Книги жанра зарубежная компьютерная литература: скачать бесплатно или читать онлайн в электронной библиотеке Fantasy Worlds Страница 192
Вы не авторизовались
Войти
Зарегистрироваться

Книги жанра зарубежная компьютерная литература

Mastering Delphi 6
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

Still the Best Delphi Resource A Fully Revised Version of the Book That Won the Delphi Informant Readers Choice Award If you're looking to capitalize on the powerful capabilities of the latest release of Delphi, Mastering Delphi 6 is the one resource you can't do without. Practical, tutorial-based coverage helps you develop key skills, solve tough problems, and build and implement sophisticated fu…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Hack Attacks Revealed. A Complete Reference with Custom Security Hacking Toolkit
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

The #1 menace for computer systems worldwide, network hacking can result in mysterious server crashes, data loss, and other problems that are not only costly to fix but difficult to recognize. Author John Chirillo knows how these can be prevented, and in this book he brings to the table the perspective of someone who has been invited to break into the networks of many Fortune 1000 companies in ord…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Technology Scorecards. Aligning IT Investments with Business Performance
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

Plan, execute, and sustain a successful IT campaign with Sam Bansal's perfect scorecard approach First came the dot.com bust, then the IT squeeze. Despite software being the tail that wags the dog in most corporations, the cham-pions of IT, the CIOs, are constantly under fire to justify and maximize their IT investments—past, present, and future. Learn how to establish Key Performance Indicators a…

Добавленo: Рейтинг: 3 Комментариев 0 шт.
Service Providers. ASPs, ISPs, MSPs, and WSPs
Добавить В библиотекуАвторизуйтесь, чтобы добавить
4
Аннотация на книгу:

A strategic guide to mastering service provider relationships Well-known business management consultant and Boston Globe columnist Mary Helen Gillespie helps business and IT managers navigate through the confusing technology-driven landscape of service providers. Offering insight into the points of view for both the service provider and client, Gillespie guides readers through available services, …

Добавленo: Рейтинг: 4 Комментариев 0 шт.
Linux Security. Craig Hunt Linux Library
Добавить В библиотекуАвторизуйтесь, чтобы добавить
4
Аннотация на книгу:

Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators This is the most complete, most advanced guide to Linux security you'll find anywhere. Written by a Linux security expert with over a decade of experience, Linux Security teaches you, step-by-step, all the standard and advanced techniques you need to know to keep your Linux environment safe from threat…

Добавленo: Рейтинг: 4 Комментариев 0 шт.
Effective GUI Testing Automation. Developing an Automated GUI Testing Tool
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

Have you tried using an «automated» GUI testing tool, only to find that you spent most of your time configuring, adjusting, and directing it? This book presents a sensible and highly effective alternative: it teaches you to build and use your own truly automated tool. The procedure you'll learn is suitable for virtually any development environment, and the tool allows you to store your test data a…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
UNIX Filesystems. Evolution, Design, and Implementation
Добавить В библиотекуАвторизуйтесь, чтобы добавить
4
Аннотация на книгу:

Covers all versions of UNIX, as well as Linux, operating systems that are used by the majority of Fortune 1000 companies for their mission-critical data Offers more detail than other books on the file input/output aspects of UNIX programming Describes implementation of UNIX filesystems over a thirty year period Demonstrates VERITAS and other filesystem examples

Добавленo: Рейтинг: 4 Комментариев 0 шт.
Hack Attacks Testing. How to Conduct Your Own Security Audit
Добавить В библиотекуАвторизуйтесь, чтобы добавить
4
Аннотация на книгу:

Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities and close the holes before someone gets…

Добавленo: Рейтинг: 4 Комментариев 0 шт.
The Mac OS X Command Line. Unix Under the Hood
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

The Mac command line offers a faster, easier way to accomplish many tasks. It's also the medium for many commands that aren't accessible using the GUI. The Mac OS X Command Line is a clear, concise, tutorial-style introduction to all the major functionality provided by the command line. It's also packed with information the experienced users need, including little-known shortcuts and several chapt…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Network Services Investment Guide. Maximizing ROI in Uncertain Times
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

This first-ever valuation guide shows how to select and manage network-based services to ensure maximum return on investment Explains how to manage the costs and tradeoffs between distributed and centralized management structures Shows how to avoid risking too much for too little return due to unpredictable overall market conditions Covers network-based services such as Internet access, applicatio…

Добавленo: Рейтинг: 3 Комментариев 0 шт.
Java Enterprise Design Patterns. Patterns in Java
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

A how-to guide for Java programmers who want to use design patterns when developing real-world enterprise applications This practical book explores the subject of design patterns, or patterns that occur in the design phase of a project's life cycle. With an emphasis on Java for the enterprise, Mark Grand guides Java programmers on how to apply traditional and new patterns when designing a large en…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services. An Advanced Guide for VPLS and VLL
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

A guide to designing and implementing VPLS services over an IP/MPLS switched service provider backbone Today's communication providers are looking for convenience, simplicity, and flexible bandwidth across wide area networks-but with the quality of service and control that is critical for business networking applications like video, voice and data. Carrier Ethernet VPN services based on VPLS makes…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Design for Reliability. Information and Computer-Based Systems
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

System reliability, availability and robustness are often not well understood by system architects, engineers and developers. They often don't understand what drives customer's availability expectations, how to frame verifiable availability/robustness requirements, how to manage and budget availability/robustness, how to methodically architect and design systems that meet robustness requirements, …

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Practical Database Programming With Visual C#.NET
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

A novel approach to developing and applying databases with Visual C#.NET Practical Database Programming with Visual C#.NET clearly explains the considerations and applications in database programming with Visual C#.NET 2008 and in developing relational databases such as Microsoft Access, SQL Server, and Oracle Database. Sidestepping the traditional approach of using large blocks of code, Ying Bai …

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Design of Multithreaded Software. The Entity-Life Modeling Approach
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

This book assumes familiarity with threads (in a language such as Ada, C#, or Java) and introduces the entity-life modeling (ELM) design approach for certain kinds of multithreaded software. ELM focuses on «reactive systems,» which continuously interact with the problem environment. These «reactive systems» include embedded systems, as well as such interactive systems as cruise controllers and aut…

Добавленo: Рейтинг: 3 Комментариев 0 шт.