Home | Amazing | Today | Tags | Publishers | Years | Search 
Oracle SQL : Jumpstart with Examples
Oracle SQL : Jumpstart with Examples
One comes across very few books that make a significant difference in your fundamental understanding of the subject. This is one such book if you want to understand a core database skill SQL. This book deserves a place in your library and you will find it a great reference not only for learning SQL but also for learning data relationships, data...
Physical Security for IT
Physical Security for IT
"Michael has unquestionable knowledge about how organizations today are linking their systems across enterprise-wide networks and virtual private networks (VPNs), as well as increasing their exposure to customers, competitors, browsers, hackers, and physical threats to the facility equipment and network(s). This book will show you how each...
Deploying LINUX on the Desktop
Deploying LINUX on the Desktop
Covering Red Hat Enterprise Linux 3 and 4, SuSE Enterprise Linux 9, and Mandrake Linux, this book provides the necessary tools that will allow its readers to use Linux within a Microsoft-centric network environment. It is an invaluable reference regarding the creation of an integrated Linux corporate desktop!

Looking at the world of the
...
Oracle Database Programming Using Java and Web Services
Oracle Database Programming Using Java and Web Services
The traditional division of labor between the database (which only stores and manages SQL and XML data for fast, easy data search and retrieval) and the application server (which runs application or business logic, and presentation logic) is obsolete. Although the books primary focus is on programming the Oracle Database, the concepts and...
Tony Redmond's Microsoft Exchange Server 2003: with SP1 (HP Technologies)
Tony Redmond's Microsoft Exchange Server 2003: with SP1 (HP Technologies)
Tony Redmond does it again! He provides detailed real-world information that will make you an expert on Exchange 2003. This book is a clear, to-the-point source of information filled with sound practical advice. Whether you're new to Exchange or upgrading your existing Exchange
systems, this detailed guide can help you tap all the power,
...
Oracle 10g Developing Media Rich Applications
Oracle 10g Developing Media Rich Applications
Integrating Multimedia features in databases in one of the most important new applications in the last 20 years

Oracle 10g Developing Media Rich Applications is focused squarely on database administrators and programmers as the foundation of multimedia database applications. With the release of Oracle8 Database in 1997,
...
Voice over Internet Protocol (VoIP) Security
Voice over Internet Protocol (VoIP) Security
"Voice Over Internet Protocol Security is both unique and timely. Ransome and Rittinghouse expertly describe the technical fundamentals, salient business drivers, and converged network infrastructure security risks and challenges IT and security professionals encounter when implementing enterprise-level VoIP systems." - William M....
Server Architectures: Multiprocessors, Clusters, Parallel Systems, Web Servers, Storage Solutions
Server Architectures: Multiprocessors, Clusters, Parallel Systems, Web Servers, Storage Solutions

I believe it was the 1992 season while doing a Saturday College Football ESPN scoreboard show when Tim Brando decided to nickname me the “Pony. ” Brando ’ s one of the more talented announcers I ’ ve ever worked with. He ’ s full of bull most of the time, but he loves college football — and that passion comes...

Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase
Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase
"Today, databases house our 'information crown jewels', but database security is one of the weakest areas of most information security programs. With this excellent book, Ben-Natan empowers you to close this database security gap and raise your database security bar!" Bruce W. Moulton. CISO/VP, Fidelity Investments (1995 - 2001)...
Managing Microsoft's Remote Installation Services
Managing Microsoft's Remote Installation Services
I remember one fateful afternoon when I asked my colleague Michael Iversen whether he’d be interested in writing a book with me. When he had finished laughing, his initial response was that he actually liked the idea. Neither of us had ever written a book before, but for us the idea seemed thrilling.

Agreeing on the subject was
...
IM Instant Messaging Security
IM Instant Messaging Security
Securing Instant Messaging (IM) is one of the top three priorities for IT managers to consider in the next 12 months. If IM security problems have been keeping you up at night . . . they should! According to research firm IDC, corporate IM users will jump from nearly 50 million in 2003 to over 181 million by 2005.

If your company is like
...
Business Continuity and Disaster Recovery for InfoSec Managers
Business Continuity and Disaster Recovery for InfoSec Managers
Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or
communications systems. Since 9/11 it has become increasingly important for companies to implement a
plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security
management requirements of
...
Result Page: Previous 2259 2260 2261 2262 2263 2264 2265 2266 2267 2268 2269 2270 2271 2272 2273 2274 2275 2276 2277 2278 2279 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy