 |
|
|
|
|
 |  |  |  |  Understanding DB2 9 SecurityUnderstanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world... |
|
|
 |  |  Peer to Peer Computing: The Evolution of a Disruptive TechnologyPeer to Peer Computing: The Evolution of Disruptive Technology takes a holistic approach to the affects P2P Computing has on a number a disciplines. Some of those areas covered within this book include grid computing, web services, bio-informatics, security, finance and economics, collaboration, and legal issues. Unique in its approach, Peer to... |  |  Dynamic Enterprise Architecture: How to Make It WorkThis book presents an approach to enterprise architecture, which enables corporations to achieve their business objectives faster. Focusing on the governance of IT in the organization, it provides tangible tools, advice and strategies for implementing and designing the architectural process within a corporation that will make a major contribution... |
|
|
Result Page: 14 13 12 11 10 9 8 7 6 5 |