Home | Amazing | Today | Tags | Publishers | Years | Search 
Data Mining with Microsoft SQL Server 2008
Data Mining with Microsoft SQL Server 2008

The most authoritative book on data mining with SQL Server 2008

SQL Server Data Mining has become the most widely deployed data mining server in the industry. Business users—and even academic and scientific users—have adopted SQL Server data mining because of its scalability, availability, extensive functionality, and ease of...

Chained Exploits: Advanced Hacking Attacks from Start to Finish
Chained Exploits: Advanced Hacking Attacks from Start to Finish
The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them

 

Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve...

Microsoft  Windows  2000 Server TCP/IP Core Networking Guide (IT Professional)
Microsoft Windows 2000 Server TCP/IP Core Networking Guide (IT Professional)

Maximize enterprise networking and connectivity with tools and resources direct from Microsoft.

Set up and troubleshoot all facets of TCP/IP networking in Windows® 2000 with expertise from those who know the technology best—the Windows 2000 development team. This guide delivers essential architectural and...

Netbooks: The Missing Manual
Netbooks: The Missing Manual
Netbooks are the hot new thing in PCs -- small, inexpensive laptops designed for web browsing, email, and working with web-based programs. But chances are you don't know how to choose a netbook, let alone use one. Not to worry: with this Missing Manual, you'll learn which netbook is right for you and how to set it up and use it for everything from...
Solr 1.4 Enterprise Search Server
Solr 1.4 Enterprise Search Server
If you are a developer building a high-traffic web site, you need to have a terrific search engine. Sites like Netflix.com and Zappos.com employ Solr, an open source enterprise search server, which uses and extends the Lucene search library. This is the first book in the market on Solr and it will show you how to optimize your web site for high...
Expert .NET Micro Framework, Second Edition
Expert .NET Micro Framework, Second Edition
The Microsoft .NET Micro Framework is a small and efficient .NET runtime environment used to run managed code on devices that are too small and resource constrained for Windows CE and the Compact Framework.

Expert .NET Micro Framework will teach you everything you need to know to use the .NET Micro Framework to create effective...

PHP for Absolute Beginners
PHP for Absolute Beginners
Get started in web development using PHP. Even if you've never programmed before, author Jason Lengstorf introduces you to PHP by building a PHP-based blogging site while covering all the good coding practices and skills that you'll need when you start your own projects.
  • Create web content with version 5.3 of...
Citrix Access Suite 4 Advanced Concepts: The Official Guide, Second Edition
Citrix Access Suite 4 Advanced Concepts: The Official Guide, Second Edition
What is access? Access is a means to an end—the means of closing the gap that separates ideas, understanding, knowledge, insight, and action. Access facilitates, access informs, access empowers, and access has the ability to transform the way we work, live, play and learn. From the telegraph to radio to television and the Internet,...
Zend Framework 1.8 Web Application Development
Zend Framework 1.8 Web Application Development

The Zend Framework has a flexible architecture that lets you build modern web applications and web services easily. The MVC components make the maintenance and testing of your applications easier. However, it is not only an MVC framework for developers. It also provides an easy-to-use high-quality component library that is designed to be used...

Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

RESTful Java Web Services
RESTful Java Web Services
If you are already familiar with REST theory but are new to RESTful Java web services, and want to use the Java technology stack together with Java RESTful frameworks to create robust web services, this is the book for you.

This book is a guide to developing RESTful web services using Java and the most popular RESTful frameworks
...
Linux Email
Linux Email
Many businesses want to run their email servers on Linux for greater control and flexibility of corporate communications, but getting started can be complicated. The attractiveness of a free-to-use and robust email service running on Linux can be undermined by the apparent technical challenges involved. Some of the complexity arises from the fact...
Result Page: 142 141 140 139 138 137 136 135 134 133 132 131 130 129 128 127 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy