Home | Amazing | Today | Tags | Publishers | Years | Search 
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Uncover, exploit, and close security holes in any software or operating system

Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This...

Designing for Scalability with Microsoft Windows DNA
Designing for Scalability with Microsoft Windows DNA
In March 1998, we presented to our clients a technical report entitled En skalbar arkitektur. We wrote it in Swedish, which is our native language. Its purpose was to offer ideas for designing and developing scalable Microsoft Windows applications, using tools such as Microsoft Visual Basic 5.0 and Microsoft Transaction Server (MTS) and...
Common Warehouse Metamodel: An Introduction to the Standard for Data Warehouse Integration
Common Warehouse Metamodel: An Introduction to the Standard for Data Warehouse Integration
"The time has come for the consumers themselves to step forward and to specify a standard for meta data semantics and meta data exchange. This book is an important first step in that direction."
–W. H. Inmon, from the Foreword

The Common Warehouse Metamodel (CWM) is rapidly gaining momentum within the data warehousing...

SQL Hacks
SQL Hacks

Whether you're running Access, MySQL, SQL Server, Oracle, or PostgreSQL, this book will help you push the limits of traditional SQL to squeeze data effectively from your database. The book offers 100 hacks -- unique tips and tools -- that bring you the knowledge of experts who apply what they know in the real world to help you...

Common Warehouse Metamodel Developer's Guide
Common Warehouse Metamodel Developer's Guide
The official guide on how to develop interoperable data warehouse and business intelligence applications from the authors of the CWM specification

This authoritative guide will show you how to develop interoperable data warehouse and business intelligence applications using the Common Warehouse Metamodel (CWM) specification. It provides you...

Succeeding with Object Databases: A Practical Look at Today's Implementations with Java and XML
Succeeding with Object Databases: A Practical Look at Today's Implementations with Java and XML
There is a definite need by many users and practitioners for documented case studies and examples that demonstrate the first-hand use of Object Data Management in realworld applications and systems. During the past few years, we have seen tremendous interest in Java. There has been an important shift from using Java just on the clientside to the...
Backup & Recovery
Backup & Recovery

Packed with practical, freely-available backup and recovery solutions for Unix, Linux, Windows and Mac OS X systems -- as well as various databases -- this new guide is a complete overhaul of Unix Backup & Recovery by the same author, now revised and expanded with over 75% new material.

...
Database Design for Smarties: Using UML for Data Modeling
Database Design for Smarties: Using UML for Data Modeling
If you want to see how your next database project can profit from object-oriented design, check out Database Design for Smarties, a lively and intelligent guide to using objects in databases.

The book begins with a tour of some underlying factors in modeling databases. Here, the author distinguishes between the external,...

MySQL Clustering
MySQL Clustering

Clustering is the final component of MySQL that makes it truly enterprise-level and able to compete fully with proprietary databases such as Oracle and Microsoft SQL Server. The increased number of high-demand, high-productivity corporations and institutions choosing MySQL, including MIT, the Department of Homeland Security,...

Enterprise J2ME: Developing Mobile Java Applications
Enterprise J2ME: Developing Mobile Java Applications
This book helps experienced Java developers to build high-value mobile applications that take advantage of enterprise IT infrastructures. It also helps developers to add mobility features to existing enterprise solutions. It does not repeat the same basic J2ME/MIDP API tutorial covered by many other books.

After a comprehensive analysis of the...

Introduction to Cryptography
Introduction to Cryptography

Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data.

In the first part, this book covers the key concepts of cryptography on...

Agile Web Development with Rails (Pragmatic Programmers)
Agile Web Development with Rails (Pragmatic Programmers)
The definitive, Jolt-award winning guide to learning and using Rails is now in its Second Edition. Rails is a new approach to web-based application development that enables developers to create full-featured, sophisticated web-based applications using less code and less effort. Now programmers can get the job done right and still leave work on...
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy