 |
|
 Microsoft SQL Server 2000 Performance Optimization and Tuning HandbookMy last SQL Server performance book was aimed at SQL Server 6.5. When Microsoft released SQL Server 7.0 it was almost as if it were a new product. Although it was backward compatible in many areas with SQL Server 6.5, the architecture was very different. For starters, the on-disk structure was completely changed. The usage of files... |  |  Hack Proofing Your Network (Second Edition)This book is intended to teach skills that will be useful for breaking into computers. If that statement shocks you, then you probably aren’t familiar with the legitimate reasons for hacking.These reasons can be security testing, consumer advocacy and civil rights, military interests, and “hacktivist” politics;... |  |  Symbian OS Internals : Real-time Kernel Programming (Symbian Press)The latest versions of Symbian OS are based upon Symbian’s new realtime kernel. This kernel is designed to make phone-related development easier: base-porting will be easier, device driver development will be easier, software development will be easier.
Symbian OS Internals is a detailed exposition on the new... |
|
 Web Security & Commerce (O'Reilly Nutshell)Attacks on government Web sites, break-ins at Internet service providers, electronic credit card fraud, invasion of personal privacy by merchants as well as hackers - is this what the World Wide Web is really all about?
Web Security & Commerce cuts through the hype and the front page stories. It tells you what the real risks... |  |  Java Cryptography (Java Series)Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity... |  |  Configuring Check Point NGX VPN-1/Firewall-1Check Point FireWall-1 came out in 1994 and was an immediate success. It has been the market-leading firewall platform for over 10 years. It is no wonder the platform has done so well.The Check Point Graphical User Interface for managing firewall policies is extremely intuitive and easy to learn.
Check Point has come a... |
|
 Nonlinear Signal Processing : A Statistical ApproachA Unified Treatment of Non-Gaussian Processes and Nonlinear Signal Processing
Nonlinear signal processing methods are finding numerous applications in such fields as imaging, teletraffic, communications, hydrology, geology, and economics–fields where nonlinear systems and non-Gaussian processes emerge. Within a broad class of nonlinear... |  |  |  |  Red Hat Enterprise Linux 4 For DummiesInstall and use the leading Linux distribution today!
Here's how to set up, manage, and upgrade RHEL Desktop, WS, AS, and ES versions
If you need to get rolling with the newest generation of Red Hat Enterprise Linux in a hurry, you'll tip your hat to this friendly guide. It walks you through all the system administration and... |
|
 |  |  |  |  Making a Movie in iMovie HD and iDVD 5 : Visual QuickProject GuideSo you've got a copy of iMovie HD and iDVD 5, a camcorder, and plenty of footagebut how do you get all this video footage into a watchable movie? Maybe you don't want to spend a lot of time learning all the ins and outs of the software, but just want to get your movie finished. Realizing that many users won't want to waste a... |
|
Result Page: 237 236 235 234 233 232 231 230 229 228 227 226 225 224 223 222 221 220 219 |