 |
|
|
 Pro Apache Log4j, Second EditionIn development scenarios where things can't be run in a debugger, or when you run the risk of masking the problem, logs are the greatest source of information about running a program. Pro Apache Log4j, Second Edition</i> provides best practices guidelines and comprehensive coverage of the most recent release.
Step by step, the book... |  |  Mastering Oracle Scheduler in Oracle 11g Databases
Scheduler (DBMS_SCHEDULER) is included in Oracle Database and is a tool for the automation, management, and control of jobs. It enables users to schedule jobs running inside the database such as PL/SQL procedures or PL/SQL blocks, as well as jobs running outside the database like shell scripts. Scheduler ensures that jobs are run on time,... |  |  Portable DBA: OracleThis handy, affordable reference is ideal for on-the-job DBAs in need of quick access to administrative commands, error resolutions, and best practices. Covering the most commonly used Oracle database versions, the book contains invaluable tables so problems can be diagnosed quickly and includes examples and syntax diagrams for each command. ... |
|
 Learning Perl on Win32 SystemsIn this smooth, carefully paced course, leading Perl trainers and a Windows NT practitioner teach you to program in the language that promises to emerge as the scripting language of choice on NT. Perl for Win32 is a language for easily manipulating text, files, user and group profiles, performance and event logs, and registry entries. Based on... |  |  WebSphere Application Server 7.0 Administration GuideAs an administrator you need a secure, scalable, resilient application infrastructure to support the developers building and managing J2EE applications and Service Oriented Architecture services. WebSphere application server, a product from IBM, is optimized to ease administration and improve runtime performance. It helps you run applications and... |  |  Mac OS X, iPod, and iPhone Forensic Analysis DVD ToolkitThis book and companion DVD provide digital forensic investigators, security professionals, and law enforcement with all of the information, tools, and utilities required to conduct forensic investigations of computers running any variant of the Macintosh OS X operating system, as well as the almost ubiquitous iPod and iPhone. Digital forensic... |
|
 Hacking Exposed Malware & Rootkits
Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been... |  |  Tcl 8.5 Network Programming
Tcl (Tool Command Language) is a very powerful and easy to learn dynamic programming language, suitable for a very wide range of uses. Tcl is regarded as one of the best-kept secrets in the software industry. This book gives you a hands-on experience on Tcl, helping you develop network-aware applications using this mature yet evolving... |  |  Human Computer Interaction: Concepts, Methodologies, Tools and Applications
The systematic study of human-computer interaction has arguably been the most significant factor driving the exponential increase in technology acceptance, diffusion, and utilization, over the past two decades, as well as the technology-driven productivity gains that have benefited a full spectrum of organizations.
Human... |
|
| Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |