Home | Amazing | Today | Tags | Publishers | Years | Search 
Getting Started with SQL Server 2014 Administration
Getting Started with SQL Server 2014 Administration

Optimize your database server to be fast, efficient, and highly secure using the brand new features of SQL Server 2014

About This Book

  • Design your SQL Server 2014 infrastructure by combining both onpremise and WindowsAzurebased technology
  • Implement the new InMemory OLTP database engine...
Public Key Cryptography: Applications and Attacks (IEEE Press Series on Information and Communication Networks Security)
Public Key Cryptography: Applications and Attacks (IEEE Press Series on Information and Communication Networks Security)

This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many...

HTML5 & CSS3 Visual QuickStart Guide (7th Edition)
HTML5 & CSS3 Visual QuickStart Guide (7th Edition)

Want to learn how to build Web sites fast? This best-selling guide’s visual format and step-by-step, task-based instructions will have you up and running with HTML5 and CSS3 in no time. This Seventh Edition is a major revision, with approximately 125 pages added and substantial updates to (or complete rewrites of) nearly every page from...

How to Write a Business Plan
How to Write a Business Plan

Write a business plan that potential investors will embrace!

If you're thinking of starting a business or raising money to expand an existing one, you need a plan. Running a successful business requires a great deal of forethought, so write a business plan and secure your venture's future. How to Write a Business Plan
...

How to Cheat at Securing Your Network (How to Cheat)
How to Cheat at Securing Your Network (How to Cheat)

Most Systems Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and...

Securing SQL Server, Second Edition: Protecting Your Database from Attackers
Securing SQL Server, Second Edition: Protecting Your Database from Attackers

Securing SQL Server, Second Edition explores the potential attack vectors someone can use to break into your SQL Server database as well as how to protect your database from these attacks. Written by Denny Cherry, a Microsoft MVP for the SQL Server product, a Microsoft Certified Master for SQL Server 2008, and one of the biggest names...

Moving To The Cloud: Developing Apps in the New World of Cloud Computing
Moving To The Cloud: Developing Apps in the New World of Cloud Computing
Information is the most valuable resource in the 21st century. Whether for a consumer looking for a restaurant in San Francisco, a small business woman checking textile prices in Bangalore, or a financial services executive in London studying stock market trends, information at the moment of decision is key in providing the...
Professional NFC Application Development for Android
Professional NFC Application Development for Android

A practical guide to developing and deploying Near Field Communication (NFC) applications

There has been little practical guidance available on NFC programming, until now. If you're a programmer or developer, get this unique and detailed book and start creating apps for this exciting technology. NFC enables contactless...

FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security

If you are responsible for meeting federal information security requirements such as FISMA, this book is all you need to know to get a system authorized. Now in the first full revision of FISMA since its inception in 2002, a new wave of stronger security measures are now available through the efforts of the Department of Defense,...

Wireless Algorithms, Systems, and Applications: 6th International Conference, WASA 2011, Chengdu
Wireless Algorithms, Systems, and Applications: 6th International Conference, WASA 2011, Chengdu

This book constitutes the refereed proceedings of the 6th Annual International Conference on Wireless Algorithms, Systems, and Applications, WASA 2011, held in Chengdu, China, in August 2011. The 26 revised full papers and 13 invited papers presented were carefully reviewed and selected from numerous submissions. The papers address all...

Simple Steps to Data Encryption: A Practical Guide to Secure Computing
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who...

Practical SQL Queries for Microsoft SQL Server 2008 R2
Practical SQL Queries for Microsoft SQL Server 2008 R2

400+ ready-to-use, powerful SQL queries

Learn powerful techniques for surfacing and delivering actionable business intelligence using SQL. Practical SQL Queries for Microsoft SQL Server 2008 R2 contains more than 400 downloadable SQL queries you can use to extract meaningful insights from large amounts of data. The...

Result Page: 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy