Mostrando 38,461 - 38,480 Resultados de 39,884 Para Buscar 'COMpRE*', tiempo de consulta: 0.14s Limitar resultados
  1. 38461
    Publicado 1995
    “…In addition, the book covers the newest features of the 4.4BSD-Lite release, including multicasting, long fat pipe support, window scale, timestamp options, and protection against wrapped sequence numbers, and many other topics. Comprehensive in scope, based on a working standard, and thoroughly illustrated, this book is an indispensable resource for anyone working with TCP/IP…”
    Libro electrónico
  2. 38462
    Publicado 2006
    “…By reading this book, you will learn how to improve traffic flow, reliability, redundancy, performance, and security for Layer 2 and Layer 3 switched networks. This comprehensive book provides detailed information and easy-to-grasp tutorials on design, configuration, operation, and troubleshooting of modern multilayer switched networks. …”
    Libro electrónico
  3. 38463
    Publicado 2008
    “…Among the many topics he covers in unprecedented depth: cleanly implementing JavaScript custom events to reduce coupling and to enhance flexibility; overcoming Ajax’s traditional accessibility limitations; reducing network latency through compression and other techniques; and much more. Coverage includes Planning Ajax interfaces for simplicity, clarity, and intuitiveness Creating scalable, maintainable architectures for client-side JavaScript Using the latest tools to profile, validate, and debug client-side code Architecting the server side for security and functionality, while restricting loaded data, objects, and actions to current requests Protecting against the most widespread and significant Ajax security risks Optimizing every component of an Ajax application, from server-side scripts to database interactions Introducing cutting-edge Ajax: game development, Ajax with canvas, and Ajax for enterprise applications About the Web Site This book’s companion Web site (http://advancedajax.frozen-o.com) doesn’t just provide all the code: It shows code examples in action , as building blocks of a real Web application interface…”
    Libro electrónico
  4. 38464
    Publicado 2005
    “…In addition to being updated for the most recent releases of MySQL and PHP, this new edition offers 25% new material, including updated examples for improved clarity and comprehension and new installation instructions for PHP, MySQL, and other related technologies…”
    Libro electrónico
  5. 38465
    por Hutton, Keith
    Publicado 2005
    “…Whether you are preparing for the CCDP® certification or simply want to gain a better understanding of how to architect network solutions over intelligent network services to achieve effective performance, scalability, and availability, you will benefit from the foundation information presented in this book. This comprehensive book provides detailed information and easy-to-grasp tutorials on a broad range of topics related to architecture and design, including security, fine-tuning routing protocols, switching structures, and IP multicasting. …”
    Libro electrónico
  6. 38466
    por Hart, Johnson M., 1944-
    Publicado 2005
    “…In keeping the GUI focus to a minimum, Hart's book is able to be comprehensive on the topics contained within." –Michael Davidson, IT Analyst Windows System Programming, Third Edition gives a solid grounding on using the core Windows APIs, includingWin64; is updated for Windows Server 2003, Windows XP, and the Microsoft Visual Studio .NET Framework, and has extensive exa..…”
    Libro electrónico
  7. 38467
    Publicado 2002
    “…In its coverage of advanced topics, Solaris 8 Administrator's Guide offers examples of configuration files and the installation of third-party software packages. This comprehensive book also contains more conceptual and difficult material that is absent from other Solaris reference manuals. …”
    Libro electrónico
  8. 38468
    por Bishop, Matt
    Publicado 2005
    “…Coverage includes Confidentiality, integrity, and availability Operational issues, cost-benefit and risk analyses, legal and human factors Planning and implementing effective access control Defining security, confidentiality, and integrity policies Using cryptography and public-key systems, and recognizing their limits Understanding and using authentication: from passwords to biometrics Security design principles: least-privilege, fail-safe defaults, open design, economy of mechanism, and more Controlling information flow through systems and networks Assuring security throughout the system lifecycle Malicious logic: Trojan horses, viruses, boot sector and executable infectors, rabbits, bacteria, logic bombs--and defenses against them Vulnerability analysis, penetration studies, auditing, and intrusion detection and prevention Applying security principles to networks, systems, users, and programs Introduction to Computer Security is adapted from Bishop's comprehensive and widely praised book, Computer Security: Art and Science. …”
    Libro electrónico
  9. 38469
    Publicado 2002
    “…"This is a complete, comprehensive, and most of all, practical book. The author excels at sharing his vast expertise so web developers can make the most out of JavaServer Pages and related web technologies." …”
    Libro electrónico
  10. 38470
    por Deitel, Paul J.
    Publicado 2008
    “…Visit www.deitel.com to: Download code examples Check out the growing list of programming, Web 2.0, and software-related Resource Centers To receive updates on this book, subscribe to the free DEITEL ® BUZZ ONLINE e-mail newsletter at www.deitel.com/newsletter/subscribe.html Read archived Issues of the DEITEL BUZZ ONLINE Contact deitel@deitel.com for information on corporate training courses delivered on-site worldwide Pre-Publication Reviewer Testimonials "This book is easily the most comprehensive resource of its kind I've seen yet." --Jesse James Garrett, Adaptive Path "A one-stop shop for learning the essentials of web programming." …”
    Libro electrónico
  11. 38471
    Publicado 2007
    “…Each chapter begins with a brief architectural overview of a key SQL Server component, then drills down into the most common problems users encounter, offering specific guidance on investigating and resolving them. You’ll find comprehensive, in-depth chapters on • Waiting and blocking • Data corruption and recovery • Memory • Procedure cache issues • Query processing • Server crashes and other critical failures • Service Broker • SQLOS and scheduling • tempdb • Clustering This is the indispensable resource for everyone who must keep SQL Server running smoothly: DBAs, database application developers, API programmers, and Web developers alike. …”
    Libro electrónico
  12. 38472
    por Henderson, Ken
    Publicado 2002
    “…Blending theoretical detail with practical application, this comprehensive reference begins with a foundational overview of SQL Server(TM) stored procedure programming. …”
    Libro electrónico
  13. 38473
    por Henderson, Ken
    Publicado 2000
    “…Moving on to more advanced topics, the journey continues with in-depth coverage of: Transact-SQL performance tuning using tools such as Query Analyzer and Performance Monitor Nuances of the various T-SQL data types Complex statistical calculations such as medians, modes, and sliding aggregates Run, sequence, and series identification and interrogation Advanced Data Definition Language (DDL) and Data Management Language (DML) techniques Stored procedure and trigger best practices and coding methods Transaction management Optimal cursor use and caveats to look out for Full-text search Hierarchies and arrays Administrative Transact-SQL OLE Automation More than 100 undocumented commands and language features, including numerous unpublished DBCC command verbs, trace flags, stored procedures, and functions Comprehensive, written in understandable terms, and full of practical information and examples, The Guru's Guide to Transact-SQL is an indispensable reference for anyone working with this database development language. …”
    Libro electrónico
  14. 38474
    por Klevinsky, T. J.
    Publicado 2002
    “…The latest information on the necessary hardware for performing penetration testing, as well as an extensive reference on the available security tools, is included. Comprehensive in scope Hack I.T. provides in one convenient resource the background, strategies, techniques, and tools you need to test and protect your system--before the real hackers attack. …”
    Libro electrónico
  15. 38475
    por Reilly, David
    Publicado 2002
    “…An accelerated guide to networking API, JavaTM Network Programming and Distributed Computing also serves as a comprehensive, example-rich reference. You will learn to maximize the API structure through in-depth coverage of: The architecture of the Internet and TCP/IP Java’s input/output system How to write to clients and servers using the User Datagram Protocol (UDP) and TCP The advantages of multi-threaded applications How to implement network protocols and see examples of client/server implementations HTTP and how to write server-side Java applications for the Web Distributed computing technologies such as Remote Method Invocation (RMI) and CORBA How to access e-mail using the extensive and powerful JavaMailTM API This book’s coverage of advanced topics such as input/output streaming and multi-threading allows even the most experienced Java developers to sharpen their skills. …”
    Libro electrónico
  16. 38476
    por Onion, Fritz
    Publicado 2003
    “…It has a straightforward style and is comprehensive.” — DARYL RICHTER , software architect “This book greatly improves the understanding of ASP.NET. …”
    Libro electrónico
  17. 38477
    Publicado 2004
    “…What makes Monson-Haefel a master of technical authoring can be seen in his well-thought-out and logical progression of ideas, and in his examples practical, precise, usable examples, large enough to test key concepts but still small enough to be comprehensible taken apart and explained in the detail you need to deploy those principles in other situations. …”
    Libro electrónico
  18. 38478
    por Bollapragada, Vijay
    Publicado 2000
    “…Beyond understanding the Cisco IOS command set, comprehending what happens inside Cisco routers will help you as a network designer or engineer to perform your job more effectively. …”
    Libro electrónico
  19. 38479
    por Monson-Haefel, Richard
    Publicado 2004
    “…Bruce Scharlau Department of Computing Science University of Aberdeen, Scotland “Richard Monson-Haefel provides the most comprehensive analysis of J2EE Web services that I’ve seen so far to date. …”
    Libro electrónico
  20. 38480
    por Clark, Tom, 1947 August 12-
    Publicado 2003
    “…The new Fibre Channel, IP, and virtualization initiatives covered in this work will enable customers to implement comprehensive shared storage solutions that reduce management overhead and cost." …”
    Libro electrónico