Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
A Developer's Guide to Data Modeling for SQL Server: Covering SQL Server 2005 and 2008
A Developer's Guide to Data Modeling for SQL Server: Covering SQL Server 2005 and 2008
Model SQL Server Databases That Work Better, Do More, and Evolve More Smoothly

Effective data modeling is essential to ensuring that your databases will perform well, scale well, and evolve to meet changing requirements. However, if you’re modeling databases to run on Microsoft SQL Server 2008 or 2005, theoretical
...
Lasers in the Preservation of Cultural Heritage: Principles and Applications (Optics and Optoelectronics)
Lasers in the Preservation of Cultural Heritage: Principles and Applications (Optics and Optoelectronics)
The book … describes how laser parameters associated with cleaning are chosen and the physics involved in various surface ablation processes. Key conservation practices are also addressed, such as removal of black encrustation from stone, varnish from paintings, and the laser cleaning of metals and paper. It details the use and benefit of...
Active Directory Cookbook
Active Directory Cookbook

Take the guesswork out of deploying, administering, and automating Active Directory. With hundreds of proven recipes, the updated edition of this popular cookbook provides quick, step-by-step solutions to common (and not so common) problems you might encounter when working with Microsoft’s network directory service.

...

Access 2007 Programming by Example with VBA, XML, and ASP (Wordware Database Library)
Access 2007 Programming by Example with VBA, XML, and ASP (Wordware Database Library)
Access 2007 Programming by Example with VBA, XML, and ASP shows non-programmers how Access databases can be created, managed, and customized with Visual Basic for Applications (VBA) -- a powerful programming language built into Access. Hundreds of hands-on examples and projects throughout the book show users how to take charge of their Access...
Conceptual Modeling - ER 2007: 26th International Conference on Conceptual Modeling
Conceptual Modeling - ER 2007: 26th International Conference on Conceptual Modeling
This book constitutes the refereed proceedings of the 26th International Conference on Conceptual Modeling, ER 2007, held in Auckland, New Zealand, in November 2007.

The 37 revised full papers presented together with 3 keynote lectures were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on...

Microsoft Sql Server 7.0 Database Implementation Training Kit
Microsoft Sql Server 7.0 Database Implementation Training Kit
This training teaches IS professionals and SQL developers how to implement database solutions using the latest version of the Microsoft SQL Server relational database management system. Students will gain an understanding of the product's architecture and, through the accompanying labs, attain hands-on experience with the procedures to plan,...
Sun Certified Enterprise Architect for Java EE Study Guide (2nd Edition)
Sun Certified Enterprise Architect for Java EE Study Guide (2nd Edition)

Definitive, Comprehensive SCEA Exam Prep–Straight from Sun’s Exam Developers!

 

This book delivers complete, focused review for Sun’s...

Combating Spyware in the Enterprise
Combating Spyware in the Enterprise
Spyware is a term that in many ways has become a commonly used substitute for many other types of intrusions on a host.To compare it to something in the nontechnical world, it would be similar to asking someone for some aspirin, but in return getting acetaminophen, ibuprofen, or some other pain...
Privacy and Security for Cloud Computing (Computer Communications and Networks)
Privacy and Security for Cloud Computing (Computer Communications and Networks)

This book analyzes the latest advances in privacy, security and risk technologies within cloud environments. With contributions from leading experts, the text presents both a solid overview of the field and novel, cutting-edge research. A Glossary is also included at the end of the book. Topics and features: considers the various forensic...

Corporate Aftershock: The Public Policy Lessons from the Collapse of Enron and Other Major Corporations
Corporate Aftershock: The Public Policy Lessons from the Collapse of Enron and Other Major Corporations
"In the near future, someone will build a better Enron–a legitimate company with the means and integrity to revolutionize markets. That person will want to use Corporate Aftershock as his business manual and had better hope that government regulators are reading it as well."

–Ross M. Miller, author, Paving Wall...

Web Penetration Testing with Kali Linux
Web Penetration Testing with Kali Linux

A practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux

Overview

  • Learn key reconnaissance concepts needed as a penetration tester
  • Attack and exploit key features, authentication, and sessions on web...
The Art of Computer Virus Research and Defense
The Art of Computer Virus Research and Defense

Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly...

unlimited object storage image
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy