Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SQL Cookbook
SQL Cookbook

You know the rudiments of the SQL query language, yet you feel you aren't taking full advantage of SQL's expressive power. You'd like to learn how to do more work with SQL inside the database before pushing data across the network to your applications. You'd like to take your SQL skills to the next level.

...
Younger Next Year: The Exercise Program: Use the Power of Exercise to Reverse Aging and Stay Strong, Fit, and Sexy
Younger Next Year: The Exercise Program: Use the Power of Exercise to Reverse Aging and Stay Strong, Fit, and Sexy
The definitive exercise book that the one-million-plus readers of the Younger Next Year® series have been waiting for—and the exercise book that takes the intimidation out of starting a workout routine. Based on the science that shows how we can turn back our biological clocks by a combination of aerobics and strength fitness,...
Aggressive Network Self-Defense
Aggressive Network Self-Defense
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • ...
Information Security : Principles and Practice
Information Security : Principles and Practice
Your expert guide to information security

As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not...

20 Minutes to a Top Performer: Three Fast and Effective Conversations to Motivate, Develop, and Engage Your Employees (Business Books)
20 Minutes to a Top Performer: Three Fast and Effective Conversations to Motivate, Develop, and Engage Your Employees (Business Books)

Transform Average Employees into Powerhouse Performers

“I cannot think of a more important message and timely book. 20 Minutes to a Top Performer offers quick, simple techniques for managers to improve their effectiveness in communicating with their teams.”
Steven Fine, vice president for
...

Python Web Penetration Testing Cookbook
Python Web Penetration Testing Cookbook

Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing

About This Book

  • Get useful guidance on writing Python scripts and using libraries to put websites and web apps through their paces
  • Find the script you need to deal with any...
Fool-Proof Marketing: 15 Winning Methods for Selling Any Product or Service in Any Economy
Fool-Proof Marketing: 15 Winning Methods for Selling Any Product or Service in Any Economy
As I mentioned, an old saying informs us, “It’s not what happens to you; it’s how you handle it.” Nowhere is that truer than during a business crisis, slump, or downturn.

Of the 15 fool-proof business strategies presented in this book, none are more important than the personal strategies presented in Part I. The
...
Automated Database Applications Testing: Specification Representation for Automated Reasoning
Automated Database Applications Testing: Specification Representation for Automated Reasoning

This book introduces SpecDB, an intelligent database created to represent and host software specifications in a machine-readable format, based on the principles of artificial intelligence and unit testing database operations. SpecDB is demonstrated via two automated intelligent tools. The first automatically generates database constraints...

Model Driven Architecture for Reverse Engineering Technologies: Strategic Directions and System Evolution
Model Driven Architecture for Reverse Engineering Technologies: Strategic Directions and System Evolution

The software industry has evolved to tackle new approaches aligned with the Internet, object-orientation, distributed components and new platforms. However, the majority of the large information systems running today in many organizations were developed many years ago with technologies that are now obsolete. These old systems, known as legacy...

Mastering Nginx
Mastering Nginx

Written for experienced systems administrators and engineers, this book teaches you from scratch how to configure Nginx for any situation. Step-by-step instructions and real-world code snippets clarify even the most complex areas.

Overview

  • An in-depth configuration guide to help you understand how to best...
Advances In Quantitative Analysis Of Finance And Accounting
Advances In Quantitative Analysis Of Finance And Accounting
Advances in Quantitative Analysis of Finance and Accounting is an annual publication designed to disseminate developments in the quantitative analysis of finance and accounting. The publication is a forum for statistical and quantitative analyses of issues in finance and accounting, as well as applications of quantitative methods to problems in...
Ajax Security
Ajax Security
The Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities

 

More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly moving to the Web via Ajax. But, all too often, this...

unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy