Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SUSE Linux 9.3 For Dummies
SUSE Linux 9.3 For Dummies

SUSE Linux is an increasingly popular Linux distribution that competes head-on with Red Hat’s Linux versions. SUSE Linux’s fortunes have been on the rise following Novell’s acquisition of Germany’s SUSE Linux AG for $210 million. SUSE is looking for more growth in the U.S. marketplace, helped in part by IBM’s $50...

Expert SQL Server 2005 Integration Services (Programmer to Programmer)
Expert SQL Server 2005 Integration Services (Programmer to Programmer)

Developing data processing extraction, transformation, and loading (ETL) solutions is now easier than ever with this practical guide. It shows you how to apply the components of SQL Server 2005 Integration Services (SSIS) to build an enterprise ETL application that scales and performs to your specifications. You'll not only learn how to design...

XML in a Nutshell, 2nd Edition
XML in a Nutshell, 2nd Edition
This powerful new edition provides developers with a comprehensive guide to the rapidly evolving XML space. Serious users of XML will find topics on just about everything they need, from fundamental syntax rules, to details of DTD and XML Schema creation, to XSLT transformations, to APIs used for processing XML documents. Simply put, this is...
Sams Teach Yourself Red Hat Linux Fedora in 24 Hours
Sams Teach Yourself Red Hat Linux Fedora in 24 Hours
An easy-to-understand, step-by-step guide and starter kit to help beginners install, configure, and use the latest version of Linux. Updated to cover the latest major release of Red Hat Linux, expected fall, 2003. Red Hat Linux is the most popular choice among Linux users in the U.S., with about 85% of the U.S. Linux market. Assumes no prior...
Service Management For Dummies (Computer/Tech)
Service Management For Dummies (Computer/Tech)

Manage your business from a services perspective

What if technology was designed to serve the business — every time? That's service management! Done properly, it can make everybody happy — the customer, the service provider, and the business owner. Understand the value of managing your physical environments and IT systems...

Mastering Splunk
Mastering Splunk

Optimize your machine-generated data effectively by developing advanced analytics with Splunk

About This Book

  • Develop simple applications into robust, feature-rich applications to search, monitor, and analyze machine-generated big data with ease
  • Learn about lookups, indexing, dashboards,...
SQL Injection Attacks and Defense
SQL Injection Attacks and Defense

SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information to turn to for help. This is the only book devoted exclusively to this long-established but recently growing threat. It includes all the currently known...

Automated Trading with R: Quantitative Research and Platform Development
Automated Trading with R: Quantitative Research and Platform Development

Learn to trade algorithmically with your existing brokerage, from data management, to strategy optimization, to order execution, using free and publicly available data. Connect to your brokerage’s API, and the source code is plug-and-play.

Automated Trading with R explains automated trading, starting with its...

Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for...
SAS Programming and Data Visualization Techniques: A Power User's Guide
SAS Programming and Data Visualization Techniques: A Power User's Guide

SAS Programming and Data Visualization Techniques: A Power User’s Guide brings together a wealth of ideas about strategic and tactical solutions to everyday situations experienced when transferring, extracting, processing, analyzing, and reporting the valuable data you have at your fingertips. Best, you can achieve most of the...

Beginning Information Cards and CardSpace: From Novice to Professional (Expert's Voice in .Net)
Beginning Information Cards and CardSpace: From Novice to Professional (Expert's Voice in .Net)
If you work at all with Internet-facing solutions, you know that the lack of an identity metasystem is a critical vulnerability in the design. Various consortiums have worked to define a system of identity--a platform-agnostic way of communicating and validating claims of identity. If you work with identity solutions or structures, you will find...
Mainframe Basics for Security Professionals: Getting Started with RACF
Mainframe Basics for Security Professionals: Getting Started with RACF
Security—it comes in many forms in the IT world: physical security around a data center, user ID authentication when a transaction gets executed, access control against a database, audit records for anomaly detection. All these forms can be bought and paid for, yet, one element must be taught. That is, the human, the person who administers...
unlimited object storage image
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy