Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Protecting SQL Server Data
Protecting SQL Server Data

For as long as there has been something to communicate between two persons there has been data. Today, vast volumes of it are gathered about almost every individual and business. It is the information that we provide when we sign up for an account at our favorite website, fill out a job application, or apply for a mortgage.

These...

Beginning Windows 8
Beginning Windows 8

Windows 8 has been described by Microsoft as its ‘boldest’ Windows release ever. Beginning Windows 8 takes you through the new features and helps you get more out of the familiar to reveal the possibilities for this amazing new operating system.

You will learn, with non-technical
...

Wireless Java : Developing with Java 2, Micro Edition
Wireless Java : Developing with Java 2, Micro Edition
  • Master J2ME and its Mobile Information Device Profile (MIDP)
  • Learn how to program MIDlets, Java's answer to building wireless distributed applications
  • Gain the skills needed to use one of the most popular programming languages in next-generation applications

Despite Java’s...

The Complete Cisco VPN Configuration Guide
The Complete Cisco VPN Configuration Guide

The definitive guide to building a complete VPN solution with Cisco routers, PIX Firewalls, concentrators, and remote access clients

  • A complete resource for understanding VPN components and VPN design issues

  • Understand state-of-the-art...

Excel 2003 Programming: A Developer's Notebook
Excel 2003 Programming: A Developer's Notebook
Light on theory and long on practical application, this guide takes you directly to Excel 2003's new features using a series of hands-on projects. Learn to work with lists and XML data, secure Excel applications, use Visual Studio Tools for Office, consume Web Services, and collect data with Infopath. If you've been curious about Excel 2003, but...
Broadband Bible, Desktop Edition
Broadband Bible, Desktop Edition

It’s better with broadband, and you can do it...

Whether you need Internet access to work from home, operate a home-based business, run a small business, or simply enjoy all the wonders of the Web, broadband is better. This guide makes it easy to choose among the many broadband options, get connected, set up...

The First 90 Days: Critical Success Strategies for New Leaders at All Levels
The First 90 Days: Critical Success Strategies for New Leaders at All Levels
Whether challenged with taking on a startup, turning a business around, or inheriting a high-performing unit, a new leader's success or failure is determined within the first 90 days on the job.

In this hands-on guide, Michael Watkins, a noted expert on leadership transitions, offers proven strategies for moving successfully into a...

Wireless Security
Wireless Security
Get full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless...
SQL Server Tacklebox Essential tools and scripts for the day-to-day DBA
SQL Server Tacklebox Essential tools and scripts for the day-to-day DBA

For the day-to-day DBA, there are dangers around every corner; monsters waiting to strike down the unsuspecting database with a resource-hungry query, an inefficient data load, or even outright data corruption. When the worst happens, and SQL Server is down, or performance is suffering, customers are quick to complain.. During such difficult...

How to Cheat at Securing Your Network (How to Cheat)
How to Cheat at Securing Your Network (How to Cheat)

Most Systems Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and...

Mondrian in Action: Open source business analytics
Mondrian in Action: Open source business analytics

Summary

Mondrian in Action teaches business users and developers how to use Mondrian and related tools for strategic business analysis. You'll learn how to design and populate a data warehouse and present the data via a multidimensional model. You'll follow examples showing how to create a Mondrian...

Deployment of Microsoft Azure Cloud Solutions: A complete guide to cloud development using Microsoft Azure
Deployment of Microsoft Azure Cloud Solutions: A complete guide to cloud development using Microsoft Azure

Master all the important and tough decision-making aspects involved in architecting an Azure public cloud for your organization.

Key Features

  • Deploy Azure Active Directory and implement synchronization
  • Manage storage solutions with Azure network services
  • ...
unlimited object storage image
Result Page: 142 141 140 139 138 137 136 135 134 133 132 131 130 129 128 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy