 |
|
 Practical Business Intelligence with SQL Server 2005Design, Build, and Manage High-Value BI Solutions with SQL Server 2005
In this book, two of Microsoft’s leading consultants illustrate how to use SQL Server 2005 Business Intelligence (BI) technologies to solve real-world problems in... |  |  Expert One-on-One J2EE Development without EJBAre your J2EE projects taking too long to develop? Are they hard to debug? Do they result in disappointing performance? You may still be using traditional approaches to J2EE that are overly complex and not truly object-oriented. Many of these problems relate to EJB: a complex technology that has not lived up to its hype.
In this hands-on guide,... |  |  The 2nd Digital RevolutionIn the 1990s I sat in the office of a CFO of what was then a Fortune 100 company. He was not happy about the annual technology bill. Back then – and for decades before – technology was tactical. He said something about technology being his last unmanaged expense. I gave him a list of 10 things we should do to improve... |
|
 Fundamentals of Telecommunications, 2nd EditionThe Second Edition of this popular text is updated with THE latest advances in telecommunications
The standard of excellence set in the critically acclaimed Fundamentals of Telecommunications continues in this Second Edition, by offering a thorough introduction to the fundamentals of telecommunication networks without bogging the reader down in... |  |  Building Cisco Remote Access NetworksCitrix MetaFrame can deliver Windows-based applications to any user, anywhere regardless of network connection, LAN protocol, or client operating system. Configuring Citrix MetaFrame for Windows 2000 Terminal Services is written for system administrators who are deploying Citrix MetaFrame in a Windows 2000 environment. It examines MetaFrame's... |  |  Building Secure Wireless Networks with 802.11An implementer’s guide to setting up, configuring, and managing a secure wireless network
Whether you’re creating wireless networks for the home, small office, or enterprise, this innovative book presents a step-by-step approach to successfully building a wireless LAN that meets all of your security needs. Beginning with a... |
|
 From Java to Ruby: Things Every Manager Should KnowAs I drove across the central Texas landscape, my excitement and anxiety were both building. I was driving to a new client that would change everything for me. This short trip would take me an hour south to a small college town, but symbolically I was beginning a much longer journey. I was going from Java to Ruby.
The past year, I had... |  |  Software Project Secrets: Why Software Projects FailPreviously a mentor at Exoftware, where his role took him to a variety of organizations, David Putnam has acted as an advisor on the management of software development projects to companies in three continents. Now the manager of CentaurNet, part of Centaur Publishing, David still regularly presents papers, workshops, and tutorials on the... |  |  Networked Information Technologies: Diffusion and AdoptionSoftware systems that used to be relatively autonomous entities such as e.g. accounting systems, order-entry systems etc. are now interlinked in large networks comprising extensive information infrastructures. What earlier used to be stand-alone proprietary systems are now for the most part replaced by more or less standardized interdependent... |
|
 Webwork in ActionThis book is very much what the title says: a book about working on web-based applications, using real-world examples along the way. That’s what WebWork emphasizes: working on your project, not wrestling with your framework. Although it isn’t the most-used web framework in the Java world, WebWork is widely known as the most refined, and... |  |  Configuring Windows 2000 Without Active DirectoryIn Configuring Windows 2000 Without Active Directory, Carol Bailey makes a persuasive argument that her title procedure isn't the logical equivalent of making a banana split without fruit. Declining to use the primary new feature of Windows 2000 removes a thick layer of complexity from Windows 2000, she writes, and makes it much easier to... |  |  Voice over IP FundamentalsA systematic approach to understanding the basics of Voice over IP
* Understand the basics of PSTN services and IP signaling protocols, including SS7 * Learn how VoIP can run the same applications as the existing telephony system, but in a more cost-efficient and scalable manner * Delve into such VoIP topics as jitter, latency,... |
|
| Result Page: 198 197 196 195 194 193 192 191 190 189 188 187 186 185 184 183 182 181 180 |