Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
HOWTO Secure and Audit Oracle 10g and 11g
HOWTO Secure and Audit Oracle 10g and 11g
This guide demonstrates how to secure sensitive data and comply with internal and external audit regulations using Oracle 10g and 11g. It provides the hands-on guidance required to understand the complex options provided by Oracle and the know-how to choose the best option for a particular case. The book presents specific sequences of actions that...
Professional WordPress (Wrox Programmer to Programmer)
Professional WordPress (Wrox Programmer to Programmer)

An in-depth look at the internals of the WordPress system. As the most popular blogging and content management platform available today, WordPress is a powerful tool. This exciting book goes beyond the basics and delves into the heart of the WordPress system, offering overviews of the functional aspects of WordPress as well as plug-in and...

Beginning Amazon Web Services with Node.js
Beginning Amazon Web Services with Node.js

Beginning Amazon Web Services with Node.js teaches any novice Node.js developer to configure, deploy, and maintain scalable small to large scale Node.js applications in Amazon Web Services. Hosting a Node.js application in a production environment usually means turning to PaaS hosting, but this approach brings problems. Deploying...

Microsoft Windows XP Professional Administrator's Guide
Microsoft Windows XP Professional Administrator's Guide

Install, configure, and manage Windows XP Professional with this comprehensive administrator’s guide! Congratulations! You have found the ultimate task-oriented guide to Microsoft Windows XP Professional. Whether you are maintaining one stand-alone computer or thousands of networked Windows XP Professional systems, this book is designed to...

Knowledge Management Strategies for Business Development
Knowledge Management Strategies for Business Development
As economies continue to evolve, knowledge is being recognized as a business asset and considered a crucial component of business strategy. The ability to manage knowledge is increasingly important for securing and maintaining organizational success and surviving in the knowledge economy. Knowledge Management Strategies for Business...
Juniper SRX Series
Juniper SRX Series
Security is one of the fastest moving segments within the realm of technology. Whereas most technology is created to offer new services or products, security is created to prevent the abuse of these new products and or services. In today’s world, where we are always connected in ways that have never been...
BSD Hacks
BSD Hacks
Looking for a unique set of practical tips, tricks, and tools for administrators and power users of BSD systems? From hacks to customize the user environment to networking, securing the system, and optimization, BSD Hacks takes a creative approach to saving time and accomplishing more with fewer resources. If...
Application Development Using Visual Basic and .NET
Application Development Using Visual Basic and .NET

Build industrial-strength .NET applications with Visual Basic.

  • Experienced programmers: Quickly come up to speed on the new, powerful Visual Basic .NET
  • Practical, hands-on coverage of the .NET Framework, CLR, ADO.NET, ASP.NET, Web services, security, interoperability, and more
  • Running case study:...
VSTO for Mere Mortals(TM): A VBA Developer's Guide to Microsoft Office Development Using Visual Studio 2005 Tools for Office
VSTO for Mere Mortals(TM): A VBA Developer's Guide to Microsoft Office Development Using Visual Studio 2005 Tools for Office
VSTO for Mere Mortals™ is for VBA developers who are interested in migrating their skills to the next generation of Office development. Readers will benefit from a straightforward, practical introduction to writing managed code applications for Word 2003, Excel 2003, and Outlook 2003. Readers will also learn how to...
Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology: Security)
Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology: Security)
Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separation and protection on IP routers. This book details the distinct traffic planes of IP networks and the advanced techniques necessary to operationally secure them. This includes the data,...
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition

There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter.

If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the...

Node Security
Node Security

Take a deep dive into the world of securing your Node applications with Node Security

Overview

  • Examine security features and vulnerabilities within JavaScript
  • Explore the Node platform, including the event-loop and core modules
  • Solve common security problems with available...
unlimited object storage image
Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy