Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
ASP.NET 3.5 Enterprise Application Development with Visual Studio 2008: Problem Design Solution
ASP.NET 3.5 Enterprise Application Development with Visual Studio 2008: Problem Design Solution
Aimed at enterprise developers who use Visual Studio 2008, ASP.NET, C#, and SQL Server to deliver business applications, this book focuses on implementing patterns that can be used for real-world solutions. Each chapter establishes a problem, examines which solution will provide the best results, and then demonstrates how to go about executing that...
Successful Software Reengineering
Successful Software Reengineering
Software process reengineering has become highly visible over the past several years. Efforts are being undertaken by organizations of all types and sizes as they attempt to deal with the challenges of quality, complexity, and competitiveness. These efforts rely on the successful integration of many technical, organizational, and methodological...
BusinessObjects XI (Release 2): The Complete Reference
BusinessObjects XI (Release 2): The Complete Reference
Gain the Competitive Edge with the Ultimate Resource on BusinessObjects XI Release 2

Publish actionable business reports across your enterprise using BusinessObjects XI and the detailed information contained in this one-stop resource. BusinessObjects XI: The Complete Reference explains, step-by-step, how to design...

Microsoft Log Parser Toolkit
Microsoft Log Parser Toolkit
Do you want to find Brute Force Attacks against your Exchange Server? Would you like to know who is spamming you? Do you need to monitor the performance of your IIS Server? Are there intruders out there you would like to find? Would you like to build user logon reports from your Windows Server? Would you like to export your logs to XML? Would you...
Oracle Self-Service Applications (Osborne ORACLE Press Series)
Oracle Self-Service Applications (Osborne ORACLE Press Series)

Maximize the Capabilities of Oracle Self-Service Applications

Get complete coverage of Oracle E-Business Suite's self-service modules, including Oracle iProcurement, Oracle Internet Expenses, Oracle iSupplier Portal, and Oracle iReceivables, inside this Oracle Press guide. Oracle Self-Service Applications discusses the...

Core Concepts of Accounting Information Systems
Core Concepts of Accounting Information Systems

Information technologies impact every aspect of accounting, including financial reporting, managerial accounting, auditing, and tax. The nature of the work done by accountants continues to evolve as these technologies advance. For example, less than 30 years ago, accountants could have spent much of their day footing ledgers and making...

Auditing Information Systems
Auditing Information Systems

Auditing Information Systems, Second Edition, explains clearly how to audit the controls and security over all types of information systems environments. The concepts and techniques in the book enable auditors, information security professionals, managers, and audit committee members of every knowledge and skill level to truly...

Anti-Hacker Tool Kit, Third Edition
Anti-Hacker Tool Kit, Third Edition
THWART THE LATEST DISASTROUS ATTACKS

Mount a comprehensive, proactive defense against the most sinister cyber-criminals using the tricks and techniques contained in this unique resource. Fully updated to include the latest weapons in the security experts; arsenal, Anti-Hacker Tool Kit, Third Edition provides all the...

The Audit Committee Handbook
The Audit Committee Handbook

The Audit Committee Handbook,

Fifth Edition

The classic handbook to audit committee responsibilities—completely updated to cover the latest guidance with practical insights on the new functions of the audit committee.

Now containing the newest regulatory guidance impacting audit committees, including new...

Microsoft Dynamics AX 2012 Security How-To
Microsoft Dynamics AX 2012 Security How-To

Securing ERP is the main issue nowadays; it is not only about bits and bytes of network traffic, but also about business transactions, users' privileges and access rights. Hackers raise their awareness to hack and attack ERP systems as the information becomes the vital weapon these days. So securing your ERP is not only about internal...

Computer Forensics: Computer Crime Scene Investigation (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (Networking Series)
The Most Comprehensive, Up-to-Date, Reference on Computer Forensics! Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package...
Java EE 6 Cookbook for Securing, Tuning, and Extending Enterprise Applications
Java EE 6 Cookbook for Securing, Tuning, and Extending Enterprise Applications
Java Platform, Enterprise Edition is a widely used platform for enterprise server programming in the Java programming language.

This book covers exciting recipes on securing, tuning, and extending Enterprise Applications using a Java EE 6 implementation.

The book starts with the essential changes in Java EE
...
unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy