|
|
|
|
|
Oracle SQL Tuning Pocket ReferenceThis book is a quick-reference guide for tuning Oracle SQL. This is not a comprehensive Oracle tuning book.
The purpose of this book is to give you some light reading material on my "real world" tuning experiences and those of my company, Mark Gurry & Associates. We tune many large Oracle sites. Many of those sites, such as... | | Snort CookbookIf you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an... | | Website Development with PyroCMS
When you have to build websites fast, PyroCMS is one of the most capable systems available to PHP developers. With this book you'll gain deep insight into its features and techniques for practical application.
Overview
-
Learn how to build websites quickly, thus saving time
-
Effectively...
|
|
|
How to Write Fast Under PressureAnyone who regularly deals with work-related writing deadlines knows the kind of paralysis that can take over when there's too much to accomplish and not enough time to compose a clear sentence. This book contains an easy, efficient, and confidence-building process for keeping up and being productive, even under tight time constraints and... | | Dying in Good Hands: Palliative Massage and the Power of Touch
Massage has many physical and emotional benefits for patients in palliative care, from preventing pressure sores and lessening physical pain to creating a tangible connection between the massager and the massaged.
In Dying in Good Hands, massage therapists and trainees will find the tools they need for massage at... | | Node Security
Take a deep dive into the world of securing your Node applications with Node Security
Overview
-
Examine security features and vulnerabilities within JavaScript
-
Explore the Node platform, including the event-loop and core modules
-
Solve common security problems with available...
|
|
|
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 |