|
|
|
|
Windows Forensics: The Field Guide for Corporate Computer InvestigationsThe evidence is in--to solve Windows crime, you need Windows tools
An arcane pursuit a decade ago, forensic science today is a household term. And while the computer forensic analyst may not lead as exciting a life as TV's CSIs do, he or she relies just as heavily on scientific principles and just as surely solves crime.
Whether... | | SOA Patterns with BizTalk Server 2009SOA is about architecture, not products and SOA enables you to create better business processes faster than ever. While BizTalk Server 2009 is a powerful tool, by itself it cannot deliver long-lasting, agile solutions unless we actively apply tried and tested service-oriented principles.
The current BizTalk Server books are all for the... | | Access Data Analysis CookbookIf you have large quantities of data in a Microsoft Access database, and need to study that data in depth, this book is a data cruncher's dream. Access Data Analysis Cookbook offers practical recipes to solve a variety of common problems that users have with extracting Access data and performing calculations on it. Each recipe includes a... |
|
Hack Proofing Windows 2000 ServerEssential reading for any IT security organization, Hack Proofing Windows 2000 Server takes on a single, vital feature of Windows 2000 Server operations and explains its many aspects, both conceptually and practically. It expertly documents processes and explains complicated architectures through experience and research. The authors include... | | Windows Internals, Part 1: Covering Windows Server 2008 R2 and Windows 7
Windows Internals, Sixth Edition is intended for advanced computer professionals
(both developers
and system administrators) who want to understand how the
core components of the Microsoft Windows 7 and Windows Server 2008 R2 operating
systems work internally. With this knowledge, developers can better ... | | Microsoft® Windows® Registry Guide, Second EditionUnderstand how the registry works—and customize Windows to run the way you want.
Get the in-depth information you need to modify—and seamlessly manage—the Windows registry. Written for IT professionals and power users, this vital resource reveals little-known registry techniques, tricks, tips, and... |
|
Sams Teach Yourself Visual Basic 2008 in 24 Hours: Complete Starter KitIn just 24 sessions of one hour or less, you will be up and running with Visual Basic 2008. Using a straightforward, step-by-step approach, each lesson builds upon a real-world foundation forged in both technology and business matters, allowing you to learn the essentials of Visual Basic 2008 from the ground up. Step-by-step instructions carefully... | | PHP 5 Social Networking
Social Networking has quickly become a very popular activity on the Internet, particularly with the emergence of sites like Facebook and MySpace. PHP is a flexible web development language used on a wide variety of sites, including Facebook and Yahoo! But building a social networking site from scratch using PHP involves some complex logic,... | | Microsoft Windows Vista Unleashed (2nd Edition)Microsoft Windows Vista Unleashed, Second Edition, is a book for people, like you, who don’t consider themselves to be “average users.” It’s a book for anyone who finds that doing things the official way is slower, less efficient, and less powerful because Windows Vista was designed from the ground up to avoid... |
|
|
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |