Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Securing SQL Server: Protecting Your Database from Attackers
Securing SQL Server: Protecting Your Database from Attackers

As you move through this book you may notice that this book doesn’t gently flow from one topic to another like a lot of technical books.This is intentional asmany of the subjects covered in this book are going to be related, but separate fields of study. As you move through the various chapters in this book you’ll be able to...

Salesforce CRM Admin Cookbook
Salesforce CRM Admin Cookbook

Over 40 recipes to make effective use of Salesforce CRM with the use of hidden features, advanced user interface techniques, and real-world solutions

Overview

  • Implement advanced user interface techniques to improve the look and feel of Salesforce CRM
  • Discover hidden features and hacks that...
Performance Tuning for Linux(R) Servers
Performance Tuning for Linux(R) Servers
Proven techniques for optimizing web, file, print, database, and application servers Practical introductions to open source performance management tools Easy-to-understand examples based on Red Hat Enterprise Linux and Novell SUSE Linux Enterprise ServerAn indispensable guide to maximizing Linux system and application performanceFrom Wall...
Microsoft Windows 2000 Server Administrator's Companion, Second Edition
Microsoft Windows 2000 Server Administrator's Companion, Second Edition

When the first edition of this book was published in 2000 coinciding with the release of the Microsoft Windows 2000 family of operating systems, we were extremely gratified by the positive reception from network administrators and others interested in Windows 2000 Server. We're very proud of the book and think it's a worthwhile resource for...

Understanding DB2 9 Security
Understanding DB2 9 Security
Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world...
Robohelp for the Web
Robohelp for the Web
This guide explains the use and administration of eHelp's latest software package, emphasizing administrator setup and maintenance.

Provides with an explanation of installing and configuring RoboHelp and presents an outline for creating a documentation plan. Softcover. CD-ROM included.

RoboHelp Enterprise is
...
Pentaho Kettle Solutions: Building Open Source ETL Solutions with Pentaho Data Integration
Pentaho Kettle Solutions: Building Open Source ETL Solutions with Pentaho Data Integration

A complete guide to Pentaho Kettle, the Pentaho Data lntegration toolset for ETL

This practical book is a complete guide to installing, configuring, and managing Pentaho Kettle. If you’re a database administrator or developer, you’ll first get up to speed on Kettle basics and how to apply Kettle to create ETL...

Unix Unleashed: Internet Edition
Unix Unleashed: Internet Edition
The first edition of Unix Unleashed provided a thick, comprehensive guide to the basic tools of the Unix trade, covering everything from system administration to the windowing system to the compiler environments. The guide also featured information on other tools, such as the vi editor, the command shells, the AWK, PERL, C and C++...
.NET Framework Security
.NET Framework Security
Welcome! The book you hold in your hands is a comprehensive guide and roadmap to the security infrastructure of the Microsoft .NET Framework. The .NET Framework is Microsoft's new cross-language development environment for building rich client applications and XML Web Services. One of the key features of the .NET Framework is a robust security...
Linux Networking Cookbook
Linux Networking Cookbook
This soup-to-nuts collection of recipes covers everything you need to know to perform your job as a Linux network administrator, whether you're new to the job or have years of experience. With Linux Networking Cookbook, you'll dive straight into the gnarly hands-on work of building and maintaining a computer network. Running a network doesn't mean...
Java Security (2nd Edition)
Java Security (2nd Edition)
One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is...
The Definitive Guide to Linux Network Programming (Expert's Voice)
The Definitive Guide to Linux Network Programming (Expert's Voice)

This book is…one nice and convenient package that I will keep on the shelf as a reference manual.

The Definitive Guide to Linux Network Programming offers a clear, concise treatment of creating clients and servers under the Linux operating system. This book assumes that you know C and have experience developing code on...

Result Page: 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy