Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Exploring the JDS Linux Desktop
Exploring the JDS Linux Desktop
The ideal guide to JDS, Exploring the JDS Linux Desktop is clear and direct, and carefully covers such housekeeping chores as setting up networking, updates, and backups. It enters into great depth concerning the key productivity tools every user needs: email, web browsing, instant messaging, word processing,...
Securing SQL Server: Protecting Your Database from Attackers
Securing SQL Server: Protecting Your Database from Attackers

As you move through this book you may notice that this book doesn’t gently flow from one topic to another like a lot of technical books.This is intentional asmany of the subjects covered in this book are going to be related, but separate fields of study. As you move through the various chapters in this book you’ll be able to...

Pro Access 2010 Development
Pro Access 2010 Development

Microsoft Access is a unique platform that enables rapid development of database applications. It has been a long-time favorite of both developers and end users for creating single-user and small-scale office automation solutions. Recent improvements have made it a viable choice for enterprise-class applications as well. In this book,...

Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach

“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with...

Nginx HTTP Server - Second Edition
Nginx HTTP Server - Second Edition

Nginx is a lightweight HTTP server designed for high-traffic websites, with network scalability as the primary objective. With the advent of high speed Internet access, short loading times and fast transfer rates have become a necessity. This free, open source solution will either come as a full replacement of other software such as Apache,...

.NET Common Language Runtime Unleashed
.NET Common Language Runtime Unleashed

The .NET Framework provides a runtime environment called the Common Language Runtime, which manages the execution of code and provides services that make the development of robust software easier. The Common Language Runtime (CLR) provides a solid foundation for developers to build various types of applications. Whether a developer is writing an...

Understanding DB2 9 Security
Understanding DB2 9 Security
Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world...
Flash and PHP Bible
Flash and PHP Bible
Quickly develop dynamic Flash applications with PHP

The demand for rich Internet applications (RIAs) such as complete storefronts and interactive surveys is skyrocketing, as is the pressure to create these dynamic apps overnight and at low cost. This in-depth Bible provides the step-by-step instructions you need to quickly...

Advances in Agent-Based Complex Automated Negotiations (Studies in Computational Intelligence)
Advances in Agent-Based Complex Automated Negotiations (Studies in Computational Intelligence)

Complex Automated Negotiations have been widely studied and are becoming an important, emerging area in the field of Autonomous Agents and Multi-Agent Systems. In general, automated negotiations can be complex, since there are a lot of factors that characterize such negotiations. These factors include the number of issues, dependency between...

PowerShell for SharePoint 2010 How-To
PowerShell for SharePoint 2010 How-To

PowerShell is becoming the de facto administration tool for Microsoft Server products. The ability to script out reusable steps and code makes life easier for administrators, developers, and managers alike. With the latest release of Microsoft SharePoint Server 2010, PowerShell is the recommended administration...

Pro Android with Kotlin: Developing Modern Mobile Apps
Pro Android with Kotlin: Developing Modern Mobile Apps

Develop Android apps with Kotlin to create more elegant programs than the Java equivalent. This book covers the various aspects of a modern Android app that professionals are expected to encounter. There are chapters dealing with all the important aspects of the Android platform, including GUI design, file- and...

unlimited object storage image
Result Page: 134 133 132 131 130 129 128 127 126 125 124 123 122 121 120 119 118 117 116 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy