Home | Amazing | Today | Tags | Publishers | Years | Search 
Expert One-on-One Oracle
Expert One-on-One Oracle
Tom Kyte is of a rare breed. To begin, he's technically expert in his subject (administration of and development of applications for Oracle database management systems). What's more (and what distinguishes him from the ranks of the super-competent), he is both able and willing to share his considerable store of wisdom with Oracle users via...
Open Text Metastorm ProVision® 6.2 Strategy Implementation
Open Text Metastorm ProVision® 6.2 Strategy Implementation

Look around you. Everything that is made has been designed, with one exception: we don't design the very organizations that make the things you see, hear, feel, touch and taste. This is a very curious omission.

Now all this is changing. Visionary organizations have started to do just that – they are designing their...

Frommer's New York City 2011 (Frommer's Complete)
Frommer's New York City 2011 (Frommer's Complete)

We all have our personal tastes: what we like to listen to in terms of music, what kind of food we enjoy, what we relate to in art and architecture. Personal taste is a subjective matter, and I (Brian) only pay attention to raves, whether they are for a restaurant, artist, musician, or fi lm, if they are universal. If everyone likes it, it...

Frommer's Paris 2011 (Frommer's Colour Complete Guides)
Frommer's Paris 2011 (Frommer's Colour Complete Guides)

Discovering the City of Light and making it your own has always been the most compelling reason to visit Paris. If you’re a fi rst-timer, everything, of course, will be new to you. If you’ve been away for awhile, expect changes: Taxi drivers may no longer correct your fractured French, but address you in English—tantamount...

VHDL 101: Everything you need to know to get started
VHDL 101: Everything you need to know to get started

VHDL (VHSIC Hardware Description Language) is a hardware programming language commonly used for FPGA (Field Programable Gate Array) or ASIC (Application Specific Integrated Circuit) designs. FPGAs and the like are often found within larger applications such as cell phones, medical imagers, and personal media devices. As these devices are...

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen...

Computer and Information Sciences: Proceedings of the 25th International Symposium on Computer and Information Sciences
Computer and Information Sciences: Proceedings of the 25th International Symposium on Computer and Information Sciences

Computer and Information Sciences is a unique and comprehensive review of advanced technology and research in the field of Information Technology. It provides an up to date snapshot of research in Europe and the Far East (Hong Kong, Japan and China) in the most active areas of information technology, including Computer Vision, Data...

SharePoint 2010 Web Parts in Action
SharePoint 2010 Web Parts in Action

I really love working with SharePoint! I’ve been doing it full-time for the last half decade, including lots of late nights and weekends. One area that I’ve found particularly interesting is Web Parts. I like the nature of a Web Part since it can act as a standalone application inside the powerful SharePoint platform—or it...

Deploying Microsoft Forefront Threat Management Gateway 2010
Deploying Microsoft Forefront Threat Management Gateway 2010

When we began this project, our intent was to create a real world scenario that would guide IT professionals in using Microsoft best practices to deploy Microsoft Forefront Threat Management Gateway (TMG) 2010. We hope you find that we have achieved that goal. We’ve also included the main deployment scenarios for Forefront TMG,...

Osgi in Action: Creating Modular Applications in Java
Osgi in Action: Creating Modular Applications in Java

When I started working with OSGi technology back in 2000, I would’ve never guessed I’d still be working with it a decade later. Back then, OSGi was targeting the embedded market niche, but that wasn’t my area of interest. I wanted to create highly dynamic, modular applications, and OSGi gave me the possibility of...

Windows Server 2008 R2 Hyper-V: Insiders Guide to Microsoft's Hypervisor
Windows Server 2008 R2 Hyper-V: Insiders Guide to Microsoft's Hypervisor

Get the inside scoop on Hyper-V for Windows Server 2008 R2

Virtualization is a top priority for thousands of companies all over the world. Written by an author team that is part of the Windows virtualization group at Microsoft, Windows Server 2008 R2 Hyper-V will walk you through Hyper-V essentials so you can get you up to...

Moodle Security
Moodle Security

Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks. Learn how to safeguard Moodle to keep the bad guys...

Result Page: 143 142 141 140 139 138 137 136 135 134 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy