Home | Amazing | Today | Tags | Publishers | Years | Search 
The Database Hacker's Handbook: Defending Database Servers
The Database Hacker's Handbook: Defending Database Servers
Databases are the nerve center of our economy. Every piece of your personal information is stored there—medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling—and relentless.

In this essential follow-up to...

DSL Advances
DSL Advances

Cutting-edge xDSL: technology, standards, architecture, regulation, and its application.

  • The state of the art in DSL technology, standards, and architecture
  • ADSL, HDSL2, SHDSL, VDSL, line unbundling, spectrum management, and more
  • Voice over DSL and video-on-demand: technical progress and its impact...
Dive Into Python
Dive Into Python

Dive Into Python is a hands-on guide to the Python language. Each chapter starts with a real, complete code sample, proceeds to pick it apart and explain the pieces, and then puts it all back together in a summary at the end.

Python is a new and innovative scripting language. It is set to replace Perl as the programming language...

Computer Networking: A Top-Down Approach Featuring the Internet
Computer Networking: A Top-Down Approach Featuring the Internet
The most up-to-date introduction to the field of computer networking, this book's top-down approach starts at the application layer and works down the protocol stack. It also uses the Internet as the main example of networks. This all creates a book relevant to those interested in networking today. By starting at the application-layer and...
Protected Mode Software Architecture (PC System Architecture Series)
Protected Mode Software Architecture (PC System Architecture Series)

Protected Mode Software Architecture helps readers understandthe problems that single-task and multitasking operating systems must dealwith, and then examines each component of both the real and protected modesoftware architectures. This book is organized into three parts. Part One:Background introduces the reader to the problems faced...

Extreme Programming Applied: Playing to Win
Extreme Programming Applied: Playing to Win

Extreme Programming (XP) is a significant departure from traditional software development methods, one that is ushering in a change for both developers and business people. It is an agile methodology, which enables highly productive teams to produce quality software from rapidly changing or unclear requirements. XP is disciplined software...

Inside Internet Security: What Hackers Don't Want You To Know
Inside Internet Security: What Hackers Don't Want You To Know
This book is a practical guide for anyone designing or administering a corporate or e-business network that runs across a number of platforms via the Internet. It will arm systems administrators with a thorough understanding of the problems of network security and their solutions, and thus help realize the tremendous potential of e-business....
Common Warehouse Metamodel: An Introduction to the Standard for Data Warehouse Integration
Common Warehouse Metamodel: An Introduction to the Standard for Data Warehouse Integration
"The time has come for the consumers themselves to step forward and to specify a standard for meta data semantics and meta data exchange. This book is an important first step in that direction."
–W. H. Inmon, from the Foreword

The Common Warehouse Metamodel (CWM) is rapidly gaining momentum within the data warehousing...

AntiPatterns: Refactoring Software, Architectures, and Projects in Crisis
AntiPatterns: Refactoring Software, Architectures, and Projects in Crisis
"The AntiPatterns authors have clearly been there and done that when it comes to managing software development efforts. I resonated with one insight after another, having witnessed too many wayward projects myself. The experience in this book is palpable." —John Vlissides, IBM Research "This book allows managers, architects,...
Common Warehouse Metamodel Developer's Guide
Common Warehouse Metamodel Developer's Guide
The official guide on how to develop interoperable data warehouse and business intelligence applications from the authors of the CWM specification

This authoritative guide will show you how to develop interoperable data warehouse and business intelligence applications using the Common Warehouse Metamodel (CWM) specification. It provides you...

Red Hat Fedora Linux Secrets
Red Hat Fedora Linux Secrets
Learn how to release the full potential of Red Hat Fedora Linux and install the latest release of Fedora Core (FC4) with this comprehensive guide. Within these pages, you'll be privy to valuable secrets contained in FC4: yum, up2date, mandatory access control with Security Enhanced Linux, and improved device handling with udev. You'll go behind the...
Java 2 Bible
Java 2 Bible
Welcome to Java 2 Enterprise Edition Bible. This book, which is a follow−up to Java 2 Bible, is for readers
who wish to know more about the enterprise market. Enterprise programming is a hot topic these days, as
more and more companies decide they need an online presence to complement their existing...
Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy