Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microsoft(R) SQL Server(R) 2008 Administrator's Pocket Consultant
Microsoft(R) SQL Server(R) 2008 Administrator's Pocket Consultant

From the author and series editor of the immensely popular ADMINISTRATOR'S POCKET CONSULTANT series from Microsoft Press®-this pocket-size guide delivers fast, accurate answers on the spot for IT professionals.

Microsoft® SQL Server® 2008 Administrator's Pocket Consultant, 2nd Edition is the...

The XP Files:  Windows' Hidden Tools for Secure Sharing, Communication, and Collaboration
The XP Files: Windows' Hidden Tools for Secure Sharing, Communication, and Collaboration

XP's Best-Kept Secrets--Revealed!

During the past decade, Microsoft has created the some of the best Internet communication programs in the world and has installed them on every Windows computer--free, but mostly hidden. Until now, only a few knowledgeable computer users knew how to exploit the potential of these programs--and understood...

Beginning SQL Server 2012 Administration (Beginning Apress)
Beginning SQL Server 2012 Administration (Beginning Apress)
The SQL Server product has been around since the late 1980s. Back then, Microsoft worked together with Sybase to create a database on the OS/2 platform. Shortly after this effort was completed, Microsoft realized it wanted to tightly couple SQL Server with Windows. By 1993, Microsoft had released Windows NT 3.1, and with it came the option of...
Hacker Linux Uncovered
Hacker Linux Uncovered
Concentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates how to install Linux so that it is tuned for the highest security and best performance, how to scan the network and encrypt the traffic for securing all private traffics in a public network, and how to monitor and log...
The Role of the Scroll: An Illustrated Introduction to Scrolls in the Middle Ages
The Role of the Scroll: An Illustrated Introduction to Scrolls in the Middle Ages

A beautifully illustrated, full-color guide to scrolls and their uses in medieval life.

Scrolls have always been shrouded by a kind of aura, a quality of somehow standing outside of time. They hold our attention with their age, beauty, and perplexing format. Beginning in the fourth century, the codex?or...

SQL Server 2005 Management and Administration
SQL Server 2005 Management and Administration

Microsoft SQL Server 2005 Management and Administration, based on Service Pack 2, addresses the challenges database administrators regularly encounter on SQL Server 2005 by providing detailed guidance in the areas of management, administration, security, and monitoring. With coverage of the new features and...

The Gordion Wooden Objects, Volume 1 The Furniture from Tumulus MM (2 vols) (Culture and History of the Ancient Near East)
The Gordion Wooden Objects, Volume 1 The Furniture from Tumulus MM (2 vols) (Culture and History of the Ancient Near East)

"The Furniture from Tumulus MM" is a study of the furniture from the largest tomb at Gordion, Turkey, excavated in 1957 by the University of Pennsylvania Museum. The tomb dates to the eighth century BC and is thought to be the burial of the great Phrygian king Midas or his father. The objects, initially misunderstood, are now...

Effective Use of Microsoft Enterprise Library: Building Blocks for Creating Enterprise Applications and Services
Effective Use of Microsoft Enterprise Library: Building Blocks for Creating Enterprise Applications and Services

Writing robust enterprise applications presents a special challenge for developers, but Microsoft has addressed that challenge with the free, downloadable Enterprise Library for the .NET Framework.

Enterprise Library is a collection of application blocks and guidance documents that together provide functionality common to enterprise...

101 Microsoft Visual Basic .NET Applications
101 Microsoft Visual Basic .NET Applications

Explore 101 of the most useful Visual Basic .NET applications in action—and jumpstart your own Microsoft .NET Framework-based development projects. This guide provides expert, behind-the-code commentary on 101 fully executable code samples—distilling more than 700 hours of programming time into best practices for Microsoft...

Applied Cryptanalysis: Breaking Ciphers in the Real World
Applied Cryptanalysis: Breaking Ciphers in the Real World
The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material...
Citrix Access Gateway VPX 5.04 Essentials
Citrix Access Gateway VPX 5.04 Essentials

A practical step-by-step guide to provide secure remote access using the Citrix Access Gateway VPX

Overview

  • A complete administration companion guiding you through the complexity of providing secure remote access using the Citrix Access Gateway 5 virtual appliance.
  • Establish secure access...
Check Point NGX R65 Security Administration
Check Point NGX R65 Security Administration
Check Point NGX R65 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. Check Point's NGX is the underlying security software platform for all of the company's enterprise firewall, VPN and management solutions. It enables enterprises of all sizes to reduce the cost and complexity...
unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy