Home | Amazing | Today | Tags | Publishers | Years | Search 
SAS 9.2 Intelligence Platform: Security Administration Guide
SAS 9.2 Intelligence Platform: Security Administration Guide
Explains the security model for the SAS Intelligence Platform and provides instructions for performing security-related administrative tasks. The emphasis is on suite-wide aspects of the security functionality that SAS provides.

New and enhanced features in the following areas increase security and manageability:
Mike Meyers' CompTIA Network+ Certification Passport, Third Edition
Mike Meyers' CompTIA Network+ Certification Passport, Third Edition
What do you mean, you don’t have a passport? Why, it’s sitting right in your hands, even as you read! This book is your passport to a very special place.You’re about to begin a journey,my friend: a journey toward that magical place called certification! You don’t need a ticket, you don’t need a suitcase—just...
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The black hats have kept up with security enhancements. Have you?

In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution...

Oracle Database 11g DBA Handbook (Osborne Oracle Press)
Oracle Database 11g DBA Handbook (Osborne Oracle Press)
The Essential Resource for Oracle DBAs--Fully Updated and Expanded

Manage a flexible, highly available Oracle database with help from the expert information contained in this exclusive Oracle Press guide. Fully revised to cover every new feature and utility, Oracle Database 11g DBA Handbook shows how to perform a new...

WebSphere Business Integration Primer: Process Server, BPEL, SCA, and SOA (The developerWorks Series)
WebSphere Business Integration Primer: Process Server, BPEL, SCA, and SOA (The developerWorks Series)
Introductory Guide to WebSphere Business Integration from IBM

 

Using WebSphere Business Integration (WBI) technology, you can build an enterprise-wide Business Integration (BI) infrastructure that makes it easier to connect any business resources and functions, so you can adapt more...

Oracle Essentials: Oracle Database 11g
Oracle Essentials: Oracle Database 11g
Oracle is an enormous system, with myriad technologies, options, and releases. Most users-even experienced developers and database administrators-find it difficult to get a handle on the full scope of the Oracle database. And, as each new Oracle version is released, users find themselves under increasing pressure to learn about a whole range of new...
Excel Best Practices for Business: Covers Excel 2003, 2002, and 2000
Excel Best Practices for Business: Covers Excel 2003, 2002, and 2000

Everything you need to know about

  • Implementing the new XML features in Spreadsheet Portals and Web Services
  • Auditing spreadsheets provided by third parties
  • Making spreadsheets accessible to individuals with disabilities
  • Performing spreadsheet makeovers
  • Constructing...
Windows Vista Administration: The Definitive Guide
Windows Vista Administration: The Definitive Guide
Whether you're a system administrator responsible for hundreds of Windows clients, or a just a roomful of computers, this book will help you install, configure, and maintain Microsoft's newest OS. Written in jargon-free English that puts concepts in proper context, the book gives you a better understanding of Vista's innovations and capabilities,...
Mutual Fund Industry Handbook : A Comprehensive Guide for Investment Professionals
Mutual Fund Industry Handbook : A Comprehensive Guide for Investment Professionals

A behind-the-scenes look at the mutual fund industry

With more than 8,000 funds, more than $8 trillion in assets, and more than 87 million individual investors at the end of 2004, mutual funds—professionally managed pooled investment vehicles that give people the opportunity to participate in the securities market without...

Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting (Networking Technology)
Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting (Networking Technology)
When most information security professionals think about threats to their networks, they think about the threat of attackers from the outside. However, in recent years the number of computer security incidents occurring from trusted users within a company has equaled those occurring from external threats. The difference is, external threats are...
Red Hat Enterprise Linux 5 Administration Unleashed
Red Hat Enterprise Linux 5 Administration Unleashed
This comprehensive guide can help you administer Red Hat Enterprise Linux 5 effectively in any production environment, no matter how complex or challenging.

 

Long-time Red Hat insider Tammy Fox brings together today’s best practices for the entire system lifecycle, from planning and...

BusinessObjects XI (Release 2): The Complete Reference
BusinessObjects XI (Release 2): The Complete Reference
Gain the Competitive Edge with the Ultimate Resource on BusinessObjects XI Release 2

Publish actionable business reports across your enterprise using BusinessObjects XI and the detailed information contained in this one-stop resource. BusinessObjects XI: The Complete Reference explains, step-by-step, how to design...

Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy