Home | Amazing | Today | Tags | Publishers | Years | Search 
The Database Hacker's Handbook: Defending Database Servers
The Database Hacker's Handbook: Defending Database Servers
Databases are the nerve center of our economy. Every piece of your personal information is stored there—medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling—and relentless.

In this essential follow-up to...

Microsoft Visual C# .NET (Core Reference)
Microsoft Visual C# .NET (Core Reference)

When I first started working with Microsoft Visual C# .NET, I was immediately struck by how productive my coding sessions became. Even though I was working with the pre-Beta release, the development environment and the .NET Framework simplified much of the work that I was doing. The increased productivity was due to four...

Mastering Business Analysis with Crystal Reports 9 (Wordware Applications Library)
Mastering Business Analysis with Crystal Reports 9 (Wordware Applications Library)
This resource focuses on providing context and reference useful to mainstream business users, and explains how to apply Crystal Reports to your specialized database environment.

Database management systems allow businesses to organize and manage their operations effectively. However, it’s not always easy to view and understand data...

Photoshop CS2 Bible, Professional Edition
Photoshop CS2 Bible, Professional Edition
Inside, you'll find advanced coverage of Photoshop CS2
  • Explore new ways to adjust and enhance color
  • Use retouching and color adjustment techniques to correct seemingly impossible-to-fix images
  • Gain control over digital camera images with Photoshop's enhanced Camera Raw capabilities
  • Manage...
Solaris and LDAP Naming Services: Deploying LDAP in the Enterprise
Solaris and LDAP Naming Services: Deploying LDAP in the Enterprise
This book is one of an on-going series of books collectively known as the Sun
BluePrints™ program. The Solaris™ and LDAP Naming Services BluePrint describes
best practices for planning and deploying naming services based on the Lightweight
Directory Access Protocol (LDAP). The introduction of native LDAP in the Solaris
...
Advanced Visual Basic 6: Power Techniques for Everyday Programs
Advanced Visual Basic 6: Power Techniques for Everyday Programs
In Advanced Visual Basic 6, leading Visual Basic expert Matthew Curland demonstrates powerhouse techniques programmers can use to write high-performance, robust, and reusable VB code. Readers learn how to leverage the close relationships between VB, COM, and OLE Automation, extending the envelope of VB's capabilities and...
Developer's Workshop to COM and ATL 3.0
Developer's Workshop to COM and ATL 3.0
Learn how to build sophisticated COM objects using C++ and IDL, as well as how ATL supplies support for several COM procedures.

Microsoft’s Component Object Model is one of the most important concepts in software development today. Developer’s Workshop to COM and ATL 3.0 provides an in-depth treatment of COM and shows...

Bluetooth Revealed: The Insider's Guide to an Open Specification for Global Wireless Communications
Bluetooth Revealed: The Insider's Guide to an Open Specification for Global Wireless Communications
The convergence of computing and communications has been predicted for many years. Today's explosion of a myriad of new types of personal computing and communications devices—notebook computers, personal digital assistants, "smart" phones, two-way pagers, digital cameras and so on—has resulted in new ways for people to...
Handbook of Fiber Optic Data Communication, Second Edition
Handbook of Fiber Optic Data Communication, Second Edition
The datacom industry is evolving very rapidly, and a host of new technologies, services, standards, and types of networks have been introduced since the first edition of the Handbook was published over 3 years ago. Building on the success of the first edition, this Handbook contains revisions and updates to all major chapters plus a new glossary...
The Common Language Infrastructure Annotated Standard
The Common Language Infrastructure Annotated Standard

The Common Language Infrastructure Annotated Standard is the definitive guide to understanding the annotated specification for the Common Language Infrastructure (CLI) standard. With annotations and code samples from both the ECMA standards committee and the Microsoft Common Language Runtime (CLR) team, this book goes...

Absolute Beginner's Guide to Networking, Fourth Edition
Absolute Beginner's Guide to Networking, Fourth Edition

Absolute Beginner's Guide to Networking, Fourth Edition gives readers the ability and understanding necessary to create and administer a network. The book shows the reader how to physically connect computers and other devices to a network and access peripherals such as printers over the...

Linux Network Security (Administrator's Advantage Series)
Linux Network Security (Administrator's Advantage Series)

Linux networks are becoming more and more common, but security is often an overlooked issue. Unfortunately, in today’s environment all networks are potential hacker targets, from top-secret military research networks to small home LANs. Linux Network Security focuses on securing Linux in a networked environment, where the security...

Result Page: 814 813 812 811 810 809 808 807 806 805 804 803 802 801 800 799 798 797 796 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy