Home | Amazing | Today | Tags | Publishers | Years | Search 
Mastering SQL Server 2008
Mastering SQL Server 2008
As Microsoft’s bestselling database manager, SQL Server is highly flexible and customizable, and has excellent support—the 2008 version offers several significant new capabilities. This book offers accurate and expert coverage on the updates to SQL Server 2008 such as its enhanced security; the ability to encrypt an entire database,...
Oracle 11g For Dummies (Computer/Tech)
Oracle 11g For Dummies (Computer/Tech)
Are you a seasoned system administrator charged with setting up an Oracle database? Or did you suddenly become a DBA by default? If database administration with Oracle is part of your job, you’ll be glad to have Oracle 11g For Dummies in your cubicle.

This nuts-and-bolts guide walks you through the mysteries of Oracle and...

OCP Oracle Database 11g Administration II Exam Guide: Exam 1Z0-053 (Osborne ORACLE Press Series)
OCP Oracle Database 11g Administration II Exam Guide: Exam 1Z0-053 (Osborne ORACLE Press Series)

A Fully Integrated Study System for OCA Exam 1Z0-052

Prepare for the Oracle Certified Associate Oracle Database 11g Administration I exam with help from this exclusive Oracle Press guide. In each chapter, you'll find challenging exercises, practice questions, a two-minute drill, and a chapter summary to...

Nuclear Energy: Principles, Practices, and Prospects
Nuclear Energy: Principles, Practices, and Prospects
"The material presented here is largely accessible to anyone interested in nuclear energy. This book is the best of its kind in providing a well-written survey of the science, technology, safety, and economics of the full range of nuclear issues, including power, waste, weapons, terrorism, biological effects, and the future of the nuclear...
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for...
Digital Video and HDTV Algorithms and Interfaces (The Morgan Kaufmann Series in Computer Graphics)
Digital Video and HDTV Algorithms and Interfaces (The Morgan Kaufmann Series in Computer Graphics)

Rapidly evolving computer and communications technologies have achieved data transmission rates and data storage capacities high enough for digital video. But video involves much more than just pushing bits! Achieving the best possible image quality, accurate color, and smooth motion requires understanding many aspects of image acquisition,...

Virtualization, A Beginners Guide
Virtualization, A Beginners Guide

Migrate to a dynamic, on-demand data delivery platform

"If you're looking to hit the ground running with any virtualization project, large or small, this book is going to give you the start you need, and along the way will offer you some cautionary tales that will even take some seasoned...

Pro OpenSolaris
Pro OpenSolaris
OpenSolaris is a rapidly evolving operating system with roots in Solaris 10, suitable for deployment on laptops, desktop workstations, storage appliances, and data center servers from the smallest single–purpose systems to the largest enterprise–class systems. The growing OpenSolaris community now has hundreds of thousands of...
Unlocking Android
Unlocking Android
Android is a free, open source, Java-based mobile platform developed by Google. Unlocking Android prepares the reader to embrace the Android mobile platform in easy-to-understand language and builds on this foundation with reusable Java code examples. It's ideal for corporate developers and hobbyists who have an interest, or a mandate, to...
Coding and Cryptology: Proceedings of the International Workshop, Wuyi Mountain, Fujian, China, 11-15 June 2007
Coding and Cryptology: Proceedings of the International Workshop, Wuyi Mountain, Fujian, China, 11-15 June 2007
The rst International Workshop on Coding and Cryptology was held in Wuyi Mountain, Fujian, China, June 11 - 15, 2007. The workshop was organised by Fujian Normal University, China and Nanyang Technological University, Singapore. We acknowledge with gratitude the nancial support from the Key Laboratory of Network Security and Cryptology, Fujian...
Computer Evidence: Collection & Preservation (Networking Series)
Computer Evidence: Collection & Preservation (Networking Series)
Learn to Collect Digital Artifacts and Ensure Evidence Acceptance!

Computer Evidence: Collection and Preservation teaches law enforcement and computer forensics investigators how to identify, collect, and maintain digital artifacts to preserve their reliability for admission as evidence. The book focuses on collection and preservation because...

Android Application Development: Programming with the Google SDK
Android Application Development: Programming with the Google SDK
This practical book provides the concepts and code you need to develop software with Android, the open-source platform for cell phones and mobile devices that's generating enthusiasm across the industry. Based on the Linux operating system and developed by Google and the Open Handset Alliance, Android has the potential to unite a fragmented mobile...
Result Page: 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy