Kirjojen hintavertailu. Mukana 11 342 296 kirjaa ja 12 kauppaa.

Kirjahaku

Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.

1000 tulosta hakusanalla Jason Bulmahn

Oracle9i JDBC Programming

Oracle9i JDBC Programming

Jason Price

Osborne/McGraw-Hill
2002
pokkari
This text covers how to use JDBC programs with the Oracle8i and 9i databases, including details on the Oracle extensions to JDBC. It demonstrates accessing a database from JDBC using examples and introduces JDeveloper, which provides a productive environment for developing Java programs.
UML: A Beginner's Guide

UML: A Beginner's Guide

Jason Roff

McGraw-Hill Professional
2002
nidottu
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Essential skills for first-time programmers!This easy-to-use book explains the fundamentals of UML. You'll learn to read, draw, and use this visual modeling language to create clear and effective blueprints for software development projects. The modular approach of this series--including drills, sample projects, and mastery checks--makes it easy to learn to use this powerful programming language at your own pace.
Oracle Database 10g SQL

Oracle Database 10g SQL

Jason Price

McGraw-Hill Professional
2004
nidottu
Offers comprehensive coverage of the latest specifications, features, and applications of Oracle Database 10G, explaining how to use SQL with an Oracle database, furnishing an overview of SQL *Plus, and discussing such topics as database objects, PL/SQL programming, database security, tuning, subqueries, and more. Original. (Intermediate)
Gunstream's Anatomy & Physiology Laboratory Textbook Essentials Version
This Essentials Version of the Anatomy & Physiology Laboratory Textbook presents the fundamentals of human anatomy and physiology in a manner that is appropriate for students in allied health programs such as practical nursing, radiologic technology, medical assisting, and dental assisting. These students usually take a one-semester course in human anatomy and physiology and need a laboratory text that provides coverage of the fundamentals without the clutter of excessive details and unneeded terminology.
Slipknot

Slipknot

Jason Arnopp

Ebury Press
2001
nidottu
"The only plan right now is to kill everybody" Joey Jordison, drummerIgnoring every rule in the book and more besides, Slipknot are a notoriously controversial band who combine a talent for outrage with their music. Reminiscent of the outlandishness of punk, 'nu metal' has become the fastest growing area in rock, with Slipknot selling over 2 million copies of their debut album. And yet Slipknot spit, swear and risk injury night after night in their extraordinary live performances. Incredibly, their apparel of masks and boiler suits, which they refuse to remove, means that their fans still do not know what they look like. Jason Arnopp, the first British journalist to interview Slipknot face to mask, describes the transformation of the Des Moines crew into unorthodox mega stars. Featuring an introduction by the legendary Gene Simmons of Kiss, this biography will be the first published on the band either in the UK or America and will include exclusive interviews and in-depth information on the mysterious nine masked men.
The DIY Music Manual

The DIY Music Manual

Jason Feehan; Randy Chertkow

Ebury Press
2009
pokkari
How do I get my music played on the radio? Do I really need my own website - can't I just use MySpace? How do I copyright and license my songs? The DIY Music Manual has the answers to these questions ... and more.Over the last couple of years, the face of independent music has changed completely. With the rise of websites such as MySpace and iTunes, digital radio stations, podcasts, band websites and online music stores, it has made music much easier to make, promote and distribute outside traditional channels. Whereas before it was a case of sending your band's demo tape to a record label and hoping for the best, now it's possible to cut out the middle man and make a success of your band without being signed. Clearly, concisely and with a dash of wit, The DIY Music Manual tells you exactly how to do that.
Brung Up Proper

Brung Up Proper

Jason Manford

Ebury Press
2012
pokkari
The is the tale of a cheeky little sod from Salford called Jason growing up surrounded by his properly funny and most definitely shameless family and his discovery that being funny might actually get him somewhere.
Welcome To Coolsville

Welcome To Coolsville

Jason Mordaunt

Vintage
2004
pokkari
Nine days is a long time in Coolsville. More than enough time for Dr. Kiely Flanagan to shop business mogul J.P. Gillespie to a scandal-hungry media, collect the bounty and split for the sun. Time enough, Marshall McLemon hopes, to secure the backing he needs for his online museum exhibit, getting him - work wise at any rate - out of boresville and into something real. Papa Charlie McCormack is racing against the clock to discover if Sister Jasmine Ylang-Ylang is the type of nun that goes in for celibacy or not, and the directors of the WentWest Inc, are anxious to see an end to the year-long plague visited upon them by the cyber-terror organisation known as Mantra.Whether any of them succeed is something else, as one thing depends on the other in this finely balanced, gripping and often hilarious satire.
Choke Chain

Choke Chain

Jason Donald

Vintage
2018
pokkari
'An exceptional debut' IndependentAlex is twelve, and he lives with his younger brother and his parents in a dirt-poor white neighbourhood in 1980s South Africa. He and Kevin are trying to grow up, while their mother, Grace, is simply trying to keep them safe. Apart from the usual lessons of childhood, the boys are finding out about deceit, petty crime and casual violence, and the person that's teaching them is their father. A devious, self-centred, volatile man, Bruce Thorne sees the world as a battleground where the winner is the one who throws the first punch. Ruling the family through fear, it is only when he abandons them for a teenage lover that their problems really begin.Exposing the rotten, insidious patterns of fathering that most societies still ignore, Choke Chain shows two boys struggling to find steady ground in a disintegrating household. Watching quietly as their mother diminishes in the black light of her husband, they learn that not all adults are right and true - that some have evil bred, or beaten, into them. Opening with a thunderstorm and hail 'the size of apricots', this extraordinary first novel is a series of emotional storms and aftershocks, with any brightness on the horizon shadowed by gathering dark. Beautifully written and intensely moving, the novel builds to the drama of its conclusion: the turbulence turning to frenzy and clearing, finally, to some redemptive light.
Out of Shadows

Out of Shadows

Jason Wallace

Vintage
2012
pokkari
For Robert Jacklin - packed off without warning to boarding school in Zimbabwe - everything is terrifyingly new. As Robert is drawn slowly into Ivan's destructive web, he begins to question things he'd always held true and, as Ivan's grip tightens, he finds himself caught up in something far more dangerous than he could have imagined.
Lords of the Horizons

Lords of the Horizons

Jason Goodwin

Vintage
1999
pokkari
An evocation of the power of the Ottoman Empire, which swelled and declined over a period of six centuries. The book charts its history from the first campaigns to the Charge of the Light Brigade, from the Crusades to the Dardanelles, and aims to bring to life details of Ottoman life.
The Basics of Cyber Warfare

The Basics of Cyber Warfare

Jason Andress; Steve Winterfeld

Syngress Media,U.S.
2012
nidottu
The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics and procedures, including computer network exploitation (CNE), attack (CNA) and defense (CND). Readers learn the basics of how to defend against espionage, hacking, insider threats, state-sponsored attacks, and non-state actors (such as organized criminals and terrorists). Finally, the book looks ahead to emerging aspects of cyber security technology and trends, including cloud computing, mobile devices, biometrics and nanotechnology. The Basics of Cyber Warfare gives readers a concise overview of these threats and outlines the ethics, laws and consequences of cyber warfare. It is a valuable resource for policy makers, CEOs and CIOs, penetration testers, security administrators, and students and instructors in information security.
Cyber Warfare

Cyber Warfare

Jason Andress; Steve Winterfeld

Syngress Media,U.S.
2013
nidottu
Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists. This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It probes relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Logical, physical, and psychological weapons used in cyber warfare are discussed. This text will appeal to information security practitioners, network security administrators, computer system administrators, and security analysts.
Java Cryptography Extensions

Java Cryptography Extensions

Jason R. Weiss

Morgan Kaufmann Publishers In
2004
nidottu
For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBM For many Java developers and software engineers, cryptography is an "on-demand" programming exercise, where cryptographic concepts are shelved until the next project requires renewed focus. But considerations for cryptography must be made early on in the design process and it’s imperative that developers know what kinds of solutions exist. One of Java’s solutions to help bridge the gap between academic research and real-world problem solving comes in the form of a well-defined architecture for implementing cryptographic solutions. However, to use the architecture and its extensions, it is important to recognize the pros and cons of different cryptographic algorithms and to know how to implement various devices like key agreements, digital signatures, and message digests, to name a few. In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesn’t overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the concepts covered within the book. No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE.
The Basics of Information Security

The Basics of Information Security

Jason Andress

Syngress Media,U.S.
2014
nidottu
As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. The Basics of Information Security gives you clear-non-technical explanations of how infosec works and how to apply these principles whether you're in the IT field or want to understand how it affects your career and business. The new Second Edition has been updated for the latest trends and threats, including new material on many infosec subjects.
Hedge Fund Governance

Hedge Fund Governance

Jason Scharfman

Academic Press Inc
2014
nidottu
Hedge Fund Governance: Evaluating Oversight, Independence and Conflicts summarizes the fundamental elements of hedge fund governance and principal perspectives on governance arguments. An authoritative reference on governance, it describes the tools needed for developing a flexible, comprehensive hedge fund governance analysis framework. Case studies and interviews with professional fund directors shine a bright light of pragmatism on this framework. The author’s global analysis of more than 5,000 hedge fund governance structures enables him to draw realistic conclusions about best practices. He also explores the value consequences of good vs. bad governance, estimating the actual dollar losses that can result from bad governance, as well as the operational and investment performance benefits of certain governance practices.
Building a Practical Information Security Program

Building a Practical Information Security Program

Jason Andress; Mark Leary

Syngress Media,U.S.
2016
nidottu
Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns with business objectives. The information provided enables both executive management and IT managers not only to validate existing security programs, but also to build new business-driven security programs. In addition, the subject matter supports aspiring security engineers to forge a career path to successfully manage a security program, thereby adding value and reducing risk to the business. Readers learn how to translate technical challenges into business requirements, understand when to "go big or go home," explore in-depth defense strategies, and review tactics on when to absorb risks. This book explains how to properly plan and implement an infosec program based on business strategy and results.
Liquid Acquisition Devices for Advanced In-Space Cryogenic Propulsion Systems
Liquid Acquisition Devices for Advanced In-Space Cryogenic Propulsion Systems discusses the importance of reliable cryogenic systems, a pivotal part of everything from engine propulsion to fuel deposits. As some of the most efficient systems involve advanced cryogenic fluid management systems that present challenging issues, the book tackles issues such as the difficulty in obtaining data, the lack of quality data and models, and the complexity in trying to model these systems. The book presents models and experimental data based on rare and hard-to-obtain cryogenic data. Through clear descriptions of practical data and models, readers will explore the development of robust and flexible liquid acquisition devices (LAD) through component-level and full-scale ground experiments, as well as analytical tools. This book presents new and rare experimental data, as well as analytical models, in a fundamental area to the aerospace and space-flight communities. With this data, the reader can consider new and improved ways to design, analyze, and build expensive flight systems.
Ephemeral Hunter-Gatherer Archaeological Sites

Ephemeral Hunter-Gatherer Archaeological Sites

Jason Thompson

Elsevier Science Publishing Co Inc
2016
nidottu
Archaeological Geophysics for Ephemeral Human Occupations: Focusing on the Small-Scale combines technological advances in near-surface geophysics with recent archaeological scholarship and underlying archaeological premises to provide a practical manual for guiding archaeo-geophysical research design. By proposing the amelioration of communication gaps between traditional and geophysical archaeologists, this book will foment dialogue and participate in bringing about new ways of thinking anthropologically about archaeological geophysics, especially in relation to prehistoric open-air ephemeral sites. Offering a way to begin a dialogue between archaeology and geophysics, Archaeological Geophysics for Ephemeral Human Occupations is an important reference for practicing professionals, instructors, and students in geophysics and anthropology/archaeology, as well as geology.
Implementing Digital Forensic Readiness

Implementing Digital Forensic Readiness

Jason Sachowski

Syngress Media,U.S.
2016
nidottu
Implementing Digital Forensic Readiness: From Reactive to Proactive Process shows information security and digital forensic professionals how to increase operational efficiencies by implementing a pro-active approach to digital forensics throughout their organization. It demonstrates how digital forensics aligns strategically within an organization’s business operations and information security’s program. This book illustrates how the proper collection, preservation, and presentation of digital evidence is essential for reducing potential business impact as a result of digital crimes, disputes, and incidents. It also explains how every stage in the digital evidence lifecycle impacts the integrity of data, and how to properly manage digital evidence throughout the entire investigation. Using a digital forensic readiness approach and preparedness as a business goal, the administrative, technical, and physical elements included throughout this book will enhance the relevance and credibility of digital evidence. Learn how to document the available systems and logs as potential digital evidence sources, how gap analysis can be used where digital evidence is not sufficient, and the importance of monitoring data sources in a timely manner. This book offers standard operating procedures to document how an evidence-based presentation should be made, featuring legal resources for reviewing digital evidence.