Home | Amazing | Today | Tags | Publishers | Years | Search 
MySQL in a Nutshell
MySQL in a Nutshell
When you need to find the right SQL keyword or MySQL client command-line option right away, turn to this convenient reference, known for the same speed and flexibility as the system it covers so thoroughly. MySQL is packed with so many capabilities that the odds of remembering a particular function or statement at the right moment are pretty slim....
RFID Applied
RFID Applied
Everything you need to know to implement and fully leverage RFID technology

RFID Applied is just that—the application of radio-frequency identification (RFID) technology. The book discusses both the technical and the business issues involved in selecting, developing, and implementing an RFID system.

...
OSSEC Host-Based Intrusion Detection Guide
OSSEC Host-Based Intrusion Detection Guide
November 10th, 2007 – Computer consultant John Kenneth Schiefer plead guilty to four felony charges for his involvement in the compromise of as many as a quarter-million PCs. These compromised systems, or bots, were used to steal money and identities. Schiefer was able to control all of these systems, typically referred to as bot herding,...
Reverse Engineering Code with IDA Pro
Reverse Engineering Code with IDA Pro

If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pros interactive interface and...

Visual Basic 2008 Recipes: A Problem-Solution Approach
Visual Basic 2008 Recipes: A Problem-Solution Approach
Sometimes you just need to solve a problem and get on with your work. To that end, Visual Basic 2008 Recipes is a compendium of practical solutions for busy VB .NET programmers. Create time for the more interesting aspects of your VB .NET project by solving common problems with the practical solutions and dozens of code examples in this...
Big Change at Best Buy: Working Through Hypergrowth to Sustained Excellence
Big Change at Best Buy: Working Through Hypergrowth to Sustained Excellence

Designed to redefine successful change management in corporate America, Big Change at Best Buy offers hard-won lessons and the tools every executive and manager needs—in every business and every industry—to turn management practices and culture focused on rapid growth into the type of disciplined, customer-centered operation...

C: An advanced introduction (Principles of computer science series)
C: An advanced introduction (Principles of computer science series)
The C programming language was designed and implemented by Dennis Ritchie in 1972 at AT&T Bell Laboratories. Despite a late start, the popularity of C has been increasing rapidly. C compilers are now available for many machines and the list of available C compilers is growing fast [Halfant 1983, Kern 1983, Phraner 1983]. Two important reasons...
Deploying Cisco Wide Area Application Services (Networking Technology)
Deploying Cisco Wide Area Application Services (Networking Technology)

Design and deploy Cisco WAN optimization and application acceleration solutions for the enterprise WAN

Today, IT organizations are increasingly squeezed by competing demands. They must support more distributed users who demand greater availability and performance. They must protect their digital assets...

Professional SharePoint 2007 Development (Programmer to Programmer)
Professional SharePoint 2007 Development (Programmer to Programmer)
If you're a .NET or Microsoft Office developer, this book gives you the tools to utilize the entire SharePoint platform. It offers practical insights that will help you take advantage of this integrated suite of server capabilities along with specific examples of how to implement classes of solutions on top of the platform. You'll be able to apply...
System Center Operations Manager 2007 Unleashed
System Center Operations Manager 2007 Unleashed
The process of operations management is a combination of people, procedures, and tools—all three are necessary, and the absence of one component can put an entire enterprise solution at risk. At a more granular level, operations management is about correlating what may appear to be seemingly unrelated events and data across machines to...
Principles of the Spin Model Checker
Principles of the Spin Model Checker
Principles of Spin is an introductory book, the only requirement is a background in programming. Spin models are written in the Promela language which is easily learned by students and programmers. Spin is easy to install and use.

The Spin model checker is not only a widely used professional tool but it is also a superb tool for teaching...

Core Java, Vol. 2: Advanced Features, 8th Edition
Core Java, Vol. 2: Advanced Features, 8th Edition
The book you have in your hands is the second volume of the eighth edition of Core Java™, fully updated for Java SE 6. The first volume covers the essential features of the language; this volume covers the advanced topics that a programmer will need to know for professional software development. Thus, as with...
Result Page: 688 687 686 685 684 683 682 681 680 679 678 677 676 675 674 673 672 671 670 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy