|
|
|
|
| | Enterprise Mac Security: Mac OS X Snow Leopard (Foundations)
A common misconception in the Mac community is that Mac’s operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats.
Enterprise Mac... | | Practical PowerPivot & DAX Formulas for Excel 2010
PowerPivot: What a name! Or I should really say what’s in a name? Powerful Pivoting? Pivot-table for power users?
PowerPivot is a lot more than that. When I started the PowerPivot project back in 2007, along with Amir Netz (Microsoft BI Distinguished Engineer), the incubation project was called BI Sandbox. We had been looking... |
|
Integrating PHP with Windows
PHP has changed the world: no other language has influenced and spurred web development
so strongly. From simple home pages to social software and business applications
to the largest global websites, PHP has played a leading role for years. Simultaneously,
Microsoft and its Windows operating system has made computers available to all... | | Securing SQL Server, Second Edition: Protecting Your Database from Attackers
Securing SQL Server, Second Edition explores the potential attack vectors someone can use to break into your SQL Server database as well as how to protect your database from these attacks. Written by Denny Cherry, a Microsoft MVP for the SQL Server product, a Microsoft Certified Master for SQL Server 2008, and one of the biggest names... | | WordPress 24-Hour Trainer
The easy, self-paced guide to the powerful WordPress platform WordPress 24-Hour Trainer, 3rd Edition provides a comprehensive, unique book-and-video package that focuses on the practical, everyday tasks you will face when creating and maintaining WordPress websites.
This easy-to-use, friendly guide will show you how to create... |
|
|
| | | | Configuring Sonicwall FirewallsEvery enterprise requires at least one firewall to provide the backbone for its network security architecture. Firewalls are the core component of your network’s security. The risks today have greatly increased, so the call for a stronger breed of firewall has been made. In the past, simple packet-filtering firewalls allowing... |
|
|
Result Page: 117 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 |