Home | Amazing | Today | Tags | Publishers | Years | Search 
DW 2.0: The Architecture for the Next Generation of Data Warehousing (Morgan Kaufman Series in Data Management Systems)
DW 2.0: The Architecture for the Next Generation of Data Warehousing (Morgan Kaufman Series in Data Management Systems)
First book on the new generation of data warehouse architecture, DW 2.0--by the "father of the data warehouse".

Data Warehousing has been around for 20 years and has become part of the information technology infrastructure. Data warehousing originally grew in response to the corporate need for information--not
...
Apple Training Series: Mac OS X Deployment v10.5
Apple Training Series: Mac OS X Deployment v10.5
Apple Training Series: Mac OS X v10.5 Deployment v10.5 uses a combination of task-based instruction and strong visuals to teach intermediate and advanced users how to deploy a wide range of files and systems to multiple users in a large organization. Author Kevin White takes readers through the deployment of software, ranging from individual...
Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
This book constitutes the refereed proceedings of the 7th International Workshop on Information Security Applications, WISA 2006, held in Jeju Island, Korea in August 2006.

The 30 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 146 submissions. The papers are organized in topical...

Hacker Debugging Uncovered (Uncovered series)
Hacker Debugging Uncovered (Uncovered series)

Hacking is a natural need of many sentient beings. They pass along the thorny path of understanding the true essence of surrounding things, bent on destruction. Just look around: Atomic scientists split atoms, analysts split long molecules into lots of smaller ones, and mathematicians actively use decomposition. And not one of...

Wireless Security Essentials: Defending Mobile Systems from Data Piracy
Wireless Security Essentials: Defending Mobile Systems from Data Piracy
Protect your wireless systems from attack with this clear-cut guide on how to implement proven security methodologies

Effective security is the most important element now missing from most wireless networks. Vulnerabilities in these networks leave them open to eavesdropping, session highjacking, data alteration and manipulation,
...
The End of Software: Transforming Your Business for the On Demand Future
The End of Software: Transforming Your Business for the On Demand Future
Twenty-five years ago, the high-tech business was small, computers were largely relegated to accounting, and the money major corporations spent on information technology barely made a dent in their overall budgets. Today that has all changed. High-tech businesses are some of the largest in the world. The Dow Jones Industrial Average includes four...
Windows XP Media Center Edition 2004 PC for Dummies
Windows XP Media Center Edition 2004 PC for Dummies
Welcome to Windows XP Media Center Edition 2004 PC For Dummies. What a mouthful! But each word is important, nay, critical! This book is about Microsoft’s next generation of operating system, Windows XP. But this is not an ordinary piece of software — Media Center 2004 is Microsoft’s major push to merge the computing and...
CISSP: Certified Information Systems Security Professional Study Guide
CISSP: Certified Information Systems Security Professional Study Guide
Here's the book you need to prepare for the CISSP exam from (ISC)2. Written by a team of experienced security experts who know exactly what it takes to pass the test, this Study Guide provides:

Assessment testing to focus and direct your studies In-depth coverage of official test domains Hundreds of challenging practice questions, in the book...

Linux Networking Clearly Explained
Linux Networking Clearly Explained

"Bryan Pfaffenberger details the configuration and use of GNOME (as well as Enlightenment and KDE) in greater detail than anyother Linux book out there" David Wall of Amazon.com on Linux Clearly Explained

Bryan Pfaffenberger and Michael Jang bring their focused, step-by-step approach which made Linux
...

High-Speed Cisco Networks: Planning, Design, and Implementation
High-Speed Cisco Networks: Planning, Design, and Implementation
Cisco's routers, hubs, and switches are the core of both the Internet and today's high-speed networks. To make sure you design the right high-speed network for your needs, you need High-Speed Cisco Networks. This book shows you how to: o Sell advanced LAN/WAN technology and its benefits to upper management o Make your department more productive...
IT Investment: Making a Business Case (Computer Weekly Professional Series)
IT Investment: Making a Business Case (Computer Weekly Professional Series)
Frequently not enough attention is given to producing a comprehensive business case or to producing an economic justification for an information systems investment. In fact many organizations are not clear as to what constitutes a sound business case and how to go about producing one. This Professional level book for the Computer Weekly...
So You Wanna Be an Embedded Engineer: The Guide to Embedded Engineering, From Consultancy to the Corporate Ladder
So You Wanna Be an Embedded Engineer: The Guide to Embedded Engineering, From Consultancy to the Corporate Ladder
Embark on a career in embedded engineering; this practical guide will show you how to succeed!

In this new, highly practical guide, expert embedded designer and manager Lewin Edwards answers the question, "How do I become an embedded engineer?" Embedded professionals agree that there is a treacherous gap between
...
Result Page: 148 147 146 145 144 143 142 141 140 139 138 137 136 135 134 133 132 131 130 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy