Home | Amazing | Today | Tags | Publishers | Years | Search 
Beginning Backdrop CMS
Beginning Backdrop CMS

Learn what Backdrop CMS is and how it fulfills the role of a content management system, along with how to install and configure it. This book teaches how to create and manage content, taxonomy, users, page layouts, and menus to get the best site possible. You'll also see how to install on shared hosting – which is...

Java 9 Recipes: A Problem-Solution Approach
Java 9 Recipes: A Problem-Solution Approach

Quickly find solutions to dozens of common programming problems encountered while building Java applications. Content is presented in the popular problem-solution format. Look up the programming problem that you want to resolve. Read the solution. Apply the solution directly in your own code. Problem solved!

This...

Expert Oracle Indexing and Access Paths: Maximum Performance for Your Database
Expert Oracle Indexing and Access Paths: Maximum Performance for Your Database

Speed up the execution of important database queries by making good choices about which indexes to create. Choose correct index types for different scenarios. Avoid indexing pitfalls that can actually have indexes hurting performance rather than helping. Maintain indexes so as to provide consistent and predictable query response over...

Beginning SQL Server Reporting Services
Beginning SQL Server Reporting Services

Learn SQL Server Reporting Services and become current with the 2016 edition. Develop interactive, dynamic reports that combine graphs, charts, and tabular data into attractive dashboards and reports to delight business analysts and other users of corporate data. Deliver mobile reports to anywhere and any device. Build vital...

Learn Office 2016 for Mac
Learn Office 2016 for Mac

A practical, hands-on approach to using Office 2016 applications to create and edit documents and get work done efficiently. You'll learn how to customize Office, design, create, and share documents, manipulate data in a spreadsheet, and create lively presentations. You'll also discover how to organize your email, contacts, and tasks...

Industry 4.0: The Industrial Internet of Things
Industry 4.0: The Industrial Internet of Things

Explore the current state of the production, processing, and manufacturing industries and discover what it will take to achieve re-industrialization of the former industrial powerhouses that can counterbalance the benefits of cheap labor providers dominating the industrial sector. This book explores the potential for the Internet of Things...

Advanced API Security: OAuth 2.0 and Beyond
Advanced API Security: OAuth 2.0 and Beyond
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs.
Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of
...
Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices
Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices

This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the...

Leading Creative Teams: Management Career Paths for Designers, Developers, and Copywriters
Leading Creative Teams: Management Career Paths for Designers, Developers, and Copywriters

Learn the skills you must master to assume leadership roles―creative directors, art directors, and advertising managers―on creative teams and in integrated branding campaigns for corporate clients. This book compares and contrasts the skill sets and responsibilities of creatives with those of managers who direct creative...

Implementing DirectAccess with Windows Server 2016
Implementing DirectAccess with Windows Server 2016

Learn how to design, plan, implement, and support a secure remote access solution using DirectAccess in Windows Server 2016. Remote Access has been included in the Windows operating system for many years. With each new operating system release, new features and capabilities have been included to allow network engineers and security...

Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide
Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do...

Relational Database Programming: A Set-Oriented Approach
Relational Database Programming: A Set-Oriented Approach
I want to share some thoughts from my experiences doing project-based work as an IT contractor. Working as an IT contractor means taking on a mix of short- and long-term projects. In a short-term project, you need to work on a specific task with a team of developers, you need to solve a problem quickly, and then you are done with the...
Result Page: Previous 2167 2168 2169 2170 2171 2172 2173 2174 2175 2176 2177 2178 2179 2180 2181 2182 2183 2184 2185 2186 2187 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy