Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,132
- Engineering & Applied Sciences 758
- History 701
- Development 539
- Management 492
- Computer Science 460
- Application software 453
- Computer networks 450
- Filosofía 375
- Universidad Pontificia de Salamanca (España) 370
- Data processing 365
- Lectura 365
- Examinations 364
- Security measures 337
- Computer security 330
- Crítica e interpretación 299
- Education 293
- Computer programs 291
- Cloud computing 284
- Certification 263
- Derecho 262
- Python (Computer program language) 262
- Electrical & Computer Engineering 257
- Database management 249
- Operating systems (Computers) 238
- Digital techniques 230
- Artificial intelligence 228
- Telecommunications 218
- Business & Economics 213
- Design 213
-
38461Publicado 1995“…In addition, the book covers the newest features of the 4.4BSD-Lite release, including multicasting, long fat pipe support, window scale, timestamp options, and protection against wrapped sequence numbers, and many other topics. Comprehensive in scope, based on a working standard, and thoroughly illustrated, this book is an indispensable resource for anyone working with TCP/IP…”
Libro electrónico -
38462Publicado 2006“…By reading this book, you will learn how to improve traffic flow, reliability, redundancy, performance, and security for Layer 2 and Layer 3 switched networks. This comprehensive book provides detailed information and easy-to-grasp tutorials on design, configuration, operation, and troubleshooting of modern multilayer switched networks. …”
Libro electrónico -
38463Publicado 2008“…Among the many topics he covers in unprecedented depth: cleanly implementing JavaScript custom events to reduce coupling and to enhance flexibility; overcoming Ajax’s traditional accessibility limitations; reducing network latency through compression and other techniques; and much more. Coverage includes Planning Ajax interfaces for simplicity, clarity, and intuitiveness Creating scalable, maintainable architectures for client-side JavaScript Using the latest tools to profile, validate, and debug client-side code Architecting the server side for security and functionality, while restricting loaded data, objects, and actions to current requests Protecting against the most widespread and significant Ajax security risks Optimizing every component of an Ajax application, from server-side scripts to database interactions Introducing cutting-edge Ajax: game development, Ajax with canvas, and Ajax for enterprise applications About the Web Site This book’s companion Web site (http://advancedajax.frozen-o.com) doesn’t just provide all the code: It shows code examples in action , as building blocks of a real Web application interface…”
Libro electrónico -
38464Publicado 2005“…In addition to being updated for the most recent releases of MySQL and PHP, this new edition offers 25% new material, including updated examples for improved clarity and comprehension and new installation instructions for PHP, MySQL, and other related technologies…”
Libro electrónico -
38465por Hutton, Keith“…Whether you are preparing for the CCDP® certification or simply want to gain a better understanding of how to architect network solutions over intelligent network services to achieve effective performance, scalability, and availability, you will benefit from the foundation information presented in this book. This comprehensive book provides detailed information and easy-to-grasp tutorials on a broad range of topics related to architecture and design, including security, fine-tuning routing protocols, switching structures, and IP multicasting. …”
Publicado 2005
Libro electrónico -
38466por Hart, Johnson M., 1944-“…In keeping the GUI focus to a minimum, Hart's book is able to be comprehensive on the topics contained within." –Michael Davidson, IT Analyst Windows System Programming, Third Edition gives a solid grounding on using the core Windows APIs, includingWin64; is updated for Windows Server 2003, Windows XP, and the Microsoft Visual Studio .NET Framework, and has extensive exa..…”
Publicado 2005
Libro electrónico -
38467Publicado 2002“…In its coverage of advanced topics, Solaris 8 Administrator's Guide offers examples of configuration files and the installation of third-party software packages. This comprehensive book also contains more conceptual and difficult material that is absent from other Solaris reference manuals. …”
Libro electrónico -
38468por Bishop, Matt“…Coverage includes Confidentiality, integrity, and availability Operational issues, cost-benefit and risk analyses, legal and human factors Planning and implementing effective access control Defining security, confidentiality, and integrity policies Using cryptography and public-key systems, and recognizing their limits Understanding and using authentication: from passwords to biometrics Security design principles: least-privilege, fail-safe defaults, open design, economy of mechanism, and more Controlling information flow through systems and networks Assuring security throughout the system lifecycle Malicious logic: Trojan horses, viruses, boot sector and executable infectors, rabbits, bacteria, logic bombs--and defenses against them Vulnerability analysis, penetration studies, auditing, and intrusion detection and prevention Applying security principles to networks, systems, users, and programs Introduction to Computer Security is adapted from Bishop's comprehensive and widely praised book, Computer Security: Art and Science. …”
Publicado 2005
Libro electrónico -
38469Publicado 2002“…"This is a complete, comprehensive, and most of all, practical book. The author excels at sharing his vast expertise so web developers can make the most out of JavaServer Pages and related web technologies." …”
Libro electrónico -
38470por Deitel, Paul J.“…Visit www.deitel.com to: Download code examples Check out the growing list of programming, Web 2.0, and software-related Resource Centers To receive updates on this book, subscribe to the free DEITEL ® BUZZ ONLINE e-mail newsletter at www.deitel.com/newsletter/subscribe.html Read archived Issues of the DEITEL BUZZ ONLINE Contact deitel@deitel.com for information on corporate training courses delivered on-site worldwide Pre-Publication Reviewer Testimonials "This book is easily the most comprehensive resource of its kind I've seen yet." --Jesse James Garrett, Adaptive Path "A one-stop shop for learning the essentials of web programming." …”
Publicado 2008
Libro electrónico -
38471Publicado 2007“…Each chapter begins with a brief architectural overview of a key SQL Server component, then drills down into the most common problems users encounter, offering specific guidance on investigating and resolving them. You’ll find comprehensive, in-depth chapters on • Waiting and blocking • Data corruption and recovery • Memory • Procedure cache issues • Query processing • Server crashes and other critical failures • Service Broker • SQLOS and scheduling • tempdb • Clustering This is the indispensable resource for everyone who must keep SQL Server running smoothly: DBAs, database application developers, API programmers, and Web developers alike. …”
Libro electrónico -
38472por Henderson, Ken“…Blending theoretical detail with practical application, this comprehensive reference begins with a foundational overview of SQL Server(TM) stored procedure programming. …”
Publicado 2002
Libro electrónico -
38473por Henderson, Ken“…Moving on to more advanced topics, the journey continues with in-depth coverage of: Transact-SQL performance tuning using tools such as Query Analyzer and Performance Monitor Nuances of the various T-SQL data types Complex statistical calculations such as medians, modes, and sliding aggregates Run, sequence, and series identification and interrogation Advanced Data Definition Language (DDL) and Data Management Language (DML) techniques Stored procedure and trigger best practices and coding methods Transaction management Optimal cursor use and caveats to look out for Full-text search Hierarchies and arrays Administrative Transact-SQL OLE Automation More than 100 undocumented commands and language features, including numerous unpublished DBCC command verbs, trace flags, stored procedures, and functions Comprehensive, written in understandable terms, and full of practical information and examples, The Guru's Guide to Transact-SQL is an indispensable reference for anyone working with this database development language. …”
Publicado 2000
Libro electrónico -
38474por Klevinsky, T. J.“…The latest information on the necessary hardware for performing penetration testing, as well as an extensive reference on the available security tools, is included. Comprehensive in scope Hack I.T. provides in one convenient resource the background, strategies, techniques, and tools you need to test and protect your system--before the real hackers attack. …”
Publicado 2002
Libro electrónico -
38475por Reilly, David“…An accelerated guide to networking API, JavaTM Network Programming and Distributed Computing also serves as a comprehensive, example-rich reference. You will learn to maximize the API structure through in-depth coverage of: The architecture of the Internet and TCP/IP Java’s input/output system How to write to clients and servers using the User Datagram Protocol (UDP) and TCP The advantages of multi-threaded applications How to implement network protocols and see examples of client/server implementations HTTP and how to write server-side Java applications for the Web Distributed computing technologies such as Remote Method Invocation (RMI) and CORBA How to access e-mail using the extensive and powerful JavaMailTM API This book’s coverage of advanced topics such as input/output streaming and multi-threading allows even the most experienced Java developers to sharpen their skills. …”
Publicado 2002
Libro electrónico -
38476por Onion, Fritz“…It has a straightforward style and is comprehensive.” — DARYL RICHTER , software architect “This book greatly improves the understanding of ASP.NET. …”
Publicado 2003
Libro electrónico -
38477Publicado 2004“…What makes Monson-Haefel a master of technical authoring can be seen in his well-thought-out and logical progression of ideas, and in his examples practical, precise, usable examples, large enough to test key concepts but still small enough to be comprehensible taken apart and explained in the detail you need to deploy those principles in other situations. …”
Libro electrónico -
38478por Bollapragada, Vijay“…Beyond understanding the Cisco IOS command set, comprehending what happens inside Cisco routers will help you as a network designer or engineer to perform your job more effectively. …”
Publicado 2000
Libro electrónico -
38479por Monson-Haefel, Richard“…Bruce Scharlau Department of Computing Science University of Aberdeen, Scotland “Richard Monson-Haefel provides the most comprehensive analysis of J2EE Web services that I’ve seen so far to date. …”
Publicado 2004
Libro electrónico -
38480por Clark, Tom, 1947 August 12-“…The new Fibre Channel, IP, and virtualization initiatives covered in this work will enable customers to implement comprehensive shared storage solutions that reduce management overhead and cost." …”
Publicado 2003
Libro electrónico