Narrow your search

Library

KU Leuven (2)

LUCA School of Arts (2)

Odisee (2)

Thomas More Kempen (2)

Thomas More Mechelen (2)

UCLL (2)

ULB (2)

VIVES (2)

UGent (1)

ULiège (1)

More...

Resource type

book (3)


Language

English (3)


Year
From To Submit

2005 (3)

Listing 1 - 3 of 3
Sort by
Applied Microsoft analysis services 2005 and Microsoft Business Intelligence platform : a guide to the leading OLAP platform
Author:
ISBN: 0976635305 Year: 2005 Publisher: [Atlanta, Ga.] : [Chicago : Prologika Press ; Distributed by Independent Publishers Group],

Loading...
Export citation

Choose an application

Bookmark

Abstract

SQL server 2000 fast answers : for DBAs and developers
Author:
ISBN: 1280700203 9786610700202 1430200510 1590595920 Year: 2005 Publisher: Berkeley, CA : Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

SQL Server 2000 is the leading relational database for the Windows platform. It's a full-featured, enterprise-class database server, but its ease of use and maintenance makes it suitable whether youre a junior, part-time, or advanced database administrator or developer. SQL Server expert and author Joseph Sack covers all SQL Server 2000 features, so you'll be able to rely on this book when you're in the field and need quick, effective solutions. Included are hundreds of practical recipes that describe and demonstrate the utility of a feature or functionwith the minimum necessary background theory. This quick and effective reference highlights the specifics of every SQL Server command or process. Further, this special signature edition contains a searchable PDF of the book, making it ideal to use as both a desktop reference, and a client-site field guide.

Aggressive network self-defense
Author:
ISBN: 1931836205 9786611035808 0080488293 1281035807 1597490296 9781931836203 9781928994190 1928994199 9780080477190 0080477194 9781928994213 9781597490290 9780080488295 9786611053604 1281053600 Year: 2005 Publisher: Rockland, MA : Syngress Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark side of their tool box to identify, target, and suppress their adversaries. This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking, crimin

Listing 1 - 3 of 3
Sort by