Home | Amazing | Today | Tags | Publishers | Years | Search 
Microsoft SQL Server 2000 Performance Optimization and Tuning Handbook
Microsoft SQL Server 2000 Performance Optimization and Tuning Handbook
My last SQL Server performance book was aimed at SQL Server 6.5. When Microsoft
released SQL Server 7.0 it was almost as if it were a new product. Although it was backward
compatible in many areas with SQL Server 6.5, the architecture was very different. For
starters, the on-disk structure was completely changed. The usage of files
...
Hack Proofing Your Network (Second Edition)
Hack Proofing Your Network (Second Edition)
This book is intended to teach skills that will be useful for breaking into computers.
If that statement shocks you, then you probably aren’t familiar with the
legitimate reasons for hacking.These reasons can be security testing, consumer
advocacy and civil rights, military interests, and “hacktivist” politics;
...
Symbian OS Internals : Real-time Kernel Programming (Symbian Press)
Symbian OS Internals : Real-time Kernel Programming (Symbian Press)
The latest versions of Symbian OS are based upon Symbian’s new realtime
kernel. This kernel is designed to make phone-related development
easier: base-porting will be easier, device driver development will be
easier, software development will be easier.

Symbian OS Internals is a detailed exposition on the new
...
Web Security & Commerce (O'Reilly Nutshell)
Web Security & Commerce (O'Reilly Nutshell)
Attacks on government Web sites, break-ins at Internet service providers, electronic credit card fraud, invasion of
personal privacy by merchants as well as hackers - is this what the World Wide Web is really all about?

Web Security & Commerce cuts through the hype and the front page stories. It tells you what the real risks
...
Java Cryptography (Java Series)
Java Cryptography (Java Series)
Cryptography, the science of secret writing, is the biggest, baddest security tool in the application
programmer's arsenal. Cryptography provides three services that are crucial in secure programming.
These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates,
which prove identity
...
Configuring Check Point NGX VPN-1/Firewall-1
Configuring Check Point NGX VPN-1/Firewall-1
Check Point FireWall-1 came out in 1994 and was an immediate success. It has been
the market-leading firewall platform for over 10 years. It is no wonder the platform
has done so well.The Check Point Graphical User Interface for managing firewall
policies is extremely intuitive and easy to learn.

Check Point has come a
...
Nonlinear Signal Processing : A Statistical Approach
Nonlinear Signal Processing : A Statistical Approach
A Unified Treatment of Non-Gaussian Processes and Nonlinear Signal Processing

Nonlinear signal processing methods are finding numerous applications in such fields as imaging, teletraffic, communications, hydrology, geology, and economics–fields where nonlinear systems and non-Gaussian processes emerge. Within a broad class of nonlinear...

Object-Oriented Analysis and Design : Understanding System Development with UML 2.0
Object-Oriented Analysis and Design : Understanding System Development with UML 2.0
The aim of this book is to give you a broad understanding of the processes and techniques used in object-oriented software development, the production of computer programs using object-oriented techniques. The Unified Modeling Language (UML) comes into play as the standard notation used in industry for software documentation.

You may be
...
Red Hat Enterprise Linux 4 For Dummies
Red Hat Enterprise Linux 4 For Dummies
Install and use the leading Linux distribution today!

Here's how to set up, manage, and upgrade RHEL Desktop, WS, AS, and ES versions

If you need to get rolling with the newest generation of Red Hat Enterprise Linux in a hurry, you'll tip your hat to this friendly guide. It walks you through all the system administration and...

InfoSec Career Hacking : Sell Your Skillz, Not Your Soul
InfoSec Career Hacking : Sell Your Skillz, Not Your Soul

A Technical Guide to Landing (and Keeping) a Job in the Information Security Field

Do you analyze every packet that crosses...

DB2(R) Express : Easy Development and Administration (IBM Press Series-Information Management)
DB2(R) Express : Easy Development and Administration (IBM Press Series-Information Management)

IBM DB2 UDB Express Edition Version 8.2 delivers everything small to medium-sized businesses need to accelerate time-to-value and dramatically reduce TCO in their database applications. Now, IBM's own experts show exactly how to get started with DB2 Express, and use it to develop, deploy, and manage superior applications from start to...

Making a Movie in iMovie HD and iDVD 5 : Visual QuickProject Guide
Making a Movie in iMovie HD and iDVD 5 : Visual QuickProject Guide
So you've got a copy of iMovie HD and iDVD 5,  a camcorder, and plenty of footagebut how do you get all this video footage into a watchable movie? Maybe you don't want  to spend a lot of time learning all the ins and outs of the software, but  just want to get your movie finished. Realizing that many users won't want to waste a...
Result Page: 237 236 235 234 233 232 231 230 229 228 227 226 225 224 223 222 221 220 219 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy