|
|
|
|
|
Database Administration: The Complete Guide to Practices and Procedures"One of Craig's hallmarks is his ability to write in a clear, easy-to-read fashion. The main purpose of any technical book is to transfer information from writer to reader, and Craig has done an excellent job. He wants the reader to learn—and it shows." —Chris Foot, Senior Oracle Certified Instructor,... | | | | Conquest in Cyberspace: National Security and Information WarfareWith billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies... |
|
IBM Cognos 8 Report Studio Cookbook
Cognos Report Studio is widely used for creating and managing business reports in medium to large companies. It is simple enough for any business analyst, power user, or developer to pick up and start developing basic reports. However, when it comes to developing more sophisticated, fully functional business reports for wider audiences,... | | Analyzing Computer Systems Performance: With Perl: PDQAnalyzing computer system performance is often regarded by most system administrators, IT professionals and software engineers as a black art that is too time consuming to learn and apply. Finally, this book by acclaimed performance analyst Dr. Neil Gunther makes this subject understandable and applicable through programmatic examples. The means... | | Principles and Practice of Analytical Chemistry"... excellent and comprehensive..." - Analyst
"... a recommended text for all analytical chemistry undergraduates for many years." - Education and Chemistry
"... a valuable reference manual." - European Journal of Pharmacological Biopharmacy
A concise... |
|
| | | | Hack Proofing Sun Solaris 8Two of Sun Solaris's prime attractions are its reliability and the high availability of servers running it. These advantages can be, however, negated by carelessness. Forget to apply a patch, or neglect to synchronize your servers' system clocks, and someone who's paying more attention will exploit the holes you've left in your system. The authors... |
|
|
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 |