|
|
|
|
|
| | Writing Secure Code, Second EditionIf you design applications, or if you build, test, or document solutions, you need this book. If your applications are Web-based or Win32-based, you need this book. Finally, if you are currently learning or building Microsoft .NET Framework–based applications, you need this book. In short, if you are involved in building... | | Mac OS X Help Line, Tiger EditionWith every update, Mac OS X grows more powerful, more dependable, and easier to use--and Mac OS X Tiger is no exception. But along with the new features come fresh issues--new areas to troubleshoot, new functionality to unravel, and new glitches waiting to confound even the savviest Mac users. Not to worry. Best-selling author and Mac guru Ted... |
|
| | Hardening Linux"Hardening" is the process of protecting a system and its applications against unknown threats. And Hardening Linux will explain the main steps that any Network or Systems Administrator needs to take, to protect his computers that run on Linux. This book discusses security of mail servers, web servers, and file servers, as well as... | | Microsoft Outlook 2007 BibleDiscover all the ways Outlook can make your life easier
Outlook has been called the Swiss army knife of applications, and with good reason. In one handy package, you get the tools you use constantly—e-mail, a calendar and appointment book, a contacts list, a to-do list, and more. Learn to use them together, and you have a sophisticated... |
|
Tapestry 5: Building Web ApplicationsThis book is a practical step-by-step tutorial for those who want to build contemporary, real-life web applications with Tapestry 5, the Apache open-source framework for creating dynamic, robust, highly scalable web applications in Java. It shows the path of least resistance, so that the reader can learn all the essential skills quickly and easily.... | | Relational Databases and Knowledge BasesA database management system (DBMS), or simply database system, is characterized by the data model it suports . The first DBMSs, designed in the 1960s, were based on hierarchical or network models and have been viewed as extensions of file systems in which interfile links are provided through pointers . The data manipulation languages of these... | | Encyclopedia of Civil War ShipwrecksOn the evening of February 2, 1864, Confederate Commander John Taylor Wood led 250 sailors in two launches and twelve boats to capture the USS Underwriter, a side-wheel steam gunboat anchored on the Neuse River near New Bern, North Carolina. During the ensuing fifteen-minute battle, nine Union crewmen lost their lives, twenty were wounded,... |
|
|
Result Page: 403 402 401 400 399 398 397 396 395 394 393 392 391 390 389 388 387 386 385 |