Home | Amazing | Today | Tags | Publishers | Years | Search 
Oracle GoldenGate 11g Implementer's guide
Oracle GoldenGate 11g Implementer's guide

Data replication is an important part of any database system that is growing due to today's demand for real-time reporting and regulatory requirements. GoldenGate has recently become Oracle's strategic real-time data replication solution. Until now, very little has been written about how to implement GoldenGate in a production...

Sams Teach Yourself LinkedIn in 10 Minutes (2nd Edition) (Sams Teach Yourself -- Minutes)
Sams Teach Yourself LinkedIn in 10 Minutes (2nd Edition) (Sams Teach Yourself -- Minutes)

Although professionals have always acknowledged the value of networking, today’s economic climate makes developing a solid network even more critical. LinkedIn, the leading social networking site for professionals, is the ideal tool for maximizing the potential of an online network. LinkedIn has more than 85 million members...

Database Systems: Design, Implementation, and Management (with Bind-In Printed Access Card)
Database Systems: Design, Implementation, and Management (with Bind-In Printed Access Card)

DATABASE SYSTEMS: DESIGN, IMPLEMENTATION, AND MANAGEMENT, NINTH EDITION, a market-leader for database texts, gives readers a solid foundation in practical database design and implementation. The book provides in-depth coverage of database design, demonstrating that the key to successful database implementation is in proper design of databases...

CERT Resilience Management Model (RMM): A Maturity Model for Managing Operational Resilience
CERT Resilience Management Model (RMM): A Maturity Model for Managing Operational Resilience

CERT® Resilience Management Model (CERT-RMM) is an innovative and transformative way to manage operational resilience in complex, risk-evolving environments. CERT-RMM distills years of research into best practices for managing the security and survivability of people, information, technology, and facilities. It...

Digital Design (4th Edition)
Digital Design (4th Edition)

Digital electronic circuits are the engines of cell phones, MPEG players, digital cameras, com puters, data servers, personal digital devices, GPS displays, and many other consumer prod ucts that process and use information in a digital format. This book presents a basic treatment of digital circuits and the fundamental concepts used in their...

The Elements of User Experience: User-Centered Design for the Web and Beyond (2nd Edition)
The Elements of User Experience: User-Centered Design for the Web and Beyond (2nd Edition)

From the moment it was published almost ten years ago, Elements of User Experience became a vital reference for web and interaction designers the world over, and has come to define the core principles of the practice. Now, in this updated, expanded, and full-color new edition, Jesse James Garrett has refined his...

Using LinkedIn
Using LinkedIn

Although professionals have always acknowledged the value of networking, today’s economic climate makes developing a solid network even more critical. LinkedIn, the leading social networking site for professionals, is the ideal tool for maximizing the potential of an online network. LinkedIn currently has more than 65 million...

Information Security Architecture: An Integrated Approach to Security in the Organization
Information Security Architecture: An Integrated Approach to Security in the Organization

This book is dedicated to my husband, Todd A. Tudor, and my three children, Drew, Allyssa, and Chad, who spent many hours patiently waiting for my time and attention while this book was being written.

Profits from this book will be contributed to the children of the world through the YMCA in Ethiopia, Africa, and through The...

The SIM Guide to Enterprise Architecture
The SIM Guide to Enterprise Architecture

It is amusing that the first part of this book to be read is the last part to be written. It provides, however, an opportunity to share with you a little about how writing and editing this book has changed my thinking not just about enterprise architecture (EA), or about the role of information technology (IT) and IT professionals in...

Writing Fiction For Dummies
Writing Fiction For Dummies

5o, you want to write a novel? Great! Writing a novel Is a worthwhile goal. It'll challenge you, stretch you, and change you. Getting It published will gain you respect from your family and friends, and It may even earn you a bit of fame and money.

But respect, fame, and money aren't the only reasons for writing a...

SOA for Profit, A Manager's Guide to Success with Service Oriented Architecture
SOA for Profit, A Manager's Guide to Success with Service Oriented Architecture

Service-Oriented Architecture is becoming the leading architecture for IT, and it is changing the way organisations work. IT is slowly but steadily gaining maturity, and becoming the flexible yet stable and reliable support for business it should be. At the same time, IT is regaining its potential to create real business innovation. SOA will...

The Chief Information Security Officer
The Chief Information Security Officer

The role of the Chief Information Security Officer has evolved enormously in recent years in response to security threats and a challenging business environment. Instead of being primarily a master technician, today s CISO has to be a trusted advisor to senior management. Read this pocket guide and ...

  • Learn how the role...
Result Page: 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy