Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SAS 9.2 Intelligence Platform: Security Administration Guide
SAS 9.2 Intelligence Platform: Security Administration Guide
Explains the security model for the SAS Intelligence Platform and provides instructions for performing security-related administrative tasks. The emphasis is on suite-wide aspects of the security functionality that SAS provides.

New and enhanced features in the following areas increase security and manageability:
Electronic Commerce (Networking Series)
Electronic Commerce (Networking Series)

The fourth edition of this best-selling title gives a complete overview of the electronic commerce environment. It has been revised and completely updated to reflect the most recent trends in e-commerce, including new material on security technologies, server options, enterprise applications, and investing online. Covering everything from...

Oracle Security
Oracle Security
This book covers the field of Oracle security from simple to complex. It describes basic RDBMS security features (e.g., passwords, profiles, roles, privileges, synonyms) and includes many practical strategies for securing an Oracle system, developing auditing and backup plans, and using the Oracle...
PHP Cookbook: Solutions & Examples for PHP Programmers
PHP Cookbook: Solutions & Examples for PHP Programmers

Want to understand a certain PHP programming technique? Or learn how to accomplish a particular task? This cookbook is the first place to look. With more than 350 code-rich recipes revised for PHP 5.4 and 5.5, this third edition provides updated solutions for generating dynamic web content—everything from using basic data types...

Effective Oracle Database 10g Security by Design
Effective Oracle Database 10g Security by Design

The database has two important roles: 1. Serve the data—databases are commonly referred to as data servers; 2. Protect the data. Yes that’s right, the database is there to serve and protect. Database security features are vast and complex. While the complexity can afford us many ways to provide a robust...

Cisco Access Control Security : AAA Administration Services
Cisco Access Control Security : AAA Administration Services

This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.


Hands-on techniques for enabling authentication, authorization, and
...

Bulletproof Wireless Security: GSM, UMTS, 802.11, and Ad Hoc Security (Communications Engineering)
Bulletproof Wireless Security: GSM, UMTS, 802.11, and Ad Hoc Security (Communications Engineering)

Finally--a single volume guide to really effective security for both voice and data wireless networks!

More and more data and voice communications are going via wireless at some point between the sender and intended recipient. As a result, truly "bulletproof" wireless security is now more than a desirable
...

Mac OS X Snow Leopard for Power Users: Advanced Capabilities and Techniques
Mac OS X Snow Leopard for Power Users: Advanced Capabilities and Techniques

Mac OS X Snow Leopard for Power Users: Advanced Capabilities and Techniques is for Mac OS X users who want to go beyond the obvious, the standard, and the easy. If want to dig deeper into Mac OS X and maximize your skills and productivity using the world’s slickest and most elegant operating system, then this is the book for...

BackTrack 5 Cookbook
BackTrack 5 Cookbook

Over 80 recipes to execute many of the best known and little known penetration testing aspects of BackTrack 5

  • Learn to perform penetration tests with BackTrack 5
  • Nearly 100 recipes designed to teach penetration testing principles and build knowledge of BackTrack 5 Tools
  • Provides detailed...
Smart Grid Security: Innovative Solutions for a Modernized Grid
Smart Grid Security: Innovative Solutions for a Modernized Grid

The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing power supplies to serve peak power needs and improving efficiency of power...

Pro T-SQL Programmer's Guide
Pro T-SQL Programmer's Guide

Pro T–SQL Programmer’s Guide is your guide to making the best use of the powerful, Transact-SQL programming language that is built into Microsoft SQL Server's database engine. This edition is updated to cover the new, in-memory features that are part of SQL Server 2014. Discussing new and existing features, the book...

Securing SQL Server: DBAs Defending the Database
Securing SQL Server: DBAs Defending the Database
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database enterprise. This new edition covers threat analysis, common attacks and countermeasures, and provides an introduction to compliance that is useful for meeting regulatory requirements such as the GDPR. The...
unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy