Home | Amazing | Today | Tags | Publishers | Years | Search 
Pro Spring 2.5
Pro Spring 2.5
Recently, the Java world has witnessed a dramatic shift away from so-called “heavyweight” architectures such as Enterprise JavaBeans (EJB) toward lighter weight frameworks such as Spring. Complex and container-dependent services, such as CMP, and transaction management systems have been replaced with simpler alternatives such as...
MCSE: ISA Server 2000 Administration Study Guide: Exam 70 227 with CDROM
MCSE: ISA Server 2000 Administration Study Guide: Exam 70 227 with CDROM

Here’s the book you need to prepare for Exam 70-227, Installing, Configuring, and Administering Microsoft Internet Security and Acceleration (ISA) Server 2000, Enterprise Edition:

  • In-depth coverage of every exam objective—all the information you need to know
  • Practical...
Mastering Microsoft SQL Server 2005
Mastering Microsoft SQL Server 2005

The Comprehensive Resource for SQL Server 2005 Administrators, Consultants, and Developers

Whether you're a systems administrator, database application developer, or IT consultant, you'll quickly ratchet up your knowledge of Microsoft SQL Server 2005 with this thorough and comprehensive guide. Light...

Role Engineering for Enterprise Security Management (Information Security and Privacy)
Role Engineering for Enterprise Security Management (Information Security and Privacy)
Role-based access control (RBAC) promises to provide several benefits to organizations. These benefits include simplified security provisioning and administration, ease of reporting on privileges and to whom they are available, and finer grained security authorization. By being policy-neutral, RBAC can be used to enforce the variety of access...
Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense
Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense
Cyberspace security is a critical subject of our times.

On the one hand the development of Internet, mobile communications, distributed computing, computer software and databases storing essential enterprise information has helped to conduct business and personal communication between individual people. On the other hand it has created many...

The Zope Book (Landmark)
The Zope Book (Landmark)
The Zope Book is an authoritative guide to Zope, an open-source Web application server. Zope goes beyond server-side scripting languages like PHP by providing a complete object framework, a built-in Web server, a Web-based management interface, and load-balancing through ZEO (Zope Enterprise Objects). That's a considerable punch, and Zope...
Official (ISC)2 Guide to the CISSP CBK
Official (ISC)2 Guide to the CISSP CBK
The Official (ISC)² Guide to the CISSP CBK is ideal not only for information security professionals attempting to achieve CISSP certification but also for those who are trying to decide which, if any, certification to pursue. Executives and organizational managers who want a more complete understanding of all the elements that are required in...
Data Mining for Business Applications
Data Mining for Business Applications
Data Mining for Business Applications presents the state-of-the-art research and development outcomes on methodologies, techniques, approaches and successful applications in the area. The contributions mark a paradigm shift from “data-centered pattern mining” to “domain driven actionable knowledge discovery”...
Zune For Dummies (Computer/Tech)
Zune For Dummies (Computer/Tech)
Let Microsoft insiders Brian Johnson and Duncan Mackenzie introduce you to Zune, the exciting new portable media player that plays both audio and video. They explain the numerous entertaining possibilities of Zune, such as transferring a music collection to your Zune, purchasing new music, connecting with friends who share similar taste in music...
Absolute Beginner's Guide to Databases
Absolute Beginner's Guide to Databases

Absolute Beginner's Guide to Databases brings the elements of a database together using easy to understand language, perfect for the true beginner. It not only gives specific hands on practice, but also provides an overview of designing, maintaining and using a database. This book covers what databases are used for, why databases are...

Securing Citrix XenApp Server in the Enterprise
Securing Citrix XenApp Server in the Enterprise
Secure Citrix Presentation Server, which runs on 99% of Fortune 500 Networks!

Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features
...
CIW: Security Professional Study Guide Exam 1D0-470 (With CD-ROM)
CIW: Security Professional Study Guide Exam 1D0-470 (With CD-ROM)

Here’s the book you need to prepare for Exam 1D0-470, CIW Security Professional. This Study Guide provides:

  • In-depth coverage of official exam objectives
  • Practical information on security concepts and practices
  • Hundreds of...
Result Page: 213 212 211 210 209 208 207 206 205 204 203 202 201 200 199 198 197 196 195 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy