Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Business Services Orchestration: The Hypertier of Information Technology
Business Services Orchestration: The Hypertier of Information Technology

Business Services Orchestration (BSO) is a new, unique, far-reaching industry technology encompassing the art of harmoniously organizing the interactions between business services. These business services may represent internal business processes of organizations. Integration of many of these internal legacy, custom, and COTS applications may,...

SQL: The Complete Reference, Second Edition
SQL: The Complete Reference, Second Edition
The Most Comprehensive SQL Resource Available

Get in-depth details on all the powerful features and capabilities of SQL inside this one-stop guide. Featuring broad coverage of every aspect of this leading database language, this book provides you with an overview of SQL then shows you how to retrieve and update data, program with SQL, use...

About Face 3: The Essentials of Interaction Design
About Face 3: The Essentials of Interaction Design
When the first edition of About Face was published in 1995, the idea of designing products based on human goals was a revolutionary concept. Thanks to the work of Alan Cooper and other pioneers, interaction design is now widely recognized as a unique and vital discipline, but our work is far from finished.

This completely updated volume...

Oracle PL/SQL Best Practices
Oracle PL/SQL Best Practices
In this compact book, Steven Feuerstein, widely recognized as one of the world's leading experts on the Oracle PL/SQL language, distills his many years of programming, teaching, and writing about PL/SQL into a set of best practices-recommendations for developing successful applications. Covering the latest Oracle release, Oracle Database 11g,...
Aggressive Network Self-Defense
Aggressive Network Self-Defense
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • ...
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness

Information technology is an increasingly large factor in legal proceedings. In cases large and small, from the U.S. Government's antitrust suit against Microsoft Corporation, to civil lawsuits filed over the failure of a network, to criminal cases in which the authenticity of electronic evidence is questioned, the testimony of a technical...

Oracle SQL: the Essential Reference
Oracle SQL: the Essential Reference
SQL (Structured Query Language) is the heart of a relational database management system. It's the language used to query the database, to create new tables in the database, to update and delete database fields, and to set privileges in the database. Oracle SQL: The Essential Reference is for everyone who needs to access an Oracle...
Everyday Leadership: Getting Results in Business, Politics, and Life
Everyday Leadership: Getting Results in Business, Politics, and Life

?A book that truly speaks to everyone. . . . Always practical, often inspiring, this is more a reference book than a self-improvement text, and a great read for any would-be leader.”
?Roger Penske, owner of Penske Corporation and Penske Racing

?Sound, practical advice driven home with real-world examples. . . . This...

Network+ Study Guide (2nd Edition)
Network+ Study Guide (2nd Edition)
Here's the book you need to prepare for CompTIA's updated Network+ exam, N10-003.

This revised edition of the best-selling Network+ Study Guide was developed to meet the exacting requirements of today's certification candidates. In addition to the focused and accessible instructional approach that has...

Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters (Expert's Voice in Security)
Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters (Expert's Voice in Security)

"This book is a must have resource guide for anyone who wants to ...  implement TXT within their environments.  I wish we had this guide when our engineering teams were implementing TXT on our solution platforms!”  

John McAuley,EMC Corporation

"This book details innovative technology...

Pragmatic ADO.NET: Data Access for the Internet World
Pragmatic ADO.NET: Data Access for the Internet World

"This is my favorite book on ADO.NET. The author clearly has an extensive understanding of the subject matter. It is useful not only for expert data access programmers but also for weekend code warriors."
—Glenn Thimmes, Senior Software Engineer, New Dawn Technologies.Formerly Develop Support Engineer (WebData),
...

Escape From Excel Hell: Fixing Problems in Excel 2003, 2002 and 2000 (Mr. Spreadsheet's Bookshelf)
Escape From Excel Hell: Fixing Problems in Excel 2003, 2002 and 2000 (Mr. Spreadsheet's Bookshelf)
When Excel talks back to you, here's what to do

You try to open a spreadsheet and Excel won't let you, because there's a macro involved. You cannot convince the software that the macro is safe. You hurl something across the room.

Grab this book instead! You'll find more than 200 fixes for things...

unlimited object storage image
Result Page: 48 47 46 45 44 43 42 41 40 39 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy