Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Troubleshooting SQL Server - A Guide for the Accidental DBA
Troubleshooting SQL Server - A Guide for the Accidental DBA
I've spent much of the last six years of my working life trying to help people solve SQL Server-related performance problems, either hands-on, at client sites in my capacity as a consultant, or on various online community forums, answering people's questions.

Over that time I've been exposed to a few weird
...
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities

Master Shellcode to leverage the buffer overflow concept

Key Features

  • Understand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and Metasploit
  • Learn to write and modify 64-bit shellcode along with kernel-level shellcode...
Speech and Human-Machine Dialog (The International Series in Engineering and Computer Science)
Speech and Human-Machine Dialog (The International Series in Engineering and Computer Science)
The conjunction of several factors having occurred throughout the past
few years will make humans significantly change their behavior vis-à-vis machines.
In particular the use of speech technologies will become normal in
the professional domain, but also in everyday life. The performance of speech
recognition components
...
Real-Time Video Compression (The International Series in Engineering and Computer Science)
Real-Time Video Compression (The International Series in Engineering and Computer Science)
Real-Time Video Compression: Techniques and Algorithms introduces the XYZ video compression technique, which operates in three dimensions, eliminating the overhead of motion estimation. First, video compression standards, MPEG and H.261/H.263, are described. They both use asymmetric compression algorithms, based on motion estimation. Their...
Embedded Java Security: Security for Mobile Devices
Embedded Java Security: Security for Mobile Devices
This book is a comprehensive presentation of embedded Java security (namely, J2ME CLDC/MIDP), in the sense that the security model of embedded Java is thoroughly explained, then a detailed analysis of this model is undertaken. It is compared with the security model of Java Standard Edition in order to view the impact of limited resources (typically...
A Practical Guide to Trusted Computing
A Practical Guide to Trusted Computing
Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable

 

Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed is secure hardware. The Trusted Platform Module (TPM) makes...

Computational Methods for Modeling of Nonlinear Systems, Volume 118 (Mathematics in Science and Engineering)
Computational Methods for Modeling of Nonlinear Systems, Volume 118 (Mathematics in Science and Engineering)

In this book, we study theoretical and practical aspects of computing methods for mathematical modelling of nonlinear systems. A number of computing techniques are considered, such as methods of operator approximation with any given accuracy; operator interpolation techniques including a non-Lagrange interpolation; methods of system...

Cocoa Programming for Mac OS X (4th Edition)
Cocoa Programming for Mac OS X (4th Edition)

If you are developing applications for the Mac, or are hoping to do so, this book is just the resource you need. Does it cover everything you will ever want to know about programming for the Mac? Of course not. But it does cover probably 80% of what you need to know. You can find the remaining 20%—the 20% that is...

Blender Cycles: Lighting and Rendering Cookbook
Blender Cycles: Lighting and Rendering Cookbook

If you're already au fait with Blender, this book gives extra power to your artist's elbow with a fantastic grounding in Cycles. Packed with tips and recipes, it makes light work of the toughest concepts.

Overview

  • Get acquainted with the lighting and rendering concepts of the Blender Cycles...
Mobile and Web Messaging: Messaging Protocols for Web and Mobile Devices
Mobile and Web Messaging: Messaging Protocols for Web and Mobile Devices

Learn how to use messaging technologies to build responsive and resilient applications for mobile devices and web browsers. With this hands-on guide, you’ll use the Stomp and Mqtt messaging protocols to write iOs and web applications capable of sending and receiving Gps and device sensor data, text messages, and alerts.

...
PostgreSQL 9.0 High Performance
PostgreSQL 9.0 High Performance

PostgreSQL database servers have a common set of problems they encounter as their usage gets heavier and requirements more demanding. You could spend years discovering solutions to them all, step by step as you encounter them. Or you can just look in here.

All successful database applications are destined to eventually run into...

Java 7 Pocket Guide
Java 7 Pocket Guide

When you need quick answers for developing or debugging Java programs, this pocket guide provides a handy reference to the standard features of the Java programming language and its platform. You’ll find helpful programming examples, tables, figures, and lists, as well as supplemental information about topics including the Java...

unlimited object storage image
Result Page: 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy