![](https://www.pdfchm.net/pic/empty.gif) |
|
|
![](https://pic.pdfchm.net/empty.gif) SQL and Relational Theory: How to Write Accurate SQL Code
This edition differs from its predecessor in a number of ways. The overall objective remains the same, of course—
using SQL relationally is still the emphasis—but the text has been revised throughout to reflect, among other things,
experience gained from teaching live seminars based on the first edition.
One... | ![](https://www.pdfchm.net/pic/empty.gif) | ![](https://pic.pdfchm.net/empty.gif) Agile IT Security Implementation Methodology
Agile methodologies attack risk at its core. To identify risk early and often is the
premise of agile security. Risk comes in many forms. Organizations face security
threats every day. Risks are in the delivery and maintenance of the countermeasures.
Agile IT Security focuses on the details of the steps in delivering and maintaining... | ![](https://www.pdfchm.net/pic/empty.gif) | ![](https://pic.pdfchm.net/empty.gif) Windows PowerShell in Action, Second Edition
Well, it’s been a wild ride since the first edition of this book was released. At that
time, PowerShell had just shipped and had a fairly limited scope of influence. Things
have changed a lot. PowerShell now ships in the box with Windows (at least Windows
7 and Server 2008 R2). The number of PowerShell users is now in the hundreds... |
|
|
|
Result Page: 26 25 24 23 22 21 20 19 18 17 |