Home | Amazing | Today | Tags | Publishers | Years | Search 
Practical Oracle Security: Your Unauthorized Guide to Relational Database Security
Practical Oracle Security: Your Unauthorized Guide to Relational Database Security

A senior database manager at one of the world’s largest banks once told me that the best way to secure Oracle is to unplug it from the wall…and he is probably right. In fact, this holds true for nearly every networked application. Unfortunately, for many of us turning off the database is not an option; we must find another way to...

Refactoring with Microsoft Visual Studio 2010
Refactoring with Microsoft Visual Studio 2010

Changes to design are an everyday task for many people involved in a software project. Refactoring recognizes this reality and systematizes the distinct process of modifying design and structure without affecting the external behavior of the system. As you consider the benefits of refactoring, you will need this complete guide to steer you...

Deploying Microsoft Forefront Protection 2010 for Exchange Server
Deploying Microsoft Forefront Protection 2010 for Exchange Server

When we began this project, our intent was to create a real-world scenario that would guide IT professionals in using Microsoft best practices to deploy Microsoft Forefront Protection for Exchange Server (FPE) 2010. We hope you find that we have achieved that goal. We’ve also included a thorough explanation of the architectural...

Embedded Software: Know It All (Newnes Know It All)
Embedded Software: Know It All (Newnes Know It All)

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf!

Embedded software is present everywhere - from a garage
...

Pointers on C
Pointers on C

Provides background information needed to understand C. Covers pointers thoroughly, including syntax, techniques for their effective use, and common programming idioms in which they appear. Compares different methods for implementing common abstract data structures. Paper. DLC: C (Computer program language)

...
A Practical Guide to Designing for the Web (Five Simple Steps)
A Practical Guide to Designing for the Web (Five Simple Steps)

Designing for the web is di!erent than designing for any other medium. The breadth of skills required is sometimes daunting. The depth of experience required, seemingly unobtainable. Yet, the medium attracts designers from all spheres of design practice: from engineering and architecture, to product and graphic design. This chapter aims to...

Building the Perfect PC
Building the Perfect PC

Build a PC that will outperform any brand-name box on the market

Yes, even if you’re not a total geek you can build your own PC -- and we guarantee it’s worth the effort. You’ll discover that the quality is better and the cost is much lower than any comparable off-the-shelf PC you can buy. Design...

Business Process Technology: A Unified View on Business Processes, Workflows and Enterprise Applications
Business Process Technology: A Unified View on Business Processes, Workflows and Enterprise Applications

In the last decade there has been an explosion of interest in the modeling and automation of business processes, and competence in this area is seen as increasingly critical to business competitiveness and stability. However, this has lead to a parallel explosion in solution approaches and technologies leading to a state-of-the-art that is...

Pro WPF and Silverlight MVVM: Effective Application Development with Model-View-ViewModel
Pro WPF and Silverlight MVVM: Effective Application Development with Model-View-ViewModel

WPF and Silverlight are unlike any other user interface (UI) technologies. They have been built to a new paradigm that—if harnessed correctly—can yield unprecedented power and performance. This book shows you how to control that power to produce clean, testable, maintainable code.

It is now recognized that any
...

Microsoft Enterprise Library 5.0
Microsoft Enterprise Library 5.0

Microsoft Enterprise Library is a collection of reusable software components (also known as Application Blocks) that are designed to assist developers with common enterprise development challenges. Before using an Application block, you should have a good understanding of your application requirements and of the scenarios that the Application...

IBM InfoSphere Replication Server and Data Event Publisher
IBM InfoSphere Replication Server and Data Event Publisher

Business planning is no longer just about defining goals, analyzing critical issues, and then creating strategies. You must aid business integration by linking changed-data events in DB2 databases on Linux, UNIX, and Windows with EAI solutions , message brokers, data transformation tools, and more. Investing in this book will save you many...

SOA Governance
SOA Governance

SOA Governance is the key to a successful adoption of Service-Oriented Architecture. It is the process of establishing a desired outcome for your efforts, and then leveraging people, policies, and processes to make that outcome a reality. This includes technical policies and standards that guide your design-time activities, policies and...

Result Page: 1771 1770 1769 1768 1767 1766 1765 1764 1763 1762 1761 1760 1759 1758 1757 1756 1755 1754 1753 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy