зарубежная компьютерная литература
Did you ever wish you could draw folks a picture of your business processes or the design of your database, but you just don’t have the graphics skills? Then Visio 2003 might be exactly what you’re looking for, and Visio 2003 For Dummies makes it eas…
Did you ever wish you could draw folks a picture of your business processes or the design of your database, but you just don’t have the graphics skills? Then Visio 2003 might be exactly what you’re looking for, and Visio 2003 For Dummies makes it eas…
The heart of the book provides the complete set of models that will support most of an organization's core business functions, including universal meta models for enterprise-wide systems, business meta data and data stewardship, portfolio management,…
The heart of the book provides the complete set of models that will support most of an organization's core business functions, including universal meta models for enterprise-wide systems, business meta data and data stewardship, portfolio management,…
Imagine that it’s the 1950s, and you are in charge of developing the U. S. interstate system. There are countless roads already in use. The system can go in numerous different directions. Where do you begin? Starting to transform your business with S…
Imagine that it’s the 1950s, and you are in charge of developing the U. S. interstate system. There are countless roads already in use. The system can go in numerous different directions. Where do you begin? Starting to transform your business with S…
Written by one of the leading experts in content management systems (CMS), this newly revised bestseller guides readers through the confusing-and often intimidating-task of building, implementing, running, and managing a CMS Updated to cover recent d…
Written by one of the leading experts in content management systems (CMS), this newly revised bestseller guides readers through the confusing-and often intimidating-task of building, implementing, running, and managing a CMS Updated to cover recent d…
On its own, C# simplifies network programming. Combine it with the precise instruction found in C# Network Programming, and you'll find that building network applications is easier and quicker than ever. This book helps newcomers get started with a l…
On its own, C# simplifies network programming. Combine it with the precise instruction found in C# Network Programming, and you'll find that building network applications is easier and quicker than ever. This book helps newcomers get started with a l…
Still the Best Delphi Resource A Fully Revised Version of the Book That Won the Delphi Informant Readers Choice Award If you're looking to capitalize on the powerful capabilities of the latest release of Delphi, Mastering Delphi 6 is the one resource…
Still the Best Delphi Resource A Fully Revised Version of the Book That Won the Delphi Informant Readers Choice Award If you're looking to capitalize on the powerful capabilities of the latest release of Delphi, Mastering Delphi 6 is the one resource…
WRITE BULLETPROOF VBA CODE FOR ANY SITUATION This book is the essential resource for developers working with any of the more than 300 products that employ the Visual Basic for Applications programming language. Written by recognized VBA experts, it p…
WRITE BULLETPROOF VBA CODE FOR ANY SITUATION This book is the essential resource for developers working with any of the more than 300 products that employ the Visual Basic for Applications programming language. Written by recognized VBA experts, it p…
The #1 menace for computer systems worldwide, network hacking can result in mysterious server crashes, data loss, and other problems that are not only costly to fix but difficult to recognize. Author John Chirillo knows how these can be prevented, an…
The #1 menace for computer systems worldwide, network hacking can result in mysterious server crashes, data loss, and other problems that are not only costly to fix but difficult to recognize. Author John Chirillo knows how these can be prevented, an…
What every IT manager and system administrator needs to know about the technology that drives the B2B marketplace The B2B marketplace is rapidly exploding–fast outpacing business-to-consumer e-commerce and expected to reach more than $7 trillion in s…
What every IT manager and system administrator needs to know about the technology that drives the B2B marketplace The B2B marketplace is rapidly exploding–fast outpacing business-to-consumer e-commerce and expected to reach more than $7 trillion in s…
Plan, execute, and sustain a successful IT campaign with Sam Bansal's perfect scorecard approach First came the dot.com bust, then the IT squeeze. Despite software being the tail that wags the dog in most corporations, the cham-pions of IT, the CIOs,…
Plan, execute, and sustain a successful IT campaign with Sam Bansal's perfect scorecard approach First came the dot.com bust, then the IT squeeze. Despite software being the tail that wags the dog in most corporations, the cham-pions of IT, the CIOs,…
A strategic guide to mastering service provider relationships Well-known business management consultant and Boston Globe columnist Mary Helen Gillespie helps business and IT managers navigate through the confusing technology-driven landscape of servi…
A strategic guide to mastering service provider relationships Well-known business management consultant and Boston Globe columnist Mary Helen Gillespie helps business and IT managers navigate through the confusing technology-driven landscape of servi…
Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators This is the most complete, most advanced guide to Linux security you'll find anywhere. Written by a Linux security expert with over a decade of experienc…
Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators This is the most complete, most advanced guide to Linux security you'll find anywhere. Written by a Linux security expert with over a decade of experienc…
Have you tried using an «automated» GUI testing tool, only to find that you spent most of your time configuring, adjusting, and directing it? This book presents a sensible and highly effective alternative: it teaches you to build and use your own tru…
Have you tried using an «automated» GUI testing tool, only to find that you spent most of your time configuring, adjusting, and directing it? This book presents a sensible and highly effective alternative: it teaches you to build and use your own tru…
Covers all versions of UNIX, as well as Linux, operating systems that are used by the majority of Fortune 1000 companies for their mission-critical data Offers more detail than other books on the file input/output aspects of UNIX programming Describe…
Covers all versions of UNIX, as well as Linux, operating systems that are used by the majority of Fortune 1000 companies for their mission-critical data Offers more detail than other books on the file input/output aspects of UNIX programming Describe…
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a m…
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a m…
Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible…
Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible…
The Mac command line offers a faster, easier way to accomplish many tasks. It's also the medium for many commands that aren't accessible using the GUI. The Mac OS X Command Line is a clear, concise, tutorial-style introduction to all the major functi…
The Mac command line offers a faster, easier way to accomplish many tasks. It's also the medium for many commands that aren't accessible using the GUI. The Mac OS X Command Line is a clear, concise, tutorial-style introduction to all the major functi…
This first-ever valuation guide shows how to select and manage network-based services to ensure maximum return on investment Explains how to manage the costs and tradeoffs between distributed and centralized management structures Shows how to avoid r…
This first-ever valuation guide shows how to select and manage network-based services to ensure maximum return on investment Explains how to manage the costs and tradeoffs between distributed and centralized management structures Shows how to avoid r…
A practical, nuts-and-bolts guide to architectural solutions that describes step-by-step how to design robustness and flexibility into an Internet-based system Based on real-world problems and systems, and illustrated with a running case study Enable…
A practical, nuts-and-bolts guide to architectural solutions that describes step-by-step how to design robustness and flexibility into an Internet-based system Based on real-world problems and systems, and illustrated with a running case study Enable…
A how-to guide for Java programmers who want to use design patterns when developing real-world enterprise applications This practical book explores the subject of design patterns, or patterns that occur in the design phase of a project's life cycle. …
A how-to guide for Java programmers who want to use design patterns when developing real-world enterprise applications This practical book explores the subject of design patterns, or patterns that occur in the design phase of a project's life cycle. …