Windows Security Monitoring: Scenarios and Patterns
Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security
Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...
C++ Common Knowledge: Essential Intermediate Programming
What Every Professional C++ Programmer Needs to Know—Pared to Its Essentials So It Can Be Efficiently and Accurately Absorbed
C++ is a large, complex language, and learning it is never entirely easy. But some concepts and techniques must be thoroughly mastered if...
Oracle PL/SQL for DBAs
PL/SQL, Oracle's powerful procedural language, has been the cornerstone of Oracle application development for nearly 15 years. Although primarily a tool for developers, PL/SQL has also become an essential tool for database administration, as DBAs take increasing responsibility for site performance and as the lines between...
Node.js in Action
Node.js in Action is an example-driven tutorial that starts at square one and guides you through all the features, techniques, and concepts you'll need to build production-quality Node applications. You'll start by learning how to set up your Node development environment, including loading...
SQL Server 2000 Stored Procedures Handbook (Expert's Voice)
Stored procedures are compiled T-SQL statements that reside on the database. They are the cornerstones of successful data manipulation, and data-handling operations of every complexity make use of them. This book is an in-depth guide to a key area of database development.
This book tackles real-world problems faced by developers when...
|Result Page: 306 305 304 303 302 301 300 299 298 297 |