Installation and Configuration Guide for MicroStrategy 9.5


Book Description

The Installation and Configuration Guide includes information to install and configure MicroStrategy products on Windows, UNIX, Linux, and HP platforms, as well as basic maintenance guidelines.







Oracle DBA Automation Quick Reference


Book Description

With concise coverage of both Oracle 9i and Oracle 10g, this is the ideal reference for the professional DBA on how to use Perl to automate database tasks. The book covers language selection and concepts, including basic scripting concepts.







Domino System Administration


Book Description

This book speaks to the professional administrator who must set up, configure, maintain, and troubleshoot a multi-tasked network environment. Rob Kirkland attacks the technology at the professional level, with practical-hands-on assistance to get Domino 5 running.




Professional BlackBerry


Book Description

BlackBerrys enable users to stay connected with wireless access to e-mail, calendars, and corporate data; they have a phone and a Web browser in addition to other wireless features Written by a BlackBerry insider with assistance from Research in Motion, this book covers support topics ranging from setting up BlackBerry pilot programs to developing applications that let BlackBerry users access corporate data and systems remotely Key topics include how to deploy BlackBerrys within the organization, how to create push applications to extend the functionality of BlackBerrys, and how to implement new features of the latest BlackBerry Enterprise Server (BES) 4.0 Details rolling out BlackBerrys to users in an easy and controlled manner, planning for disaster recovery, and developing Web-based applications using mobile Web technology




Information Systems Security


Book Description

This book constitutes the refereed proceedings of the19th International Conference on Information Systems Security, ICISS 2023, held in Raipur, India, during December 16–20, 2023. The 18 full papers and 10 short papers included in this book were carefully reviewed and selected from 78 submissions. They are organized in topical sections as follows: systems security, network security, security in AI/ML, privacy, cryptography, blockchains.