Home | Amazing | Today | Tags | Publishers | Years | Search 
FXRuby: Create Lean and Mean GUIs with Ruby
FXRuby: Create Lean and Mean GUIs with Ruby
FXRuby is a highly object-oriented toolkit for building lean, mean, cross-platform graphical user interfaces in Ruby. Since its initial release in 2001, FXRuby has become one of the most popular GUI choices for Ruby developers. This book is your best resource for rapidly learning how to develop powerful, sophisticated GUIs in your favorite...
Oracle Database 11g DBA Handbook (Osborne Oracle Press)
Oracle Database 11g DBA Handbook (Osborne Oracle Press)
The Essential Resource for Oracle DBAs--Fully Updated and Expanded

Manage a flexible, highly available Oracle database with help from the expert information contained in this exclusive Oracle Press guide. Fully revised to cover every new feature and utility, Oracle Database 11g DBA Handbook shows how to perform a new...

Microsoft Windows Server 2008: A Beginner's Guide (Network Professional's Library)
Microsoft Windows Server 2008: A Beginner's Guide (Network Professional's Library)

Get up and running on Microsoft Windows Server 2008 with ease

This hands-on guide covers all the essentials of deploying and administering the latest release of Microsoft's powerful, versatile network operating system. Using clear screenshots and step-by-step instructions, Microsoft...

Computers: Systems, Terms and Acronyms, 14th Edition
Computers: Systems, Terms and Acronyms, 14th Edition

Computers: Systems, Terms and Acronyms is THE technical reference for non-technical people who need to understand Information Technology. The book contains narrative coverage of IT concepts and systems written in plain English for non-technical people. It also contains more than 3,700 definitions of generic technical terms and acronyms,...

Eating the IT Elephant: Moving from Greenfield Development to Brownfield
Eating the IT Elephant: Moving from Greenfield Development to Brownfield
A Practical, Start-to-Finish Approach to Managing, Evolving, and Transforming Legacy IT Systems

 

For every IT executive, manager, architect, program leader, project leader, and lead analyst

 

...
The Financial Numbers Game: Detecting Creative Accounting Practices
The Financial Numbers Game: Detecting Creative Accounting Practices
Praise for The Financial Numbers Game

"So much for the notion 'those who can, do-those who can't, teach.' Mulford and Comiskey function successfully both as college professors and real-world financial mercenaries. These guys know their balance sheets. The Financial Numbers Game should serve as a survival manual for both
...
Sams Teach Yourself SQL in 24 Hours (4th Edition)
Sams Teach Yourself SQL in 24 Hours (4th Edition)
In just 24 lessons of one hour or less, you will learn professional techniques to design and build efficient databases and query them to extract useful information. Using a straightforward, step-by-step approach, each lesson builds on the previous one, allowing you to learn the essentials of ANSI SQL from the ground up.
Delphi/Kylix Database Development
Delphi/Kylix Database Development
The aim of this book is to teach cross-platform database programming to Delphi 6 or Kylix programmers. The book will assume the reader has a basic understanding of databases, such as what tables, rows, columns, fields, indexes, etc. are. It will also assume the reader has a working knowledge of Delphi and/or Kylix. A thorough investigation of...
Conquest in Cyberspace: National Security and Information Warfare
Conquest in Cyberspace: National Security and Information Warfare
With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies...
The Best Damn Cybercrime and Forensics Book Period
The Best Damn Cybercrime and Forensics Book Period
As is often the case with security compromises, it’s not a matter of if your company will be compromised, but when.

If I had known the employee I hired was going to resign, break into my offi ce, and damage my computers in the span of three days, hindsight being 20/20, I would have sent notifi cation to the security guards at the
...
Digital Storage in Consumer Electronics: The Essential Guide (Embedded Technology)
Digital Storage in Consumer Electronics: The Essential Guide (Embedded Technology)
This book will immediately become an indispensable reference book for the storage industry movers and shakers, developers and users. It will be a valued contribution for years to come. - Rick Wietfeldt, CTO, Emerging Technologies and Strategy, Texas Instruments, Inc.

Consumer electronics engineers, technicians, and managers,
...
Nmap in the Enterprise: Your Guide to Network Scanning
Nmap in the Enterprise: Your Guide to Network Scanning
Richard Stiennon, vice president at Gartner
"Nmap is one of the tools in your toolbox you need as a network analyst. I would recommend everyone in the world use it to check port 135 to see if [they] have desktop servers listening on it. If you don't, you're going to be down in the next couple of weeks."

A
...
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy