|
|
|
|
|
|
SQL Server Analysis Services 2012 Cube Development Cookbook
If you prefer the instructional approach to a lot of theory, this cookbook is for you. It takes you straight into building data cubes through hands-on recipes, helping you get to grips with SQL Server Analysis Services fast.
Overview
-
Develop Business Intelligence solutions using a multi-dimensional model...
| | Securing Social Media in the Enterprise
Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This... | | Novell GroupWise 7 Administrator Solutions GuideNovell GroupWise 7 Administrator Solutions Guide is the authoritative guide for successfully administrating and maintaining the newest release of Novell's communication and collaboration solution. Author Tay Kratzer, a Novell Premium Service-Primary Support Engineer, will provide you with insider... |
|
Cisco Network Security Little Black BookWith this concise, problem-solving guide, networking professionals will learn how to identify network security threat implement uniform security throughout their networks, secure remote dial-in access with CiscoSecure ACS and Cisco IOS AAA features, protect Internet access on their perimeter routers with the CiscoSecure IOS firewall software, and... | | Pro DNS and BIND 10
Every time you get e-mail, every time you access a web page, you use the Domain Name System (DNS). In fact, over 2 billion such requests hit the DNS root-servers alone every day. Every one of those 2 billion requests originate from a DNS that supports a group of local users, and every one of them is finally answered by a DNS server that may... | | VMware View Security Essentials
Most people associate security with network security and focus on firewalls and network monitoring. However, there is more to security than that. Security starts with the establishment of a stable environment, protecting this environment not only from intrusion, but also from malicious intent. It is about tracking the issue and recovering... |
|
|
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 |