Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SQL Server 2012 Data Integration Recipes: Solutions for Integration Services and Other ETL Tools (Expert's Voice in SQL Server)
SQL Server 2012 Data Integration Recipes: Solutions for Integration Services and Other ETL Tools (Expert's Voice in SQL Server)

SQL Server 2012 Data Integration Recipes provides focused and practical solutions to real world problems of data integration. Need to import data into SQL Server from an outside source? Need to export data and send it to another system? SQL Server 2012 Data Integration Recipes has your back. You'll find solutions...

Professional SQL Server High Availability and Disaster Recovery: Implement tried-and-true high availability and disaster recovery solutions with SQL Server
Professional SQL Server High Availability and Disaster Recovery: Implement tried-and-true high availability and disaster recovery solutions with SQL Server

Leverage powerful features of the SQL Server and watch your infrastructure transform into a high-performing, reliable network of systems.

Key Features

  • Explore more than 20 real-world use cases to understand SQL Server features
  • Get to grips with the SQL Server Always On...
Splunk Essentials
Splunk Essentials

Leverage the power of Splunk to efficiently analyze machine, log, web, and social media data

About This Book

  • Make impressive reports and dashboards easily
  • Search, locate, and manage apps in Splunk
  • Use the Twitter app to create a dashboard based on Twitter searches of...
The Art of Error Correcting Coding
The Art of Error Correcting Coding
Building on the success of the first edition, which offered a practical introductory approach to the techniques of error concealment, this book, now fully revised and updated, provides a comprehensive treatment of the subject and includes a wealth of additional features. The Art of Error Correcting Coding, Second Edition explores...
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen...

Deploying Windows 2000 with Support Tools
Deploying Windows 2000 with Support Tools
Visually, Windows 2000 is similar to previous versions of Windows. Its extensive new functionality, the overriding goal of which is to reduce an organization's "total cost of ownership," however, makes the system administrator's life easier. This translates to quicker software installation, more efficient management, and easier...
Mac OS X Lion: Visual Quickstart Guide
Mac OS X Lion: Visual Quickstart Guide
Mac OS X Lion—or also simply called OS X Lion—is the latest version of the computer operating system that put the phrase graphic user interface in everyone’s vocabulary. With Mac OS, you can point, click, and drag to work with files, applications, and utilities. Because the same intuitive interface...
WildFly: New Features
WildFly: New Features

Get acquainted with the exciting new features that WildFly has to offer with this book and ebook

Overview

  • Learn about the latest WildFly components, including CLI management, classloading, and custom modules
  • Customize your web server and applications by managing logs, virtual hosts, and the...
Sams Teach Yourself Sap R/3 in 10 Minutes
Sams Teach Yourself Sap R/3 in 10 Minutes
Sams Teach Yourself SAP R/3 in 10 Minutes covers general tasks including basic navigation skills, working with master data, and running reports. With timesaving tips, plain english definitions, panic button advice, and easy-to-follow tutorials that can be completed in 10 minutes or less, you will be immediately...
Data Mining Tools for Malware Detection
Data Mining Tools for Malware Detection

Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop...

Test Equating, Scaling, and Linking: Methods and Practices
Test Equating, Scaling, and Linking: Methods and Practices

This book provides an introduction to test equating, scaling and linking, including those concepts and practical issues that are critical for developers and all other testing professionals. In addition to statistical procedures, successful equating, scaling and linking involves many aspects of testing, including procedures to develop tests,...

Mastering Dojo: JavaScript and Ajax Tools for Great Web Experiences (Pragmatic Programmers)
Mastering Dojo: JavaScript and Ajax Tools for Great Web Experiences (Pragmatic Programmers)
The last couple of years have seen big changes in server-side web programming. Now it's the client's turn; Dojo is the toolkit to make it happen and Mastering Dojo shows you how.

Dojo is a set of client-side JavaScript tools that help you build better web applications. Dojo blurs the line between local, native applications and browser based...

Result Page: 21 20 19 18 17 16 15 14 13 12 11 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy