Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Protecting SQL Server Data
Protecting SQL Server Data

For as long as there has been something to communicate between two persons there has been data. Today, vast volumes of it are gathered about almost every individual and business. It is the information that we provide when we sign up for an account at our favorite website, fill out a job application, or apply for a mortgage.

These...

Managing Enterprise Content: A Unified Content Strategy (2nd Edition) (Voices That Matter)
Managing Enterprise Content: A Unified Content Strategy (2nd Edition) (Voices That Matter)
A unified content strategy is about much more than just content. It’s about how you create content once and how you publish many times from that content. It’s about pulling together the best practices, guidelines, and content structure your organization needs to enable you to rapidly design, build, test, and deliver a...
Terrorism and Public Safety Policing: Implications for the Obama Presidency
Terrorism and Public Safety Policing: Implications for the Obama Presidency

A Pragmatic Answer to the Systematic Change Already Underway

The trends, data, and battle-tested logic do not lie. A perfect storm of extremist ideologies is on the horizon that threatens to challenge the current state of public safety—forcing police chiefs, public administrators, and security...

Arthur: God and Hero in Avalon
Arthur: God and Hero in Avalon
For fifteen centuries, legends of King Arthur have enthralled us. Born in the misty past of a Britain under siege, half-remembered events became shrouded in ancient myth and folklore. The resulting tales were told and retold, until over time Arthur, Camelot, Avalon, the Round Table, the Holy Grail, Excalibur, Lancelot, and...
Hacking Exposed Cisco Networks
Hacking Exposed Cisco Networks

Implement bulletproof Cisco security the battle-tested Hacking Exposed way

Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised...

Pro JavaScript for Web Apps
Pro JavaScript for Web Apps
Client-side web app development has always been the poor cousin to server-side coding. This started because browsers and the devices they run on have been less capable than enterprise-class servers. To provide any kind of serious web app functionality, the server had to do all of the heavy lifting for the browsers, which was pretty...
PHP Team Development
PHP Team Development
Given the nature of the business environment today, organizations that want to build value-added enterprise PHP applications need a team of PHP people rather than an individual. You've got a team! What next? Customizing such applications to meet with organizational objectives and maintaining these applications over time can be quite a tedious task...
Oracle Database 11g New Features
Oracle Database 11g New Features
Oracle Database 11g is the newest release of Oracle’s flagship database product. It contains a number of new innovations, which we cover in the pages of this book. This is my third Oracle “New Features” book for Oracle Press, and I’ve actually been writing them since Oracle 8.0 was released. For each book, it’s been an...
Starting Strength (2nd edition)
Starting Strength (2nd edition)
Many things have happened since I started the writing of Starting Strength: A Simple and Practical Guide for Coaching Beginners in 2004. As a result of its publication I have had the opportunity to meet and learn from many new people. It is my sincerest hope that the additions to this book that are the direct result of their input...
Visual C# Game Programming for Teens
Visual C# Game Programming for Teens

Imagine this scenario: You create a hunter character with random stats and hit points and enter the dungeon to begin exploring for treasure. You stumble upon a zombie pacing near a pile of gear and gold! You attack the zombie and it strikes back! You roll 1D20 and score a critical hit! The 20 point die plus dexterity, against the...

Git in Practice
Git in Practice

Summary

Git in Practice is a collection of 66 tested techniques that will optimize the way you and your team manage your development projects. The book begins with a brief reminder of the core version control concepts you need when using Git and moves on to the high-value features you may not have explored...

HIV, Resurgent Infections and Population Change in Africa (International Studies in Population)
HIV, Resurgent Infections and Population Change in Africa (International Studies in Population)

Forty years ago, the age-old battle against infectious diseases as a major threat to human health was believed close to being won. However, by the late twentieth century, the increase of emerging and reemerging infectious diseases was evident in both low and high income countries. About 30 new infectious diseases have been identified in the...

Result Page: 15 14 13 12 11 10 9 8 7 6 5 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy