Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed: Network Security Secrets & Solutions
Hacking Exposed: Network Security Secrets & Solutions
In today's round-the-clock, hyper-connected, all-digital economy, computer security is everyone's business. Hacking Exposed: Network Security Secrets & Solutions, Second Edition brings even more in-depth insight into how hackers infiltrate e-business, and how they can be stopped. Security insiders Stuart McClure, Joel Scambray, and George Kurtz...
Game Engine Toolset Development
Game Engine Toolset Development
Toolset development is an extremely broad topic. Game Engine Toolset Development provides you with a core set of skills and a comprehensive insight that will aid you in the development of game engine utilities, significantly reducing the time period associated with the construction phase of a project. The book starts off with topics regarding...
The Best Damn Exchange, SQL and IIS Book Period
The Best Damn Exchange, SQL and IIS Book Period
Exchange, SQL and IIS are at the core of most Microsoft enterprise servers. The 2007 releases of these products, along with the release of Windows Vista and Windows 2008 Server, represents the biggest overhaul of Windows enterprise products since Windows 2000. The dramatic changes to security tools and the addition of features that support...
Software Testing and Quality Assurance: Theory and Practice
Software Testing and Quality Assurance: Theory and Practice
A superior primer on software testing and quality assurance, from integration to execution and automation

This important new work fills the pressing need for a user-friendly text that aims to provide software engineers, software quality professionals, software developers, and students with the fundamental developments in testing theory and...

Engineering Service Oriented Systems: A Model Driven Approach
Engineering Service Oriented Systems: A Model Driven Approach
Despite pressures of economic slowdown and the e-commerce bubble burst, moving towards e-services is a compelling necessity for todays organizations. Companies that are reluctant to adopt a service oriented architecture in their IT systems will be missing out on unprecedented opportunities to create business value with relatively small IT...
Network Warrior
Network Warrior

The examples used in this book are taken from my own experiences, as well as from the experiences of those with or for whom I have had the pleasure of working. Of course, for obvious legal and honorable reasons, the exact details and any information that might reveal the identities of the other parties involved have been changed.

...
SharePoint 2010 for Project Management
SharePoint 2010 for Project Management
Do you find yourself asking for more time whenever you work on a project? Do you ever get the extra time you asked for? Well, if you’re like me, you rarely get the extra time you need from your customers. This got me thinking about how I can buy more time for my projects. I decided to find out if I could gain more time by reducing...
Switch: How to Change Things When Change Is Hard
Switch: How to Change Things When Change Is Hard

Why is it so hard to make lasting changes in our companies, in our communities, and in our own lives?

The primary obstacle is a conflict that’s built into our brains, say Chip and Dan Heath, authors of the critically acclaimed bestseller Made to Stick. Psychologists have discovered that our minds are ruled
...

Persistence in PHP with Doctrine ORM
Persistence in PHP with Doctrine ORM

This book is designed for PHP developers and architects who want to modernize their skills through better understanding of Persistence and ORM. You'll learn through explanations and code samples, all tied to the full development of a web application.

Overview

  • Develop a fully functional Doctrine-backed...
Practical Perforce
Practical Perforce

When developers build software, they're able to keep track of all the different versions and all the components they use with software configuration management (SCM) systems. One of the more popular SCM products is Perforce.

Authored by Perforce's own VP of product technology, ...

Manage IT as a Business : How to Achieve Alignment and Add Value to the Company
Manage IT as a Business : How to Achieve Alignment and Add Value to the Company
Many IT projects fail to deliver the benefits to the business that they promised. This is despite the fact that IT managers and staff work hard to meet the needs of the business by putting systems into place and ensuring that network operations are reliable and stable. The cause of this problem is almost always a misalignment of IT within the...
How to Cheat at Managing Information Security
How to Cheat at Managing Information Security
Information security is different from many other disciplines both within mainstream
information technology and other business areas. Even though there are
now many good books on various areas, getting the breadth of knowledge
across the many subareas is still difficult, but it is essential to success.

Unlike so many
...
unlimited object storage image
Result Page: 141 140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 125 124 123 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy