Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Securing SQL Server: DBAs Defending the Database
Securing SQL Server: DBAs Defending the Database
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy, performing threat analysis, and encrypting sensitive data as a last line of defense against compromise. The multi-layered approach in this book helps ensure that a single breach doesn't lead to loss or compromise of your data...
MySQL (OTHER NEW RIDERS)
MySQL (OTHER NEW RIDERS)
The unexpected pleasure of reading books about databases is that they are often written by authors with highly organized minds. Paul DuBois and his editors at New Riders have assembled MySQL with a clarity and lucidity that inspires confidence in the subject matter: a (nearly) freely redistributable SQL-interpreting database client/server...
Plant Programmed Cell Death
Plant Programmed Cell Death

Programmed cell death (PCD) is a genetically encoded, active process which results in the death of individual cells, tissues, or whole organs. PCD plays an essential role in plant development and defense, and occurs throughout a plant’s lifecycle from the death of the embryonic suspensor to leaf and floral organ senescence. In plant...

Computer Simulation of Shaped Charge Problems
Computer Simulation of Shaped Charge Problems
Devoted to the subject of shape charge design using numerical methods, this book offers the defense and commercial industries unique material not contained in any other single volume. The coverage of the Lagrangian and Eulerian methods as well as the equation of state provides first hand help to engineers working on shape charge problems. The book...
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities

 

“There are a number of secure programming books on the market, but none that go as deep as this one. The depth and detail exceeds all books that I know about by an order of magnitude.”

Halvar Flake, CEO and head of research,...

Oracle DBA on UNIX and Linux (Kaleidoscope)
Oracle DBA on UNIX and Linux (Kaleidoscope)
Oracle DBA on Unix and Linux provides all the information needed to install, support, tune, and upgrade Oracle databases on the UNIX and Linux platforms. Maintain a robust, mission-critical Oracle8i database. This book provides administrative solutions for the day-to-day DBA. You'll learn how to install the database for maximum efficiency,...
Bridge For Dummies
Bridge For Dummies

Bridge, as any player will tell you, is simply the best card game ever. It’s challenging—each hand presents a different set of conditions you must figure out and solve. It's very social—you play with a partner and two opponents. And best of all—it's fun.

Bridge For Dummies, 2E gives you a...

Fundamentals of Sensor Network Programming: Applications and Technology
Fundamentals of Sensor Network Programming: Applications and Technology

Sensor processing is a central and an important problem in aerospace/defense, automation, medical imaging, and robotics, to name only a few areas. A surveillance system used in aerospace and defense is an example of a sensor processing system. It uses devices such as infrared sensors, microwave radars, and laser radars that are...

Disinfection and Decontamination: Principles, Applications and Related Issues
Disinfection and Decontamination: Principles, Applications and Related Issues

In the battle between humans and microbes, knowledge may be not only the best weapon but also the best defense. Pulling contributions from 34 experts into a unified presentation, Disinfection and Decontamination: Principles, Applications, and Related Issues provides coverage that is both sophisticated and practical. The book reviews...

Security Power Tools
Security Power Tools
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security...
Chemical Weapons Destruction and Explosive Waste: Unexploded Ordinance Remediations
Chemical Weapons Destruction and Explosive Waste: Unexploded Ordinance Remediations
"The book examines each program, offers various solutions and case studies for each disposal problem, and provides additional sources of information for each program for further reading or consultation."- The Hazardous Waste Consultant.

This book discusses the current and potential treatment technologies involved in
...
Investigative Data Mining for Security and Criminal Detection, First Edition
Investigative Data Mining for Security and Criminal Detection, First Edition
Investigative Data Mining for Security and Criminal Detection is the first book to outline how data mining technologies can be used to combat crime in the 21st century. It introduces security managers, law enforcement investigators, counter-intelligence agents, fraud specialists, and information security analysts to the latest...
unlimited object storage image
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy