 |
|
|
|
 Cybersecurity Operations HandbookCybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity... |  |  |  |  |
|
 Web Services Platform Architecture: SOAP, WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and MoreThe Insider's Guide to Building Breakthrough Services with Today's New Web Services PlatformUsing today's new Web services platform, you can build services that are secure, reliable, efficient at handling transactions, and well suited to your evolving service-oriented architecture. What's more, you can do all that without compromising the... |  |  Programming Microsoft Office Access 2003 (Core Reference)Whether you’re extending an existing database or developing a complex custom solution, get the code and instruction you need to exploit the power and performance of Access 2003. The newest edition o this acclaimed reference packs even more real-world examples and best practices for writing, testing, and debugging extensible database... |  |  UNIX® User's Handbook, Second EditionUNIX end-users desperately need an up-to-date reference guide with real depth: one that teaches UNIX commands and doesn't just list them! In UNIX User's Handbook, second edition, best-selling UNIX author Marty Poniatowski covers every topic UNIX users need to master-with exceptional clarity... |
|
|
|
|
Result Page: 25 24 23 22 21 20 19 18 17 16 |