|
|
|
|
|
The Firebird Book: A Reference for Database DevelopersThe Firebird Book: A Guide for Database Developers is a comprehensive, practical guide for developing client/server FirebirdSQL database applications for small and large networks of users. FirebirdSQL is an open source database, and while not as popular as MySQL or PostgreSQL, it has a dedicated following, and has far more advanced features. ... | | Secure Java: For Web Application Development
Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure... | | Schizophrenia: A New Guide for Clinicians (Medical Psychiatry Series)
Contains guidelines and recommendations-in tabular form for quick reference-on patient evaluation and optimal treatment for long-term care!
Based on evidence from recent systematic clinical research studies, this comprehensive reference provides the latest information on the assessment, diagnosis, and treatment of... |
|
How to Cheat at IT Project ManagementUnlike any other book you'll find, this IT project management book synthesizes project management fundamentals, IT processes and procedures, and business fundamentals. Learn how to align your IT projects to the company's strategic objectives. Also learn how to determine which project will solve the right problem at the right time while still... | | | | |
|
The Best Damn Exchange, SQL and IIS Book PeriodExchange, SQL and IIS are at the core of most Microsoft enterprise servers. The 2007 releases of these products, along with the release of Windows Vista and Windows 2008 Server, represents the biggest overhaul of Windows enterprise products since Windows 2000. The dramatic changes to security tools and the addition of features that support... | | Posix Programmers GuideThis guide, intended as an explanation of the POSIX standard and as a reference for the POSIX.1 programming library, helps you write more portable programs. Most UNIX systems today are POSIX compliant because the federal government requires it for its purchases. Even OSF and UI agree on support for POSIX. Unfortunately, given the manufacturer's... | | Scene of the Cybercrime, Second Edition
When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one... |
|
|
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 |