 |
|
|
|
 Building DMZs for Enterprise NetworksDuring the course of the last few years, it has become increasingly evident that there is a pronounced need for protection of internal networks from the outside world. As machine technologies have improved and extensive shifts in the functions that a user can accomplish through more user-friendly interfaces have occurred, many more... |  |  |  |  Special Edition Using FileMaker 8If you're looking for the inside scoop on the latest version of FileMaker, you've come to the right place. Authors Scott Love and Steve Lane are FileMaker experts who were involved in the development of FileMaker 8, and they bring that knowledge to you in ... |
|
 Using Mac OS X v10.2, Special EditionFrom using the basic features of Mac OS X and its applications, working with multimedia, the Internet, and peripherals to administering mixed networks, this book provides readers with the information they need to become savvy on Mac OS X, version 10.2. Topic selection focuses on the practical rather than the theoretical. The information in the... |  |  Designing Secure Web-Based Applications for Microsoft(r) Windows(r) 2000Although numerous books on security are available, many of them cover only theory or perhaps a security silo—that is, an island of security based on a particular tool, application, or technology. It should be obvious that no complete security solution is a silo; all secure business applications touch many tools and many technologies. Also,... |  |  Sas R 9.1.3 Etl Studio: User's GuideThis manual explains how to use SAS ETL Studio to specify metadata for sources, specify metadata for targets, and create jobs that specify how data is extracted, transformed, and loaded from sources to targets.
Features that are new in SAS ETL Studio 9.1.3 include the following:
|
|
Result Page: 269 268 267 266 265 264 263 262 261 260 259 258 257 256 255 254 253 252 251 |