Sams Teach Yourself SQL in 24 Hours (2nd Edition) Written by college instructors, Sams Teach Yourself SQL in 24 Hours quickly teaches beginning- to intermediate-level SQL users how to create, store, access and manipulate data using a proven step-by-step format that teaches SQL by example. This book contains a thorough explanation of database concepts, SQL procedures, and low-level programming,... Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
The world's bestselling computer security book--fully expanded and updated
"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,...
ModSecurity 2.5 With more than 67% of web servers running Apache and web-based attacks becoming more and more prevalent, web security has become a critical area for web site managers. Most existing tools work on the TCP/IP level, failing to use the specifics of the HTTP protocol in their operation. Mod_security is a module running on Apache, which will help you... Managing Cisco Network Security Providing good internetwork security and remaining current on new
hardware and software products is a never-ending task. Every network
security manager aims to achieve the best possible security because
the risks are real and the stakes are high. An enterprise must decide
what level of security is required, taking into account...
Becoming Do you remember your radio and "Captain Midnight," "The Lone Ranger," "Junior Miss" and "Let's Pretend"? The first time you inhaled a cigarette? Your first swallow of hard liquor? The thrill of the first exploration of the body of your boyfriend, girlfriend, husband, wife... your own body? Your first...
Firewalls for Dummies, Second Edition Guard your DSL and protect your personal information
Keep your network safe from viruses, saboteurs, eavesdroppers, and other bad guys
We don’t want to scare you, but "they" are out there! Don’t venture into lawless cyberspace without this trusty guide. It’ll help you evaluate the danger, understand how...
PeopleSoft for the Oracle DBA
This book is aimed at helping Oracle DBAs understand and use PeopleSoft technology. For the typical DBA, the introduction to PeopleSoft is likely to include some surprises, not all of them agreeable. Many—if not most—DBAs have to deal with many different databases, usually supporting different applications. Often they will want to...
Enterprise Security: The Manager's Defense Guide
E-Business is on the rise, but so are the likelihood and severity of computer attacks. Melissa, the Love Bug, Nimda, and Reezak all caught the e-Business community off guard, costing billions of dollars in lost productivity and damage. Maintaining enterprise security is now, without question, a crucial aspect of doing business in today's...
Oracle Data Guard 11g Handbook (Osborne ORACLE Press Series)
Provide superior data protection, availability, and disaster recovery using the tested techniques in this Oracle Press guide. Cowritten by a team of Oracle experts, Oracle Data Guard 11g Handbook provides a sound architectural foundation along with best practices for configuration, monitoring, maintenance, and troubleshooting. You...
Getting Started with Hazelcast - Second Edition
Get acquainted with the highly scalable data grid, Hazelcast, and learn how to bring its powerful in-memory features into your application
About This Book
Store and pass data in your application using Hazelcast's scalable and resilient collections, working with real code and examples to see what is...
Network Security Auditing (Networking Technology: Security)
Mention the word audit to IT professionals and you will probably see their eyes glaze over as
they imagine frightening visions of auditors with pointy tails, pitchforks, and checklists run
ning around and pointing out all of the things they have done wrong to their manager. The
purpose of a security audit is not to place blame or pick...
|Result Page: 7 6 5 4 3 2 1 |