 |
|
|
|
 Sams Teach Yourself SQL in 24 Hours (4th Edition)In just 24 lessons of one hour or less, you will learn professional techniques to design and build efficient databases and query them to extract useful information. Using a straightforward, step-by-step approach, each lesson builds on the previous one, allowing you to learn the essentials of ANSI SQL from the ground up.
... |  |  Delphi/Kylix Database DevelopmentThe aim of this book is to teach cross-platform database programming to Delphi 6 or Kylix programmers. The book will assume the reader has a basic understanding of databases, such as what tables, rows, columns, fields, indexes, etc. are. It will also assume the reader has a working knowledge of Delphi and/or Kylix. A thorough investigation of... |  |  Conquest in Cyberspace: National Security and Information WarfareWith billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies... |
|
 The Best Damn Cybercrime and Forensics Book PeriodAs is often the case with security compromises, it’s not a matter of if your company will be compromised, but when.
If I had known the employee I hired was going to resign, break into my offi ce, and damage my computers in the span of three days, hindsight being 20/20, I would have sent notifi cation to the security guards at the... |  |  |  |  Nmap in the Enterprise: Your Guide to Network ScanningRichard Stiennon, vice president at Gartner "Nmap is one of the tools in your toolbox you need as a network analyst. I would recommend everyone in the world use it to check port 135 to see if [they] have desktop servers listening on it. If you don't, you're going to be down in the next couple of weeks."
A... |
|
| Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 |