Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering SQL Server 2008
Mastering SQL Server 2008
As Microsoft’s bestselling database manager, SQL Server is highly flexible and customizable, and has excellent support—the 2008 version offers several significant new capabilities. This book offers accurate and expert coverage on the updates to SQL Server 2008 such as its enhanced security; the ability to encrypt an entire database,...
JMX in Action
JMX in Action
Covering the Java Management Extensions specification, this guide teaches programmers how JMX can provide robust management and monitoring capabilities for Java and non-Java resources including hardware. Going beyond covering the API, real-life examples and useful code are demonstrated in detail. In addition to describing the JMX...
Microsoft Log Parser Toolkit
Microsoft Log Parser Toolkit
Do you want to find Brute Force Attacks against your Exchange Server? Would you like to know who is spamming you? Do you need to monitor the performance of your IIS Server? Are there intruders out there you would like to find? Would you like to build user logon reports from your Windows Server? Would you like to export your logs to XML? Would you...
Managing Online Forums: Everything You Need to Know to Create and Run Successful Community Discussion Boards
Managing Online Forums: Everything You Need to Know to Create and Run Successful Community Discussion Boards
Every day, millions of users log on to their favorite online forums and inter­act with others to get advice and discuss everything from the latest news and trends to their hobbies to their professions to whatever else strikes their fancy. Admin­istrators have to lead these communities, deal with difficult users, and choose moderators. Legal...
Physics for Radiation Protection: A Handbook
Physics for Radiation Protection: A Handbook

A highly practical resource for health physicists and other professionals in radiation protection. The new edition has been completely revised and updated. New chapters were added on internal radiation dose and the environmental behavior of radionuclides, as well as a new section on log-normal distribution of environmental...

Linux (Hacking Exposed)
Linux (Hacking Exposed)

From the publisher who brought you the international best-seller, Hacking Exposed: Network Security Secrets & Solutions...

Learn how to think like a hacker in order to secure your Linux network

In the ever-changing world of global data communications, inexpensive Internet connections, and fast-paced software...

Independent Component Analysis of Edge Information for Face Recognition (SpringerBriefs in Applied Sciences and Technology)
Independent Component Analysis of Edge Information for Face Recognition (SpringerBriefs in Applied Sciences and Technology)

The book presents research work on face recognition using edge information as features for face recognition with ICA algorithms. The independent components are extracted from edge information. These independent components are used with classifiers to match the facial images for recognition purpose. In their study, authors have explored Canny...

Managing Enterprise Systems with the Windows Script Host
Managing Enterprise Systems with the Windows Script Host
  • Covers common administration tasks for Exchange 5.5, Exchange 2000, Internet Information Server (IIS) 4.0 and 5.0, and Windows NT 4.0, 2000, and XP
  • Includes extensive examples using Windows Management Instrumentation (WMI) to provide registry, network/system administrative, and security operations
  • ...
 
   
unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy