|
|
|
|
Sas 9.2 Language Reference DictionaryIn a DATA step, you can track the execution of code within a DO group. The DATA statement has an optional argument for you to write a note to the SAS log when the DO statement begins and ends.
New SAS system options enable you to set a default record length, specify options for accessing PDF files, specify values for Scalable... | | | | |
|
LWUIT 1.1 for Java ME DevelopersWriting appealing cross-device applications today in Java ME is challenging as implementation differences in fonts, layout, and menus can make your application look and behave very differently on different devices. So far, the only way out has been low-level programming with its associated complexity.
The Lightweight UI Toolkit (LWUIT),... | | Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios"A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, security research scientist, @stake, Inc.
Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and... | | Salesforce.com For Dummies
Salesforce.com For Dummies, 4th Edition, is for users of Salesforce, including those users who have the Unlimited, Enterprise, Professional, Group, Contact Manager, or Personal edition. It’s for Salesforce users who want to quickly know how to use this browser-based application for sales and customer service, all running “in the... |
|
Understanding Thin-Client/Server Computing (Strategic Technology Series)From nontechnical managers to IT professionals, everyone with responsibility for networks wants answers to the problem of Total Cost of Ownership (TCO). And this book provides what may be the hottest answer yet. Here's thorough coverage of thin client technology for Microsoft Windows and Windows NT-technology that gives simple machines (even dumb... | | The Official CHFI Study Guide (Exam 312-49)This is the only official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study guide. It was written for security professionals, systems administrators, IT consultants, legal professionals, IT managers, police and law enforcement personnel studying for the CHFI certification, and professionals needing the skills to identify an... | | Audit and Trace Log Management: Consolidation and Analysis
Audit and Trace Log Management: Consolidation and Analysis
is both a timely and much needed compilation of useful information around a topic
that is becoming more and more critical to not only IT professionals and
security practitioners, but to many other departments, such as legal, risk,
and compliance, as well as auditors and... |
|
MySQL High Availability: Tools for Building Robust Data Centers
Server bottlenecks and failures are a fact of life in any database deployment, but they don’t have to bring everything to a halt. This practical book explains replication, cluster, and monitoring features that can help protect your MySQL system from outages, whether it’s running on hardware, virtual machines, or in the... | | GARCH Models: Structure, Statistical Inference and Financial Applications
Provides a comprehensive and updated study of GARCH models and their applications in finance, covering new developments in the discipline
This book provides a comprehensive and systematic approach to understanding GARCH time series models and their applications whilst presenting the most advanced results... | | Visual Basic 2005 Instant Results (Programmer to Programmer)Packed with unique, ready-to-use projects, this reference book will help you quickly get up to speed with Visual Basic 2005. Each project is presented in a step-by-step format, which enables you to set up, enhance, and reuse them in different real world situations.
Visual Basic 2005 Instant Results not only provides you with... |
|
|
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |