Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ada for Software Engineers
Ada for Software Engineers
Ada has become the language of choice for high integrity software systems, and is now used extensively in applications such as transportation, finance, aerospace and heavy industry. This book is aimed at professional software engineers making the transition to Ada, and at students using Ada for advanced undergraduate projects or graduate research....
Information Modeling for Internet Applications
Information Modeling for Internet Applications

Different kinds of objects containing data are found on the Internet, including structured (e.g., relational) databases, collections of documents, and search engines. On the one hand, creating, storing, manipulating, and retrieving Internet documents can benefit from techniques known from the databases and data modeling...

HP-UX 11i Tuning and Performance (2nd Edition)
HP-UX 11i Tuning and Performance (2nd Edition)

Maximizing the performance of Unix systems is a challenge that requires a specialized understanding of operating system behavior, knowledge of the design and tuning capabilities of the applications that run on the system, and an intimate acquaintance with system and application performance measuring tools that assist in...

Concepts of Database Management
Concepts of Database Management
CONCEPTS OF DATABASE MANAGEMENT fits perfectly into any introductory database course for information systems, business or CIS programs. This concise text teaches SQL in a database-neutral environment with all major topics being covered, including E-R diagrams, normalization, and database design. Now in its seventh edition, CONCEPTS OF DATABASE...
SQL Tips and Techniques
SQL Tips and Techniques

Beginning with tips for the person who is programming with SQL for the first time, SQL Tips and Techniques grows with your skills. You can start with Tip 1, "Understanding the Definition of a Database," and by the last Tip, "Displaying Image Data Stored Within a SQL Table," you will have covered all aspects of...

Advances in Digital Forensics IV (IFIP International Federation for Information Processing)
Advances in Digital Forensics IV (IFIP International Federation for Information Processing)
ADVANCES IN DIGITAL FORENSICS IV

Edited by: Indrajit Ray and Sujeet Shenoi

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of...

Designing Security Architecture Solutions
Designing Security Architecture Solutions
The first guide to tackle security architecture at the software engineering level

Computer security has become a critical business concern, and, as such, the responsibility of all IT professionals. In this groundbreaking book, a security expert with AT&T Business's renowned Network Services organization explores system security
...
Foundation Website Creation with HTML5, CSS3, and JavaScript
Foundation Website Creation with HTML5, CSS3, and JavaScript

Foundation Website Creation with HTML5, CSS3, and JavaScript shows the entire process of building a website. This process involves much more than just technical knowledge, and this book provides all the information you'll need to understand the concepts behind designing and developing for the Web, as well as the best means...

Windows Forensics: The Field Guide for Corporate Computer Investigations
Windows Forensics: The Field Guide for Corporate Computer Investigations

The evidence is in--to solve Windows crime, you need Windows tools

An arcane pursuit a decade ago, forensic science today is a household term. And while the computer forensic analyst may not lead as exciting a life as TV's CSIs do, he or she relies just as heavily on scientific principles and just as surely solves crime.

Whether...

Guide to Wireless Network Security
Guide to Wireless Network Security

With the rapid deployment of wireless networks in business environments, IT professionals must implement security mechanisms that are equivalent to those existing today for wire-based networks. This volume is an authoritative, clearly-presented guide to key foundation topics and technology frameworks for designing and maintaining secure,...

Auditing Cloud Computing: A Security and Privacy Guide
Auditing Cloud Computing: A Security and Privacy Guide

The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment

Many organizations are reporting or projecting a significant cost savings through the use of cloud computing—utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just...

Network Security Principles and Practices
Network Security Principles and Practices

Expert solutions for securing network infrastructures and VPNs.

  • Build security into the network by defining zones, implementing secure routing protocol designs, and building safe LAN switching environments

  • Understand the inner...

unlimited object storage image
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy