|
|
|
|
SQL The Complete Reference, 3rd EditionGet comprehensive coverage of every aspect of SQL from three leading industry experts. Revised with coverage of the latest RDBMS software versions, this one-stop guide explains how to build, populate, and administer high-performance databases and develop robust SQL-based applications.
SQL: The Complete Reference, Third... | | Secure Java: For Web Application Development
Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure... | | Computer Vision Using Local Binary Patterns (Computational Imaging and Vision)
Humans receive the great majority of information about their environment through
sight, and at least 50% of the human brain is dedicated to vision. Vision is also a key
component for building artificial systems that can perceive and understand their environment.
Computer vision is likely to change society in many ways; for example,
it... |
|
Engineering Secure Software and Systems: Third International Symposium
It is our pleasure to welcome you to the third edition of the International Symposium
on Engineering Secure Software and Systems.
This unique event aims at bringing together researchers from software engineering
and security engineering, which might help to unite and further develop
the two communities in this and future... | | Sams Teach Yourself Microsoft Dynamics CRM 2011 in 24 Hours
In just 24 sessions of one hour or less, you’ll learn how to drive powerful business results with Microsoft Dynamics CRM 2011! Using this book’s straightforward, step-by-step approach, you’ll learn how to orchestrate successful CRM projects, automate processes, create more efficient workflows, optimize... | | Iris Biometric Model for Secured Network Access
In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems.
Iris Biometric Model for Secured Network Access proposes a... |
|
Exam Ref 70-687 Configuring Windows 8.1 (MCSA)
Fully updated for Windows 8.1! Prepare for Microsoft Exam 70-687 - and help demonstrate your real-world mastery of configuring Windows 8.1 in the enterprise. Designed for experienced IT professionals ready to advance their status, Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the MCSA or MCSE... | | The Official (ISC)2 Guide to the CCSP CBK
Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)2 the CCSP credential is the ideal way to match marketability and credibility to your cloud security skill set. The Official (ISC)2 Guide to the CCSPSM CBK Second Edition is your ticket for expert... | | Microsoft Dynamics CRM 2011 Cookbook
Includes over 75 incredible recipes for deploying, configuring, and customizing your CRM application
Overview
-
Step-by-step guide to deploy Dynamics CRM 2011 components, configuring claim-based authentication and IFD deployment
-
Focus on Dynamics CRM 2011 server maintenance and optimization...
|
|
|
|
Result Page: 364 363 362 361 360 359 358 357 356 355 354 353 352 351 350 349 348 347 346 |