 |
|
 Network Query Language with CDROMLearn about an exciting new technology that is revolutionizing network and Internet content delivery
As the first pure language of the content engineering era, Network Query Language (NQL) is the ultimate tool for rapid and simple development of intelligent agents, bots, spiders, middleware, and scalable business-to-business content aggregation... |  |  Search Engine Optimization: An Hour a DayInfluence search engine results and bring targeted traffic to your website in just an hour day with the second edition of this bestselling SEO guide, Search Engine Optimization: An Hour a Day. Drawing on years of experience as successful SEO consultants, Jennifer Grappone and Gradiva Couzin provide detailed, practical, and often... |  |  30 Minutes to Master the InternetThe Internet; the World-Wide Web – or sometimes, just `the Net'.
Business cards now all seem to carry electronic mail – or even `home page' – addresses; newspaper and TV adverts quote complex Web addresses, pointing the interested user into that cyberspace of multi-media, interconnected pages. Shop for PCs or software... |
|
 |  |  IT Investment: Making a Business Case (Computer Weekly Professional Series)Frequently not enough attention is given to producing a comprehensive business case or to producing an economic justification for an information systems investment. In fact many organizations are not clear as to what constitutes a sound business case and how to go about producing one. This Professional level book for the Computer Weekly... |  |  Pro SQL Server 2008 Service BrokerService Broker is a key Microsoft product in support of message–based processing between applications. Pro SQL Server 2008 Service Broker helps you to take full advantage of this key Microsoft technology, beginning from the fundamentals, moving through installation and application development, and ultimately showing you how to... |
|
 Web Services Security and E-businessMany techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,... |  |  Bulletproofing TCP/IP Based Windows NT/2000 NetworksFind out about TCP/IP-based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure. Bulletproofing TCP/IP-based Windows NT/2000 Networks details the use of router access lists, firewalls, virus scanners and encryption. It includes examples of the configuration of... |  |  Microsoft Visual C# 2008 Express Edition: Build a Program Now! (PRO-Developer)Microsoft Visual C# 2008 Express Edition (and the other Visual Studio 2008 Express Edition products) is, in my opinion, one of the best and most intelligent ideas to come from the Developer Division at Microsoft. I'm applauding and cheering for the people who had this brilliant idea because I believe there is a real need and demand for a... |
|
|
| Result Page: 712 711 710 709 708 707 706 705 704 703 702 701 700 699 698 697 696 695 694 |