Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SQL Server 2008 Query Performance Tuning Distilled (Expert's Voice in SQL Server)
SQL Server 2008 Query Performance Tuning Distilled (Expert's Voice in SQL Server)
SQL Server 2008 Query Performance Tuning Distilled presents a direct trouble–shooting methodology for identifying poorly performing stored procedures and queries, isolating the causes of that poor performance, and fixing the underlying problems. Each chapter is dedicated to one of the top causes of poorly performing queries and shows...
How Electronic Things Work... And What to do When They Don't
How Electronic Things Work... And What to do When They Don't

Electronic equipment 'on the blink'? Don't junk it or pay sky-high repair costs - fix it yourself! Here's a guide to understanding and repairing electronics equipment written for people who would ordinarily 'call the shop'. With this fully illustrated, simple-to-use guide, you will get a grasp of the workings of the...

DTrace: Dynamic Tracing in Oracle Solaris, Mac OS X and FreeBSD (Oracle Solaris Series)
DTrace: Dynamic Tracing in Oracle Solaris, Mac OS X and FreeBSD (Oracle Solaris Series)

In early 2004, DTrace remained nascent; while Mike Shapiro, Adam Leventhal, and I had completed our initial implementation in late 2003, it still had substantial gaps (for example, we had not yet completed user-level instrumentation on x86), many missing providers, and many features yet to...

Mac OS X Help Line, Tiger Edition
Mac OS X Help Line, Tiger Edition
With every update, Mac OS X grows more powerful, more dependable, and easier to use--and Mac OS X Tiger is no exception. But along with the new features come fresh issues--new areas to troubleshoot, new functionality to unravel, and new glitches waiting to confound even the savviest Mac users. Not to worry. Best-selling author and Mac guru Ted...
Fighting Computer Crime: A New Framework for Protecting Information
Fighting Computer Crime: A New Framework for Protecting Information

Who are the cybercriminals and what can we do to stop them? From the #1 cybercrime expert, a revolutionary new approach to . Fighting Computer Crime A top computer crime expert explains why current computer security methods fall dangerously short of the mark and what we can do to fix them. Based on his 30 years as a cybercrime fighter, during...

ASP.NET Site Performance Secrets
ASP.NET Site Performance Secrets

Do you think that only experts with a deep understanding of the inner workings of ASP.NET, SQL Server, and IIS can improve a website's performance? Think again - because this book tosses that notion out of the window. It will help you resolve every web developer's nightmare - a slow website - with angry managers looking over your...

Ajax Security
Ajax Security
The Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities

 

More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly moving to the Web via Ajax. But, all too often, this...

Troubleshooting PostgreSQL
Troubleshooting PostgreSQL

Intercept problems and challenges typically faced by PostgreSQL database administrators with the best troubleshooting techniques

About This Book

  • Detect and solve performance, indexing, and fuzzy matches problems and more in an effective way
  • Tune PostgreSQL databases and remove bottlenecks...
Java Performance
Java Performance
Today, Java is used at the heart of the world’s largest and most critical computing systems. However, when I joined the Java team in 1997 the platform was young and just gaining popularity. People loved the simplicity of the language, the portability of bytecodes, and the safety of garbage collection (versus traditional...
Windows XP Annoyances for Geeks, 2nd Edition
Windows XP Annoyances for Geeks, 2nd Edition
Offering dozens of on-target tips, workarounds, and warnings, Windows XP Annoyances for Geeks allows users to improve their overall experience with the popular XP operating system. And now, with this updated edition, users can also expect detailed coverage of the newly released Service Pack 2 (SP2) technology, which provides protection against...
Building Embedded Linux Systems
Building Embedded Linux Systems
There's a great deal of excitement surrounding the use of Linux in embedded systems -- for everything from cell phones to car ABS systems and water-filtration plants -- but not a lot of practical information. Building Embedded Linux Systems offers an in-depth, hard-core guide to putting together embedded systems based on Linux.
...
Oracle Essbase 9 Implementation Guide
Oracle Essbase 9 Implementation Guide

The hot new data analysis trends involve business intelligence and analytics. The technology that supports business intelligence and analytics better than anything else is today's multidimensional OLAP technology - and there is none better than Oracle Essbase! Although storing data in a cube and developing analytical applications leaves...

Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy