Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SQL The Complete Reference, 3rd Edition
SQL The Complete Reference, 3rd Edition

Get comprehensive coverage of every aspect of SQL from three leading industry experts. Revised with coverage of the latest RDBMS software versions, this one-stop guide explains how to build, populate, and administer high-performance databases and develop robust SQL-based applications. 

SQL: The Complete Reference, Third...

Secure Java: For Web Application Development
Secure Java: For Web Application Development

Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure...

Computer Vision Using Local Binary Patterns (Computational Imaging and Vision)
Computer Vision Using Local Binary Patterns (Computational Imaging and Vision)

Humans receive the great majority of information about their environment through sight, and at least 50% of the human brain is dedicated to vision. Vision is also a key component for building artificial systems that can perceive and understand their environment. Computer vision is likely to change society in many ways; for example, it...

Engineering Secure Software and Systems: Third International Symposium
Engineering Secure Software and Systems: Third International Symposium

It is our pleasure to welcome you to the third edition of the International Symposium on Engineering Secure Software and Systems.

This unique event aims at bringing together researchers from software engineering and security engineering, which might help to unite and further develop the two communities in this and future...

Sams Teach Yourself Microsoft Dynamics CRM 2011 in 24 Hours
Sams Teach Yourself Microsoft Dynamics CRM 2011 in 24 Hours

In just 24 sessions of one hour or less, you’ll learn how to drive powerful business results with Microsoft Dynamics CRM 2011! Using this book’s straightforward, step-by-step approach, you’ll learn how to orchestrate successful CRM projects, automate processes, create more efficient workflows, optimize...

Iris Biometric Model for Secured Network Access
Iris Biometric Model for Secured Network Access

In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems.

Iris Biometric Model for Secured Network Access proposes a
...

Exam Ref 70-687 Configuring Windows 8.1 (MCSA)
Exam Ref 70-687 Configuring Windows 8.1 (MCSA)

Fully updated for Windows 8.1! Prepare for Microsoft Exam 70-687 - and help demonstrate your real-world mastery of configuring Windows 8.1 in the enterprise. Designed for experienced IT professionals ready to advance their status, Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the MCSA or MCSE...

The Official (ISC)2 Guide to the CCSP CBK
The Official (ISC)2 Guide to the CCSP CBK

Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)the CCSP credential is the ideal way to match marketability and credibility to your cloud security skill set. The Official (ISC)2 Guide to the CCSPSM CBK Second Edition is your ticket for expert...

Microsoft Dynamics CRM 2011 Cookbook
Microsoft Dynamics CRM 2011 Cookbook

Includes over 75 incredible recipes for deploying, configuring, and customizing your CRM application

Overview

  • Step-by-step guide to deploy Dynamics CRM 2011 components, configuring claim-based authentication and IFD deployment
  • Focus on Dynamics CRM 2011 server maintenance and optimization...
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features

  • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • ...
CCIE Routing and Switching Practice Labs
CCIE Routing and Switching Practice Labs

Six comprehensive CCIE routing and switching labs to hone configuration and troubleshooting skills

Prepare for the CCIE lab exams and hone your configuration and troubleshooting skills with six complete practice scenarios that cover:

  • Frame Relay...

Web Caching (O'Reilly Internet Series)
Web Caching (O'Reilly Internet Series)
A properly designed cache, by reducing network traffic and improving access times to popular web sites, is a boon to network administrators and web users alike. This book hands you all the technical information you need to design, deploy and operate an effective web caching service. It also covers the...
unlimited object storage image
Result Page: 364 363 362 361 360 359 358 357 356 355 354 353 352 351 350 349 348 347 346 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy