 |
|
|
 Disaster Recovery (EC-Council Disaster Recovery Professional)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |  |  Database Systems: Design, Implementation, and Management
For many reasons, few books survive to reach their eighth edition. Authors and publishers who let the success of their
earlier work produce the comfort of complacency usually pay the price of watching the marketplace dismantle their creations.
This database systems book has been successful through seven editions because we–the... |  |  Web Engineering: A Practioner's Approach
As we began to plan this book, we worried that it would become lost in the
hundreds—no, thousands—of volumes that have been written on “Web design,”
HTML, Java, XML, or any of the myriad technologies that must be understood
to build successful Web-based systems and applications (WebApps). To our surprise,
we... |
|
 Pro Spring Batch
Since its release, Spring Framework has transformed virtually every aspect of Java development including web applications, security, aspect-oriented programming, persistence, and messaging. Spring Batch, one of its newer additions, now brings the same familiar Spring idioms to batch processing. Spring Batch addresses the needs of any batch... |  |  |  |  Information Modeling for Internet Applications
Different kinds of objects containing data are found on the Internet, including structured (e.g., relational) databases, collections of documents, and search engines. On the one hand, creating, storing, manipulating, and retrieving Internet documents can benefit from techniques known from the databases and data modeling... |
|
 Virtualization Security (EC-Council Disaster Recovery Professional)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |  |  Model-Based Development: Applications
A Proven Development Methodology That Delivers On the Promise of Model-Based Approaches
Software continues to become more and more complex, while software consumers’ expectations for performance, reliability, functionality, and speed-to-market are also growing exponentially. H. S. Lahman shows how... |  |  Network Security Auditing (Networking Technology: Security)
Mention the word audit to IT professionals and you will probably see their eyes glaze over as
they imagine frightening visions of auditors with pointy tails, pitchforks, and checklists run
ning around and pointing out all of the things they have done wrong to their manager. The
purpose of a security audit is not to place blame or pick... |
|
| Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |