 |
|
 New Algorithms, Architectures and Applications for Reconfigurable ComputingNew Algorithms, Architectures and Applications for Reconfigurable Computing consists of a collection of contributions from the authors of some of the best papers from the Field Programmable Logic conference (FPL’03) and the Design and Test Europe conference (DATE’03). In all, seventy-nine authors, from research teams from all... |  |  Beginning SQL Server 2008 for Developers: From Novice to ProfessionalSQL Server 2008 is a first–rate database management system. It offers more capability than any previous release of SQL Server. More than just a classic relational database management system, SQL Server 2008 includes exciting and powerful features that make it useful for everything from large corporate data warehouses to ad hoc departmental... |  |  Sams Teach Yourself Linux Security Basics in 24 HoursThis book is an introductory, tutorial-style text designed to give the reader a strong foundational knowledge of securing a Linux system. This book teaches the reader how to securely install and run Linux as it comes shipped from most Linux distributors. Most other titles in this market focus on the use of tools and software not normally included... |
|
 |  |  |  |  Linux Security (Networking)This book provides you with comprehensive knowledge about Linux Security. The book is aimed at readers who are familiar with Linux concepts but now want to gain a solid foundation in Linux security features. It is assumed these readers already understand some Linux and networking concepts, such as network protocols, network servers, and so on. This... |
|
|
 Pro T-SQL 2008 Programmers Guide (Expert's Voice in SQL Server)Discussing new and existing features, SQL Server designer and administrator Michael Coles takes you on an expert guided tour of Transact–SQL functionality in SQL Server 2008 in his book Pro T–SQL 2008 Programmer’s Guide. Fully functioning examples and downloadable source code bring Coles’... |  |  Bulletproofing TCP/IP Based Windows NT/2000 NetworksFind out about TCP/IP-based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure. Bulletproofing TCP/IP-based Windows NT/2000 Networks details the use of router access lists, firewalls, virus scanners and encryption. It includes examples of the configuration of... |  |  |
|
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 |