Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Oracle Internals: Tips, Tricks, and Techniques for DBAs
Oracle Internals: Tips, Tricks, and Techniques for DBAs

If you are a typical Oracle professional, you don't have the luxury of time to keep up with new technology and read all the new manuals to understand each new feature of each release of Oracle. You need a comprehensive source of information and techniques for using the new technology. You need Oracle Internals: Tips, Tricks, and...

Official (ISC)2 Guide to the CSSLP CBK, Second Edition ((ISC)2 Press)
Official (ISC)2 Guide to the CSSLP CBK, Second Edition ((ISC)2 Press)

The text allows readers to learn about software security from a renowned security practitioner who is the appointed software assurance advisor for (ISC)2. Complete with numerous illustrations, it makes complex security concepts easy to understand and implement. In addition to being a valuable resource for those studying for the CSSLP...

Security in Distributed, Grid, Mobile, and Pervasive Computing
Security in Distributed, Grid, Mobile, and Pervasive Computing
Despite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, Security in Distributed, Grid, Mobile, and Pervasive Computing focuses on the increasing demand to guarantee...
Database Design Using Entity-Relationship Diagrams (Foundations of Database Design)
Database Design Using Entity-Relationship Diagrams (Foundations of Database Design)

Essential to database design, entity-relationship (ER) diagrams are known for their usefulness in mapping out clear database designs. They are also well-known for being difficult to master. With Database Design Using Entity-Relationship Diagrams, Second Edition, database designers, developers, and students preparing...

Service-Oriented Architecture: SOA  Strategy, Methodology, and Technology
Service-Oriented Architecture: SOA Strategy, Methodology, and Technology
Aggressively being adopted by organizations in all markets, service-oriented architecture (SOA) is a framework enabling business process improvement for gaining competitive advantage. Service-Oriented Architecture (SOA): Strategy, Methodology, and Technology guides you through the challenges of deploying SOA. It demonstrates conclusively that...
Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks
Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks
An organizations employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regarding the company and its customers. This makes employees prime candidates for sabotaging a system if they become disgruntled or for selling privileged information if they become greedy. Insider...
Security Strategy: From Requirements to Reality
Security Strategy: From Requirements to Reality

Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and...

Performance Modeling and Analysis of Bluetooth Networks: Polling, Scheduling, and Traffic Control
Performance Modeling and Analysis of Bluetooth Networks: Polling, Scheduling, and Traffic Control

Performance Modeling and Analysis of Bluetooth Networks: Polling, Scheduling, and Traffic Control summarizes the research on the performance of Bluetooth networks, including both piconets and scatternets, conducted since 2001. The book provides insights into the performance of Bluetooth networks through an analytical approach based upon...

Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition
Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition
An identity management system is defined as the management of the identity life cycle of entities (subjects or objects) during which the identity is established, described, and destroyed. What this definition fails to cover is the social, personal, and financial impact of the identity life cycle.

Before I joined Oracle as director of GRC
...
Network Design: Principles and Applications
Network Design: Principles and Applications
NETWORK DESIGN IS A COMPLEX PROCESS, requiring knowledge of several disciplines to include engineering, financial analysis, and computer science. Although the network design process was never simple, advances in technology and the introduction of new networking communications facilities and products resulted in a difficult endeavor becoming more...
Six Sigma Software Development, Second Edition
Six Sigma Software Development, Second Edition
Even though Six Sigma programs have successfully been implemented in practice, many IT departments remain skeptical of the process or are unaware of how the tools can be used to improve system development. Removing the mystique surrounding this technique, Six Sigma Software Development, Second Edition demonstrates how Six Sigma tools and concepts...
VMware ESX Essentials in the Virtual Data Center
VMware ESX Essentials in the Virtual Data Center
The VMware ESX server is vital to virtualization methods used to perform server consolidation, software development, test automation, legacy Windows migration, and more. Server virtualization can drastically cut business costs, and considering that there are few experts in the field, VMware ESX Essentials in the Virtual Data...
unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy