Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
DBA Survivor: Become a Rock Star DBA
DBA Survivor: Become a Rock Star DBA

You hold in your hands a collection of insight and wisdom on the topic of database administration gained through many years of hard-won experience, long nights of study, and direct mentorship under some of the industry’s most talented database professionals and information technology (IT) experts.

Consider the standard...

Essential Windows NT System Administration
Essential Windows NT System Administration

Windows NT systems are often said to "manage themselves." This book is for those times when things don't quite work out that way, when somebody who knows what's going on needs to intervene.Essential Windows NT System Administration helps you manage Windows NT systems as productively as possible, making the...

Foot-and-Mouth Disease Virus (Current Topics in Microbiology and Immunology)
Foot-and-Mouth Disease Virus (Current Topics in Microbiology and Immunology)

Foot-and-mouth disease (FMD) has been recognized in printed records dating from the sixteenth century, and since the eradication of rinderpest (cattle plague) in the early part of the twentieth century it has been rec- nized as the most important and feared disease of cattle and other dom- tic livestock. The beginning of the twenty-first...

BlackBerry Enterprise Server for Microsoft® Exchange
BlackBerry Enterprise Server for Microsoft® Exchange
This book for IT professionals and network administrators describes installation, configuration and administration of BlackBerry Enterprise Server for Microsoft Exchange, with detailed information on planning and implementing BlackBerry Enterprise Server deployment. It also provides background information on the BlackBerry architecture, security,...
Securing & Optimizing Linux: The Hacking Solution
Securing & Optimizing Linux: The Hacking Solution
This 3rd edition of the very popular title "Securing & Optimizing Linux" looks for security measures that go beyond firewalls and intrusion detection systems to anticipate and protect against upcoming threats. Securing & Optimizing Linux: The Hacking Solution: A hacker's guide to protect your Linux server designed for system...
SQL Server MVP Deep Dives
SQL Server MVP Deep Dives

This is not an ordinary SQL Server Book. SQL Server MVP Deep Dives brings together the world's most highly-regarded SQL Server experts to create a masterful collection of tips, techniques, and experience-driven best practices for SQL Server development and administration. These SQL Server MVPs-53 in all-each selected a topic of...

Fenaroli's Handbook of Flavor Ingredients, Sixth Edition
Fenaroli's Handbook of Flavor Ingredients, Sixth Edition

The Industry Standard for 38 Years

Since publication of the first edition in 1971, Fenaroli’s Handbook of Flavor Ingredients has remained the standard reference for flavor ingredients throughout the world. Each subsequent edition has listed more flavor ingredients and allied...

XNA 3.1 Game Development for Teens
XNA 3.1 Game Development for Teens

XNA 3.0 GAME DEVELOPMENT FOR TEENS is a complete guide to entry level programming and computer game development using XNA 3.0 and the Visual C# 2008 Express programming language for beginners. This book shows readers how to create and execute computer games on their PC, and then how to port their PC games over to their Xbox 360 or Zune...

Mastering ElasticSearch
Mastering ElasticSearch

Extend your knowledge on ElasticSearch, and querying and data handling, along with its internal workings

Overview

  • Learn about Apache Lucene and ElasticSearch design and architecture to fully understand how this great search engine works
  • Design, configure, and distribute your index, coupled...
Accumulo: Application Development, Table Design, and Best Practices
Accumulo: Application Development, Table Design, and Best Practices

Get up to speed on Apache Accumulo, the flexible, high-performance key/value store created by the National Security Agency (Nsa) and based on Google’s BigTable data storage system. Written by former Nsa team members, this comprehensive tutorial and reference covers Accumulo architecture, application development, table design,...

Using and Administering Linux: Volume 3: Zero to SysAdmin: Network Services
Using and Administering Linux: Volume 3: Zero to SysAdmin: Network Services

Manage complex systems with ease and equip yourself for a new career. This book builds upon the skills you learned in Volumes 1 and 2 of this course and it depends upon the virtual network and virtual machine you created there. 

However, more experienced Linux users can begin with this volume and download an...

Microsoft  SharePoint  Products and Technologies Administrator's Pocket Consultant
Microsoft SharePoint Products and Technologies Administrator's Pocket Consultant

Get fast answers for the day-to-day administration of Windows SharePoint Services 3.0 and Office SharePoint Server 2007. Zero in on core support and maintenance tasks using quick-reference tables, instructions, and lists. You’ll get the precise information you need to get the job done-whether you’re at your desk or in the field!

...
unlimited object storage image
Result Page: 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy