When you need to find the right SQL keyword or MySQL client command-line option right away, turn to this convenient reference, known for the same speed and flexibility as the system it covers so thoroughly. MySQL is packed with so many capabilities that the odds of remembering a particular function or statement at the right moment are pretty slim....
Everything you need to know to implement and fully leverage RFID technology
RFID Applied is just that—the application of radio-frequency identification (RFID) technology. The book discusses both the technical and the business issues involved in selecting, developing, and implementing an RFID system.
November 10th, 2007 – Computer consultant John Kenneth Schiefer plead guilty to four felony charges for his involvement in the compromise of as many as a quarter-million PCs. These compromised systems, or bots, were used to steal money and identities. Schiefer was able to control all of these systems, typically referred to as bot herding,...
If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pros interactive interface and...
Sometimes you just need to solve a problem and get on with your work. To that end, Visual Basic 2008 Recipes is a compendium of practical solutions for busy VB .NET programmers. Create time for the more interesting aspects of your VB .NET project by solving common problems with the practical solutions and dozens of code examples in this...
Designed to redefine successful change management in corporate America, Big Change at Best Buy offers hard-won lessons and the tools every executive and manager needs—in every business and every industry—to turn management practices and culture focused on rapid growth into the type of disciplined, customer-centered operation...
The C programming language was designed and implemented by Dennis Ritchie in 1972 at AT&T Bell Laboratories. Despite a late start, the popularity of C has been increasing rapidly. C compilers are now available for many machines and the list of available C compilers is growing fast [Halfant 1983, Kern 1983, Phraner 1983]. Two important reasons...
Design and deploy Cisco WAN optimization and application acceleration solutions for the enterprise WAN
Today, IT organizations are increasingly squeezed by competing demands. They must support more distributed users who demand greater availability and performance. They must protect their digital assets...
If you're a .NET or Microsoft Office developer, this book gives you the tools to utilize the entire SharePoint platform. It offers practical insights that will help you take advantage of this integrated suite of server capabilities along with specific examples of how to implement classes of solutions on top of the platform. You'll be able to apply...
The process of operations management is a combination of people, procedures, and tools—all three are necessary, and the absence of one component can put an entire enterprise solution at risk. At a more granular level, operations management is about correlating what may appear to be seemingly unrelated events and data across machines to...
Principles of Spin is an introductory book, the only requirement is a background in programming. Spin models are written in the Promela language which is easily learned by students and programmers. Spin is easy to install and use.
The Spin model checker is not only a widely used professional tool but it is also a superb tool for teaching...
The book you have in your hands is the second volume of the eighth edition of Core Java™, fully updated for Java SE 6. The first volume covers the essential features of the language; this volume covers the advanced topics that a programmer will need to know for professional software development. Thus, as with...