Home | Amazing | Today | Tags | Publishers | Years | Search 
The Best Damn Firewall Book Period, Second Edition
The Best Damn Firewall Book Period, Second Edition
The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, SonicWALL, and Check Point.

Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this
...
Sarbanes-Oxley IT Compliance Using Open Source Tools-Second Edition, Second Edition
Sarbanes-Oxley IT Compliance Using Open Source Tools-Second Edition, Second Edition
The Sarbanes-Oxley Act (officially titled the Public Company Accounting Reform and Investor Protection Act of 2002), signed into law on 30 July 2002 by President Bush, is considered the most significant change to federal securities laws in the United States since the New Deal. It came in the wake of a series of corporate financial scandals,...
The Book of Qt 4: The Art of Building Qt Applications
The Book of Qt 4: The Art of Building Qt Applications
Cross-platform development is a kind of holy grail, and Trolltech's Qt toolkit may well be the most promising solution yet to this development challenge. Qt is widely used for the development of GUI applications as well as console tools and servers, and it's especially appealing to programmers who need to write cross-platform applications to run on...
Understanding COM+
Understanding COM+
Developing enterprise applications has traditionally been a long, painful, and expensive task because applications developers often have to reinvent the wheel by writing, from scratch, the entire infrastructure needed to scale business logic up to the enterprise level. That's where COM+ comes in. It's an advanced Component Object Model (COM)...
How to Do Everything with Your iPAQ Pocket PC
How to Do Everything with Your iPAQ Pocket PC
Now you can do more with your HP iPAQ Pocket PC than you ever thought possible. Use this step-by-step guide to discover all the essentials about your iPAQ and put it to work with a thorough exploration of its hardware, software, and accessories. Learn how to use your iPAQ as a portable entertainment station for music, movies and games. Find out how...
IBM(R) WebSphere(R): Deployment and Advanced Configuration (Information Management)
IBM(R) WebSphere(R): Deployment and Advanced Configuration (Information Management)
The expert guide to deploying and managing any WebSphere Application Server V5.x application and environment

If you’re a WebSphere Application Server administrator or developer, this is your ...

Highly Available Storage for Windows Servers
Highly Available Storage for Windows Servers
A guide to managing online storage in Windows server environments

Managing online storage effectively is becoming an essential component of the information processing strategy as enterprises place increasing reliance on their data assets. The many online storage management options available for the Windows server environment can be bewildering...

Pro WPF with VB 2008: Windows Presentation Foundation with .NET 3.5
Pro WPF with VB 2008: Windows Presentation Foundation with .NET 3.5
When .NET first appeared, it introduced a small avalanche of new technologies. There was a whole new way to write web applications (ASP.NET), a whole new way to connect to databases (ADO.NET), new typesafe languages (C# and VB .NET), and a managed runtime (the CLR). Not least among these new technologies was Windows Forms, a library of classes for...
Foundations of ASP.NET AJAX (Expert's Voice in .Net)
Foundations of ASP.NET AJAX (Expert's Voice in .Net)
AJAX is fast becoming a de facto standard for developing responsive and rich web applications. This evolutionary step in the user experience is being used in more and more web applications from Outlook Web Access to Google maps and beyond.

But how do you write AJAX applications? Not too long ago, you had to be a JavaScript expert and use
...
The Craft of System Security
The Craft of System Security

"I believe The Craft of System Security is one of the best software security books on the market today. It has not only breadth, but depth, covering topics ranging from cryptography, networking, and operating systems--to the Web, computer-human interaction, and how...

Guerrilla Marketing for Consultants: Breakthrough Tactics for Winning Profitable Clients
Guerrilla Marketing for Consultants: Breakthrough Tactics for Winning Profitable Clients
Proven guerrilla marketing tactics specifically designed for consultants

Jay Conrad Levinson’s Guerrilla Marketing revolutionized the way marketers do business by defying the conventional wisdom that effective marketing means spending big bucks. He devised highly successful marketing strategies that rely on creativity, imagination, and...

Model-Based Software Testing and Analysis with C#
Model-Based Software Testing and Analysis with C#
This book teaches new methods for specifying, analyzing, and testing software; essentials for creating high-quality software. These methods increase the automation in each of these steps, making them more timely, more thorough, and more effective. The authors work through several realistic case studies in-depth and detail, using a toolkit built on...
Result Page: 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy