 |
|
 Deploying Secure 802.11 Wireless Networks with Microsoft WindowsGet in-depth technical guidance for deploying a security-enhanced wireless network for your corporate, public, or small business network—direct form the Microsoft Windows Networking and Communications team. This essential reference details the latest IEEE 802.11 and related technologies for public and private wireless LANs, including the... |  |  VBScript Programmer's Reference (Programmer to Programmer)The VBScript standard has changed over time, and several new things have been introduced since this book first published in 1999. The current standard for VBScript is 5.6. The script debugger, script control, and script encoder have all changed and the Windows Script Component Wizard, regular expressions, and remote scripting have been... |  |  Coder to Developer: Tools and Strategies for Delivering Your SoftwareNo one can disparage the ability to write good code. At its highest levels, it is an art. But no one can confuse writing good code with developing good software. The difference—in terms of challenges, skills, and compensation—is immense.
Coder to Developer: Tools and Strategies for Delivering Your Software helps you... |
|
 Microsoft Excel Data Analysis and Business ModelingNow you can apply the techniques that business analysts at leading companies use to analyze and transform data into bottom line results. For more than 10 years, well-known consultant and business professor Wayne Winston has been teaching corporate clients and MBA candidates the most effective ways to use Microsoft Excel for data analysis, modeling,... |  |  eLearning with Dreamweaver® MX: Building Online Learning ApplicationsLearn how to create compelling online learning applications with Dreamweaver MX. When designing online learning applications, concepts such as interactivity levels, user tracking, and audience level must be understood before a developer can start coding a single web page. eLearning with Dreamweaver MX:... |  |  Maximum Security, Fourth EditionMaximum Security, Fourth Edition provides updated, comprehensive, platform-by-platform coverage of security issues, and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. This book provides information for security administrators and others interested in... |
|
|
 Beginning JavaScript Second EditionJavaScript is the preferred programming language for Web page applications, letting you enhance your sites with interactive, dynamic, and personalized pages. This fully updated guide shows you how to take advantage of JavaScript’s client-side scripting techniques for the newest versions of Netscape and Internet Explorer, even if... |  |  Oracle SecurityThis book covers the field of Oracle security from simple to complex. It describes basic RDBMS security features (e.g., passwords, profiles, roles, privileges, synonyms) and includes many practical strategies for securing an Oracle system, developing auditing and backup plans, and using the Oracle... |  |  Java Threads, Third EditionThreads are essential to Java programming, but learning to use them effectively is a nontrivial task. This new edition of the classic Java Threads shows you how to take full advantage of Java's threading facilities and brings you up-to-date with the watershed changes in Java 2 Standard Edition version 5.0 (J2SE... |
|
Result Page: 127 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 |