Home | Amazing | Today | Tags | Publishers | Years | Search 
Applied Security Visualization
Applied Security Visualization
APPLIED SECURITY VISUALIZATION

 

“Collecting log data is one thing, having relevant information is something else. The art to transform all kinds of log data into meaningful security information is the core of this book. Raffy illustrates in a...

Delphi 5 Developer's Guide (Developer's Guide)
Delphi 5 Developer's Guide (Developer's Guide)
The Delphi 5 Developer's Guide is a complete reference showing developers what they need to know most about Delphi 5. The text begins with a tour of Delphi 5 basics, including improvements since version 1. After observing object-oriented Pascal programming, including advanced language features, the authors turn to the strengths of using the Visual...
Computational Electromagnetics for RF and Microwave Engineering
Computational Electromagnetics for RF and Microwave Engineering
The numerical approximation of Maxwell's equations, Computational Electromagnetics (CEM), has emerged as a crucial enabling technology for radio-frequency, microwave and wireless engineering. The three most popular 'full-wave' methods - the Finite Difference Time Domain Method, the Method of Moments, and the Finite Element Method - are introduced...
Sair Linux and Gnu Certification: Level II Apache and Web Servers (Sair Linux)
Sair Linux and Gnu Certification: Level II Apache and Web Servers (Sair Linux)
Managing and troubleshooting Web servers is an integral part of every IT professional′s job. Apache is an open source Web server that has captured 63% of the more than 18 million Web servers currently in place. This guide provides the in–depth information, skills, and techniques needed to effectively maintain an Apache Web server. ...
Manufacturing Execution System - MES
Manufacturing Execution System - MES
The classical factory fades into history as production plants today develop into modern service centers. Problems in management arise for which many companies are not yet prepared: economic efficiency of modern added value is not a property of products alone but of the process. Decisive potential in business now is a question of process capability,...
SQL Server 2008 Transact-SQL Recipes: A Problem-Solution Approach (Recipes: a Problem-Solution Approach)
SQL Server 2008 Transact-SQL Recipes: A Problem-Solution Approach (Recipes: a Problem-Solution Approach)
SQL Server 2008 Transact–SQL Recipes: A Problem–Solution Approach is an example–based guide to the Transact–SQL language that is at the core of SQL Server 2008. Learn to create databases, insert and update data, generate reports, secure your data, and more. Author Joseph Sack takes common...
The Developer's Guide to Debugging
The Developer's Guide to Debugging

Software has bugs. Period.

That's true, unfortunately. Even the good old "hello, world" program, known to virtually every C and C++ programmer in the world, can be considered to be buggy. Developing software means having to deal with defects; old ones, new ones, ones you created yourself, and those that others brought to life....

Human, Social, and Organizational Aspects of Health Information Systems (Premier Reference Source)
Human, Social, and Organizational Aspects of Health Information Systems (Premier Reference Source)
Human, Social, and Organizational Aspects of Health Information Systems offers an evidence-based management approach to issues associated with the human and social aspects of designing, developing, implementing, and maintaining health information systems across a healthcare organizationspecific to an individual, team, organizational, system, and...
OS X Exploits and Defense
OS X Exploits and Defense
Long believed to be a sanctuary of computer security, the Macintosh OS X operating system is increasingly under fire, making it as vulnerable to attack as Windows or Linux operating systems.

Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an
...
Environmental Reform in the Information Age: The Contours of Informational Governance
Environmental Reform in the Information Age: The Contours of Informational Governance
As the information revolution continues to accelerate, the environment remains high on public and political agendas around the world. These two topics are rarely connected, but information - its collection, processing, accessibility and verification - is crucial in dealing with environmental challenges such as climate change, unsustainable...
SQL Clearly Explained, Second Edition (The Morgan Kaufmann Series in Data Management Systems)
SQL Clearly Explained, Second Edition (The Morgan Kaufmann Series in Data Management Systems)
It covers proper structure of SQL queries, how to produce a desired result and minimize a burden on SQL command processors, and how to modify data and database structure for ease of use and increased efficiency. Paper. DLC: SQL (Computer program language). --This text refers to an out of print or unavailable edition of this title....
Web 2.0 Heroes: Interviews with 20 Web 2.0 Influencers
Web 2.0 Heroes: Interviews with 20 Web 2.0 Influencers
If you are interested in learning about Web 2.0 and the history of its development, Web 2.0 Heroes: Interviews with 20 Web 2.0 Influencers contains all the information you need to understand Web 2.0 and its importance. Read first person accounts from industry leaders and innovators, who describe the influence and potential of Web 2.0, a...
Result Page: 296 295 294 293 292 291 290 289 288 287 286 285 284 283 282 281 280 279 278 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy