Home | Amazing | Today | Tags | Publishers | Years | Search 
Getting Started with Oracle SOA B2B Integration: A Hands-On Tutorial
Getting Started with Oracle SOA B2B Integration: A Hands-On Tutorial

Enterprises engaging in B2B communications with their trading partners are facing increased pressure to increase automation and reduce costs. Increased compliance requirements and globalization of economies is fueling B2B adoption in every industry. Gateway solutions in Oracle SOA B2B enable these enterprises to connect easily with external...

CISSP Training Kit
CISSP Training Kit

Your 2-in-1 Self-Paced Training Kit

EXAM PREP GUIDE

Ace your preparation for Certified Information Systems Security Professional (CISSP) Exam. Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce what you’ve learned by applying
...

Fish Physiology: Organic Chemical Toxicology of Fishes, Volume 33: Fish Physiology Volume 33
Fish Physiology: Organic Chemical Toxicology of Fishes, Volume 33: Fish Physiology Volume 33

Fish Physiology: Organic Chemical Toxicology of Fishes discusses the different types of organic chemical contaminants and their respective toxic effects in fish. The book also covers the detection of dissolved organic compounds and methods to assess organic toxicity. Substances addressed in this book include organometallics,...

The Consulting Veterinary Nurse
The Consulting Veterinary Nurse

The Consulting Veterinary Nurse is an invaluable source of information for all veterinary nurses setting up and conducting their own nursing clinics in small animal practice. From the basics of setting up the consulting room to running and marketing individual clinics, this book provides a comprehensive coverage of the role of the...

Scene of the Cybercrime, Second Edition
Scene of the Cybercrime, Second Edition

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one...

Instant InnoDB
Instant InnoDB

InnoDB, the default storage engine for MySQL, is one of the most robust and commonly used in the world today. It can, however, be initially daunting to learn how to start implementing its features, and it can pose unique problems to the beginner user. This guide is written to address these problems.

"Instant InnoDB"...

Application Administrators Handbook: Installing, Updating and Troubleshooting Software
Application Administrators Handbook: Installing, Updating and Troubleshooting Software

An application administrator installs, updates, optimizes, debugs and otherwise maintains computer applications for an organization. In most cases, these applications have been licensed from a third party, but they may have been developed internally. Examples of application types include enterprise resource planning (ERP), customer resource...

Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

Must-have guide for professionals responsible for securing credit and debit card transactions

As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking...

Vmware Vcloud Security
Vmware Vcloud Security

Welcome to VMware vCloud Security. In this book, you will learn how to mitigate  the security threats on a private cloud running VMware vCloud Director. This  book will enable the reader with the knowledge, skills, and abilities to build a  highly secured private cloud running VMware vCloud. We will also look at a ...

Security Information and Event Management (SIEM) Implementation (Network Pro Library)
Security Information and Event Management (SIEM) Implementation (Network Pro Library)

Implement a robust SIEM system

Effectively manage the security information and events produced by your network with help from this authoritative guide. Written by IT security experts, Security Information and Event Management (SIEM) Implementation shows you how to deploy SIEM technologies to monitor, identify,...

Citrix® XenMobile™ Mobile Device Management
Citrix® XenMobile™ Mobile Device Management

Get up to speed with mobile device management with this fantastic, fully illustrated guide to XenMobile. From security to package deployment, it's an essential companion for the current trend of BYOD and corporate mobile devices.

Overview

  • Deploy and manage the complete XenMobile solution
  • ...
Green Electronics Manufacturing: Creating Environmental Sensible Products
Green Electronics Manufacturing: Creating Environmental Sensible Products

Going "green" is becoming a major component of the mission for electronics manufacturers worldwide. While this goal seems simplistic, it poses daunting dilemmas. Yet, to compete effectively in the global economy, manufacturers must take the initiative to drive this crucial movement. Green Electronics Manufacturing: Creating...

Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy