Inside Out
Microsoft Office 365 Administration Inside Out

Conquer Microsoft Office 365 administration—from the inside out!

Dive into Office 365 administration—and really put your systems expertise to work! This supremely organized reference packs hundreds of timesaving solutions, troubleshooting tips, and workarounds. Discover how the experts tackle deployment,...

Result Page: 64 63 62 61 60 59 58 57 56 55 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy