Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
PostgreSQL 11 Server Side Programming Quick Start Guide: Effective database programming and interaction
PostgreSQL 11 Server Side Programming Quick Start Guide: Effective database programming and interaction

Extend PostgreSQL using PostgreSQL server programming to create, test, debug, and optimize a range of user-defined functions in your favorite programming language

Key Features

  • Learn the concepts of PostgreSQL 11 with lots of real-world datasets and examples
  • Learn queries,...
Synchronizing Internet Protocol Security (SIPSec) (Advances in Information Security)
Synchronizing Internet Protocol Security (SIPSec) (Advances in Information Security)
The open design of the internet has not only opened many new opportunities for communications, but it has also opened many new avenues for attacks against organizational network and computing resources. Information security has become a major concern in recent times, as more and more computers are being connected to the global internet. With so...
Evaluating Information Systems: Public and Private Sector
Evaluating Information Systems: Public and Private Sector
Companies make a huge investment of 4 to 10% of their turnover on IT - this book reveals how this is evaluated and measured.

The adoption of Information Technology (IT) and Information Systems (IS) represents significant financial investments, with alternative perspectives to the evaluation domain coming from both the public
...
Information Assurance: Managing Organizational IT Security Risks
Information Assurance: Managing Organizational IT Security Risks
Written by two INFOSEC experts, this book provides a systematic and practical approach for establishing, managing and operating a comprehensive Information Assurance program. It is designed to provide ISSO managers, security managers, and INFOSEC professionals with an understanding of the essential issues required to develop and apply a targeted...
Enterprise Web Services Security (Internet Series)
Enterprise Web Services Security (Internet Series)
Learn to Protect Your Assets and Prevent Attacks!

The use of Web Services for Business-to-Business (B2B) and Business-to-Consumer (B2C) transactions has created risks that expose critical assets to increasingly greater threats. Enterprise Web Services Security provides the information developers, application architects, and security...

CT Urography: An Atlas
CT Urography: An Atlas

Featuring over 500 images, this atlas is the first text on performing and interpreting CT urography. Chapters detail the indications and techniques for CT urography, review the risks of radiation exposure, show how normal urinary tract anatomy and variants appear on CT scans, and demonstrate a wide range of urinary tract...

Security Software Development: Assessing and Managing Security Risks
Security Software Development: Assessing and Managing Security Risks
Examining current trends and problems that have plagued application development for more than a decade, this book provides a foundation for security risk assessment and management during software development. It demonstrates how to achieve greater application security through assessing and managing risk throughout the entire software development...
Safer Surgery
Safer Surgery

Operating theatres are very private workplaces. There have been few research investigations into how highly trained doctors and nurses work together to achieve safe and efficient anaesthesia and surgery. While there have been major advances in surgical and anaesthetic procedures, there are still significant risks for patients during operations...

Penetration Testing: Procedures & Methodologies
Penetration Testing: Procedures & Methodologies

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Open Source Software: Implementation and Management
Open Source Software: Implementation and Management
Open source software is now under serious consideration in many organizations.
The success of several open source products, particularly Apache and
Linux, in the enterprise has come surprisingly quickly, given that they were
not commercially available ten years ago. It is important for managers
responsible for adopting
...
Design for Emergence:  Collaborative Social Play with Online and Location-Based Media, Volume 153 Frontiers in Artificial Intelligence and Applications
Design for Emergence: Collaborative Social Play with Online and Location-Based Media, Volume 153 Frontiers in Artificial Intelligence and Applications
This thesis is an attempt to address the spontaneous, often unpredictable uses of technology that can foster feelings of social participation. A key idea is that social processes and dynamics advance technological design. Consider the most recent applications that are primarily focused on social interaction: social software (Allen, 2004),...
The Mazzel Ritual: Culture, Customs and Crime in the Diamond Trade
The Mazzel Ritual: Culture, Customs and Crime in the Diamond Trade

The academic study of diamonds is as multi-faceted as the precious stones themselves. Mineralogists and geographers have written about them, as have historians and economists and students of art and fashion. They each shine their light on a different aspect of this source of luminous radiance. But who would venture to describe the entire...

unlimited object storage image
Result Page: 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy