Access 2007 Programming by Example with VBA, XML, and ASP shows non-programmers how Access databases can be created, managed, and customized with Visual Basic for Applications (VBA) -- a powerful programming language built into Access. Hundreds of hands-on examples and projects throughout the book show users how to take charge of their Access...
Windows Azure is a highly scalable, robust, and cost-effective solution for the deployment of applications and services—for organizations and enterprises of all sizes, and in all types of markets. My task at Microsoft is to ensure that developers can help these organizations and enterprises to achieve their goals by quickly and easily...
Train. Coffee shop. Soccer field. Now you can connect, collaborate, and get things done—virtually anywhere—using Microsoft Office 365. Guided by business productivity expert Katherine Murray, you’ll get a running start with Office 365 cloud-based business services. And you’ll take wing as you learn best...
Discover why routers in the Juniper MX Series, with their advanced feature sets and record breaking scale, are so popular among enterprises and network service providers. This authoritative book shows you step-by-step how to implement high-density, high-speed Layer 2 and Layer 3 Ethernet services, using Router Engine DDoS Protection,...
Take your skills with PostgreSQL to a whole new level with this fascinating guide to server programming. A step by step approach with illuminating examples will educate you in the full range of possibilities.
Understand the extension framework of PostgreSQL, and leverage it in ways that you haven't even invented yet.
An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies
DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This...
Scripting provides system administrators an optimal means of automating tedious and time-consuming application, configuration, and management tasks. In addition you can take advantage of new capabilities offered by VBScript, ADSI and Windows Scripting Host. ADSI is particularly important in light of the upcoming release of...
An insider's guide to the exciting future of telecommunications
The last great telecommunications revolution brought us fiber optics, mobile phones, videoconferencing, and a host of other innovations that improved life and business and connected individuals in ways never imagined. Now emerging technologies such as Voice over Internet Protocol...
Object-Oriented Design with Applications has long been the essential reference to object-oriented technology, which, in turn, has evolved to join the mainstream of industrial-strength software development. In this third edition--the first revision in 13 years--readers can learn to apply object-oriented methods using new paradigms...
As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to...
Aimed at the working Delphi developer, Delphi in a Nutshell is an effective desktop reference to this popular programming tool. Besides listing all core classes and methods, this book also provides a host of expert dos and don'ts for mastering the newest features in Delphi's Object Pascal.
"Buried inside QuickTime are a host of powerful tools for creating, delivering, and playing digital media. The official QuickTime documentation explains 'what' each API function does. But knowing what each function does isn't enough to allow a developer to take full advantage of QuickTime. QuickTime Toolkit fills in the...