Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Virtualization with Microsoft Virtual Server 2005
Virtualization with Microsoft Virtual Server 2005
A virtual evolution in IT organizations throughout the world has begun. It is estimated that currently 3% of all servers run virtually and that number is expected to grow rapidly over the next 5 years. Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of...
JDBC 3: Java Database Connectivity
JDBC 3: Java Database Connectivity

JDBC 3.0 is the latest revision of Sun’s Java Database Connectivity API. Since its introduction on the market in the mid-90s, Java has evolved from a language and environment suited for applets to a rich enterprise platform. JDBC played a determinant role in Java’s maturation. JDBC is now used as a core technology...

Cisco CCNA Exam #640-507 Certification Guide (With CD-ROM)
Cisco CCNA Exam #640-507 Certification Guide (With CD-ROM)
The only Cisco-endorsed study guide for the new CCNA #640-507 examCoverage of all CCNA exam topics enables you to discover and fill your knowledge gaps before sitting the exam. You will learn about:Internetworking functions of each layer of the OSI reference model and how they are performed in network devicesDesign, implementation, configuration,...
Java 2 Micro Edition: Professional Developer's Guide
Java 2 Micro Edition: Professional Developer's Guide

The ultimate guide to programming handheld and embedded devices

Can Java be used effectively on small computing devices? Absolutely, says expert Eric Giguère, as he introduces Java™ 2 Micro Edition (J2ME)–the new release from Sun Microsystems designed specifically to run on small computing devices like cellular...

Wireless Security
Wireless Security
Get full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless...
Learning Machine Translation (Neural Information Processing)
Learning Machine Translation (Neural Information Processing)
The Internet gives us access to a wealth of information in languages we don't understand. The investigation of automated or semi-automated approaches to translation has become a thriving research field with enormous commercial potential. This volume investigates how machine learning techniques can improve statistical machine translation, currently...
MAC OS X UNIX Toolbox: 1000+ Commands for the Mac OS X
MAC OS X UNIX Toolbox: 1000+ Commands for the Mac OS X

Explore a ton of powerful Mac OS X UNIX commands

This handy, compact guide teaches you to use Mac OS X UNIX systems as the experts do: from the command line. Try out more than 1,000 commands to find and get software, monitor system health and security, and access network resources. Apply the skills you learn from this book to...

CCNA Security Course Booklet, Version 1.0
CCNA Security Course Booklet, Version 1.0

The Cisco CCNA Security curriculum provides a comprehensive overview of contemporary network security, helping Cisco Networking Academy students systematically prepare for the latest CCNA Security exam. While extensive online study resources are available, many students and instructors have requested a low-cost printed resource that can be...

SQL Server Tacklebox Essential tools and scripts for the day-to-day DBA
SQL Server Tacklebox Essential tools and scripts for the day-to-day DBA

For the day-to-day DBA, there are dangers around every corner; monsters waiting to strike down the unsuspecting database with a resource-hungry query, an inefficient data load, or even outright data corruption. When the worst happens, and SQL Server is down, or performance is suffering, customers are quick to complain.. During such difficult...

Next Generation Transport Networks: Data, Management, and Control Planes
Next Generation Transport Networks: Data, Management, and Control Planes

Covering past, present and future transport networks using three layered planes written by experts in the field.

Targeted at both practitioners and academics as a single source to get an understanding of how transport networks are built and operated

Explains technologies enabling the next generation transport...

How to Cheat at Securing Your Network (How to Cheat)
How to Cheat at Securing Your Network (How to Cheat)

Most Systems Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and...

Mastering Object-oriented Python
Mastering Object-oriented Python

For those who know the basics of object-oriented Python this book is a must-have. With 750 code samples and a relaxed tutorial approach, it’s the seamless route to more sophisticated programming.

Overview

  • Create applications with flexible logging, powerful configuration and command-line options,...
unlimited object storage image
Result Page: 350 349 348 347 346 345 344 343 342 341 340 339 338 337 336 335 334 333 332 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy