 |
|
|
 Thor's Microsoft Security Bible: A Collection of Practical Security Techniques
What is security? Is it a mindset? Is it a measurable and actionable posture or position? Or is it a
bit of both? People, as a race, learn from doing; they learn by example. Ingrained into our psyche
is a process that builds new information upon previous knowledge as we learn. As Isaac Newton
said, “If I have seen further than... |  |  Internet Research - Illustrated
Welcome to Internet Research—Illustrated,
Fifth Edition. If this is your first experience with
the Illustrated series, you’ll see that this book
has a unique design: each skill is presented
on two facing pages, with steps on the left
and screens on the right. The layout makes it
easy to learn a skill without having to... |  |  Oracle 11G: SQL
ORACLE 11G: SQL is not simply a study guide; it is written for individuals who have just a basic knowledge of databases and can be utilized in a course on this latest implementation of SQL from Oracle.
The past few decades have seen a proliferation of organizations that rely heavily on information
technology. These organizations... |
|
 Computer Technology Encyclopedia
These days, any attempt to write a full-blown encyclopedia or dictionary of computer
terminology would be an exercise in futility. New terms and buzzwords appear every
day, and information technology fi elds overlap with so many other fi elds it can be hard
to determine if a word is IT, telecommunications, or graphics arts, and so on.... |  |  |  |  Programming Concurrency on the JVM: Mastering Synchronization, STM, and Actors
Speed. Aside from caffeine, nothing quickens the pulse of a programmer as
much as the blazingly fast execution of a piece of code. How can we fulfill
the need for computational speed? Moore’s law takes us some of the way,
but multicore is the real future. To take full advantage of multicore, we need
to program with concurrency... |
|
|
Result Page: 444 443 442 441 440 439 438 437 436 435 434 433 432 431 430 429 428 427 426 |