 |
|
 Harnessing HibernateHarnessing Hibernate is an ideal introduction to the popular framework that lets Java developers work with information from a relational database easily and efficiently. Databases are a very different world than Java objects, and they often involve people with different skills and specializations. With Hibernate, bridging these two worlds is... |  |  |  |  Managing Active Directory for Windows 2000 Server (Syngress)Windows 2000's Active Directory provides a single uniform interface to all of the network's resources, including printers, documents, e-mail addresses, databases, and users. It also manages naming, querying, registration, and resolution needs. This book introduces readers to all of Active Directory's capabilities.
Active... |
|
|
 Pro WPF with VB 2008: Windows Presentation Foundation with .NET 3.5When .NET first appeared, it introduced a small avalanche of new technologies. There was a whole new way to write web applications (ASP.NET), a whole new way to connect to databases (ADO.NET), new typesafe languages (C# and VB .NET), and a managed runtime (the CLR). Not least among these new technologies was Windows Forms, a library of classes for... |  |  |  |  Next Generation Java Testing: TestNG and Advanced ConceptsEnterprise Java developers must achieve broader, deeper test coverage, going beyond unit testing to implement functional and integration testing with systematic acceptance. Next Generation Java™ Testing introduces breakthrough Java testing techniques and TestNG, a powerful open source Java testing... |
|
 MCITP SQL Server 2005 Database Administration All-in-One Exam GuideWith Microsoft support of SQL Server 2000 ending on April 8, 2008, the importance of SQL Server 2005 continues to increase. Watching job advertisements, I’m seeing more and more job openings for database administrators in general, and an increase in SQL Server 2005 listed in the desired skill set.
As the Microsoft SQL Server 2005... |  |  Web Application Vulnerabilities: Detect, Exploit, PreventThis book is about Web Application Hacking. The world-renowned authors teach the reader to use publicly available tools to conduct thorough assessments of web application. This assessment process provides the reader with an understanding of Web application vulnerabilities and how they are exploited. The book goes on to teach the reader to detect,... |  |  |
|
| Result Page: 133 132 131 130 129 128 127 126 125 124 123 122 121 120 119 118 117 116 115 |