Home | Amazing | Today | Tags | Publishers | Years | Search 
Backup & Recovery
Backup & Recovery

Packed with practical, freely-available backup and recovery solutions for Unix, Linux, Windows and Mac OS X systems -- as well as various databases -- this new guide is a complete overhaul of Unix Backup & Recovery by the same author, now revised and expanded with over 75% new material.

...
Database Administration: The Complete Guide to Practices and Procedures
Database Administration: The Complete Guide to Practices and Procedures

"One of Craig's hallmarks is his ability to write in a clear, easy-to-read fashion. The main purpose of any technical book is to transfer information from writer to reader, and Craig has done an excellent job. He wants the reader to learn—and it shows." —Chris Foot, Senior Oracle Certified Instructor,...

Expert MySQL
Expert MySQL
Since the enormous number of new features made available with MySQL release 5.0, MySQL has been gaining steam as a viable alternative to database behemoths like Oracle and IBM DB2. MySQL users now have the ability to extend MySQL with new SQL commands, optimize query execution, and embed MySQL within low-resource environments like embedded devices...
Visual Basic 2005 Instant Results (Programmer to Programmer)
Visual Basic 2005 Instant Results (Programmer to Programmer)

Packed with unique, ready-to-use projects, this reference book will help you quickly get up to speed with Visual Basic 2005. Each project is presented in a step-by-step format, which enables you to set up, enhance, and reuse them in different real world situations.

Visual Basic 2005 Instant Results not only provides you with...

High-Performance Client/Server
High-Performance Client/Server
"Chris is one of the industry's most important thinkers on database design . . . I would strongly recommend this book to readers trying to get past the buzzwords and focus on what really makes a difference in achieving high-performance distributed systems." —David Stodder Editor-in-Chief, Database Programming & Design...
Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase
Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase
"Today, databases house our 'information crown jewels', but database security is one of the weakest areas of most information security programs. With this excellent book, Ben-Natan empowers you to close this database security gap and raise your database security bar!" Bruce W. Moulton. CISO/VP, Fidelity Investments (1995 - 2001)...
Database Modeling and Design: Logical Design, 4th Edition (Data Management Systems)
Database Modeling and Design: Logical Design, 4th Edition (Data Management Systems)
Database systems and database design technology have undergone significant evolution in recent years. The relational data model and relational database systems dominate business applications; in turn, they are extended by other technologies like data warehousing, OLAP, and data mining. How do you model and design your database application in...
Beginning Information Cards and CardSpace: From Novice to Professional (Expert's Voice in .Net)
Beginning Information Cards and CardSpace: From Novice to Professional (Expert's Voice in .Net)
If you work at all with Internet-facing solutions, you know that the lack of an identity metasystem is a critical vulnerability in the design. Various consortiums have worked to define a system of identity--a platform-agnostic way of communicating and validating claims of identity. If you work with identity solutions or structures, you will find...
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The black hats have kept up with security enhancements. Have you?

In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution...

IBM On Demand Technology Made Simple, Third Edition
IBM On Demand Technology Made Simple, Third Edition
The Fastest Way to Learn about IBM Strategy and Technology Since October 2002, IBM has been laser focused on a sweeping strategy known as "On Demand Business." Since then, every IBM product line and service offering has been steadily infused with the technology and function necessary to support the On Demand Business model. In this...
SQL Queries for Mere Mortals(R): A Hands-On Guide to Data Manipulation in SQL (2nd Edition)
SQL Queries for Mere Mortals(R): A Hands-On Guide to Data Manipulation in SQL (2nd Edition)
Unless you are working at a very advanced level, this is the only SQL book you will ever need. The authors have taken the mystery out of complex queries and explained principles and techniques with such clarity that a "Mere Mortal" will indeed be empowered to perform the superhuman. Do not walk past this book!
Tivoli and Websphere Application Server on Z/OS (IBM Redbooks)
Tivoli and Websphere Application Server on Z/OS (IBM Redbooks)

IBM WebSphere Application Server has grown to be a successful application server platform. With IBM WebSphere Application Server on z/OS, the preferred application server platform gains the benefits of capacity and robustness from the mainframe legacy. It also gains access to data and transactions residing on z/OS subsystems such as DB2 and...

Result Page: 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy