 |
|
 Data Warehousing Fundamentals for IT Professionals
Cutting-edge content and guidance from a data warehousing expert—now expanded to reflect field trends
Data warehousing has revolutionized the way businesses in a wide variety of industries perform analysis and make strategic decisions. Since the first edition of Data Warehousing Fundamentals, numerous... |  |  Pay-Per-Click Search Engine Marketing: An Hour a Day
The complete guide to a winning pay-per-click marketing campaign
Pay-per-click advertising-the "sponsored results" on search engine results pages-is increasingly being used to drive traffic to websites. Marketing and advertising professionals looking for a hands-on, task-based guide to every stage of creating and managing... |  |  Data Protection for Virtual Data Centers
Essential information on how to protect data in virtual environments!
Virtualization is changing the data center architecture and as a result, data protection is is quickly evolving as well. This unique book, written by an industry expert with over eighteen years of data storage/backup experience, shows you how to approach,... |
|
 Holographic Data Storage: From Theory to Practical Systems
The modern field of nonvolatile digital information storage is a bit more than a half-century old. During its history, the field has seen a small handful of technologies (magnetic tape, magnetic hard disk, magnetic flexible disk, consumer-derived optical disk) take root as ‘mainstream’. These technologies have persisted in the... |  |  Managing the Testing Process
Practical ways to run a test operation that’s driven by quality – not crisis.
The wisdom in this book does not rely on brilliant theories or any Scientific Truth other than what works--on the job, time and time again. In Managing the Testing Process, you’ll examine an integrated approach–-the bricks... |  |  Internet Lockdown: Internet Security Administrator's Handbook
Internet Lockdown: Internet Security Administrator's Handbook covers hot security technology including firewalls, intrusion detection and prevention, honeypots, network security on all operating systems. It explains confusing core concepts like certificates, cryptography, firewalls and encryption in a fashion anyone can understand.... |
|
|
|
| Result Page: 316 315 314 313 312 311 310 309 308 307 306 305 304 303 302 301 300 299 298 |