 |
|
 Foundations of Mac OS X Leopard Security (Books for Professionals by Professionals)A common misconception in the Mac community is that the Mac is more secure than any other operating system on the market. Although this might be true in most side-by-side analyses of security features right out of the box, what this isn’t taking into account is that security tends to get overlooked once the machine starts to be configured for... |  |  Microsoft Expression Design on DemandSEE HOW TO:
• Create, open, and save Expression Design documents
• Navigate documents easily by zooming and scrolling
• Understand how to use the Expression Design interface controls
... |  |  |
|
 Creating Lightweight Components with ATLCreating Lightweight Components with ATL covers ATL in depth, including an overview of COM development, then drills down to explain how ATL implements the fundamentals of COM. It also details how small, lightweight ATL-based COM solutions can be created to solve 'real world' problems. Creating Lightweight Controls with ATL enables you to quickly... |  |  |  |  Vatican assassins: "wounded in the house of my friends"Eric Jon Phelps gives the past and present diabolical history of the Society of Jesus. Its Second Thirty Years' War (1914-1945), including the Jewish, Lutheran, Orthodox and Buddhist Holocausts, was vengeance for the Order's expulsion from Europe and Asia during the Nineteenth Century.
Its Cold War was the coninuation of the killing of... |
|
 Oracle Database 11g DBA Handbook (Osborne Oracle Press)The Essential Resource for Oracle DBAs--Fully Updated and Expanded
Manage a flexible, highly available Oracle database with help from the expert information contained in this exclusive Oracle Press guide. Fully revised to cover every new feature and utility, Oracle Database 11g DBA Handbook shows how to perform a new... |  |  Mainframe Basics for Security Professionals: Getting Started with RACFSecurity—it comes in many forms in the IT world: physical security around a data center, user ID authentication when a transaction gets executed, access control against a database, audit records for anomaly detection. All these forms can be bought and paid for, yet, one element must be taught. That is, the human, the person who administers... |  |  The Art of Systems Architecting, Second EditionThe only way to develop this skill is to serve an apprenticeship with a proven practitioner. However, there are simply not enough gurus to go around, and I would recommend this book both for students of the discipline and as serious reading for experienced designers who wish to recognize and maintain their expertise. -E. James in Computing... |
|
 Design of Industrial Information SystemsLong term growth in productivity is critically important to improving the standard of living of our society. Over the past ten years (1996–2005), average annual productivity growth in the non-farm business sector has been twice as high as it was in the prior fi fteen years (1981–1995). In the manufacturing sector, it has been even more... |  |  CCNA Exam Cram (Exam 640-802) (3rd Edition)“The CCNA exam is difficult and I would not have passed it if I did not have this book with me. The CCNA Exam Cram is an indispensable resource that guided me from the introduction of networking fundamentals to the application of networking theories. Whether you need to learn from scratch or just need a quick reference, this book is an... |  |  |
|
| Result Page: 300 299 298 297 296 295 294 293 292 291 290 289 288 287 286 285 284 283 282 |