 |
|
 Access 2010 Bible
Welcome to the Microsoft Access 2010 Bible, your personal guide to a powerful, easy-to-use database-management system. This book is in its eleventh revision and has been totally rewritten for Microsoft Access 2010 with new text, new pictures, and a completely new and improved set of example files.
This book examines Access 2010... |  |  Mastering Microsoft Exchange Server 2010
A top-selling guide to Exchange Server-now fully updated for Exchange Server 2010.
Keep your Microsoft messaging system up to date and protected with the very newest version, Exchange Server 2010, and this comprehensive guide. Whether you're upgrading from Exchange Server 2007 SP1 or earlier, installing for the first time, or... |  |  Plone 3 Multimedia
Plone is a free and open source content management system built on top of the Zope application server. Multimedia provides us with stunning interactive user experiences and many design options, but it requires discipline and knowledge to utilize it effectively so that we do not alienate our audiences. By providing an overview of multimedia... |
|
|
 |  |  Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step Guide
Massive, disruptive change is coming to IT as Software as a Service (SaaS), SOA, mashups, Web 2.0, and cloud computing truly come of age. Now, one of the world’s leading IT innovators explains what it all means—coherently, thoroughly, and authoritatively.
Writing for IT executives, architects, and developers... |  |  |
|
 Unauthorised Access: Physical Penetration Testing For IT Security Teams
The first guide to planning and performing a physical penetration test on your computer's security
Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application... |  |  Cyberthreats: The Emerging Fault Lines of the Nation State
As new technologies develop, terrorist groups are developing new methods of attack by using the Internet, and by using cyberspace as a battlefield, it has become increasingly difficult to discover the identity of attackers and bring them to justice. The seemingly limitless boundaries of cyberspace has allowed virtually anyone to launch an... |  |  JavaFX 1.2 Application Development Cookbook
JavaFX Script enables you to easily create rich Internet applications by embedding multimedia components. Although you can create stylish Internet applications by modifying these default components, even advanced users find it challenging to create impressive feature-rich Internet applications with JavaFX. Also, there are limited JavaFX... |
|
| Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 |