Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Double Play (Parker, Robert B.)
Double Play (Parker, Robert B.)

Robert B. Parker fans have been quick to embrace each addition to his remarkable canon, from the legendary Spenser series to the novels featuring Jesse Stone and Sunny Randall. And his occasional forays into the past-Gunman's Rhapsody, a fresh take on Wyatt Earp, and Poodle Springs, based on a Raymond Chandler story-have dazzled critics...

Security on Rails
Security on Rails

The advantage of using Rails is its agility; it makes developing your web applications easy and fast. The disadvantage is that it can leave holes in your security if you are not aware of common vulnerabilities. It's a nerve-wracking and unfortunate fact that there are plenty of malicious people lurking on the Web. As a Rails developer, it...

Ethernet: The Definitive Guide
Ethernet: The Definitive Guide
The "Ethernet"--as distinct from the Internet, intranet, sneakernet, and others in the net family--is both a familiar face and a familiar name. However, it evokes the mental experience of the school crossing guard whose ownership of a corner of your mindscape is so context-sensitive that a change in venue renders the name or face...
Oracle Database Administration for Microsoft SQL Server DBAs
Oracle Database Administration for Microsoft SQL Server DBAs

Apply Your SQL Server DBA Skills to Oracle Database Administration

Use your SQL Server experience to set up and maintain a high-performance Oracle Database environment. Written by a DBA with expertise in both platforms, Oracle Database Administration for Microsoft SQL Server DBAs illustrates each technique with clear...

Spring Security 3
Spring Security 3

Security is of critical importance to all web applications. Vulnerable applications are easy prey for hackers. This book is the perfect tool for Java developers looking to repel attacks against their web applications using the proven Spring Security library to achieve this.

A comprehensive guide to Spring Security 3. You will learn...

Administering Windows Server 2008 Server Core
Administering Windows Server 2008 Server Core
Imagine my surprise when I installed Windows 2008 for the first time and was faced with a decision of installing the Full version or the Server Core version. My initial question was “What precisely is a Server Core version?” Microsoft had kept this product quiet and, as a beta tester, I was taken completely off guard. So I installed...
Business Continuity and Disaster Recovery Planning for IT Professionals, Second Edition
Business Continuity and Disaster Recovery Planning for IT Professionals, Second Edition

Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Isaac Makes Landfall in the Gulf Coast. Wildfires Burn Hundreds of Houses and Businesses in Colorado. Tornado Touches Down in Missouri. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT professionals as well. The...

The Little Black Book of Project Management
The Little Black Book of Project Management
This Little Black Book shows you how to take charge of a big project, define it, and then break it down into
smaller, more manageable phases. You will learn how to control a budget and schedule and lead a project
team through to successful completion. You will find out how to anticipate problems and plan for them during
the various
...
Python Robotics Projects: Build smart and collaborative robots using Python
Python Robotics Projects: Build smart and collaborative robots using Python

Leverage the power of Python to build DIY robotic projects

Key Features

  • Design, build, and stimulate collaborative robots
  • Build high-end robotics projects such as a customized personal Jarvis
  • Leverage the power of Python and ROS for DIY robotic...
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
As the cliché reminds us, information is power. In this age of computer systems and technology, an increasing majority of the world's information is stored electronically. It makes sense then that as an industry we rely on high-tech electronic protection systems to guard that information. As a professional hacker, I get paid to uncover...
Caution! Wireless Networking: Preventing a Data Disaster
Caution! Wireless Networking: Preventing a Data Disaster
Sure you’re vulnerable.
Now here’s what you do about it

Calm down. There are definite dangers associated with wireless networking, but you hold the antidote in your hands. This guide, written by a respected security consultant, separates the genuine threats from the hype and hysteria. Then it tells you how to guard...

Oracle SQL Tuning with Oracle SQLTXPLAIN
Oracle SQL Tuning with Oracle SQLTXPLAIN

Oracle SQL Tuning with SQLTXPLAIN is a practical guide to SQL tuning the way Oracle's own experts do it, using a freely downloadable tool called SQLTXPLAIN. Using this simple tool you'll learn how to tune even the most complex SQL, and you'll learn to do it quickly, without the huge learning curve usually associated with...

unlimited object storage image
Result Page: 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy