Pro Active Record helps you take advantage of the full power of your database engine from within your Ruby programs and Rails applications. ActiveRecord, part of the magic that makes the Rails framework so powerful and easy to use, is the model element of Rail's model/view/controller framework. It's an object-relational mapping library...
A best-seller that once showed you how to reign in a panther can now show you how to tame a Tiger. Mac OS X Tiger Unleashed is the most comprehensive guide to unlocking the full power of Mac OS X Tiger that you can find. Written by Unix/BSD experts and Mac users, ...
During the past decade, Microsoft has created the some of the best Internet communication programs in the world and has installed them on every Windows computer--free, but mostly hidden. Until now, only a few knowledgeable computer users knew how to exploit the potential of these programs--and understood...
This book was written because I felt there was a need for a comprehensive text for the application developer and DBA who must implement fast, efficient, and reliable client/server applications. Unlike other theoretical books on this subject, Designing High-Performance Oracle Databases provides tangible examples and...
Knowledge Management is fast becoming a hot topic of discussion and
research. The capture, use, production and storage of knowledge is an issue of
paramount importance for businesses, universities, public and private organizations.
Because this is such an important topic, it is essential for researchers, academicians
and managers to...
Security in the post 9/11 world is about much more than just guns, guards and gates. The authors make a tremendous contribution to today's security debate by offering thoughtful and sensible recommendations that will help any reader understand the challenges of the networked world we now live in.- Roger Cresser, NBC News terrorism analyst
The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them
Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve...
Wring more out of the data with a scientific approach to analysis
Graph Analysis and Visualization brings graph theory out of the lab and into the real world. Using sophisticated methods and tools that span analysis functions, this guide shows you how to exploit graph and network analytic techniques to enable the...