Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Oracle Database Appliance
Practical Oracle Database Appliance

Practical Oracle Database Appliance is a hands-on book taking you through the components and implementation of the Oracle Database Appliance. Learn about architecture, installation, configuration, and reconfiguration.  Install and configure the Oracle Database Appliance with confidence. Make the right choices between the various...

Cisco ASA : All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Cisco ASA : All-in-One Firewall, IPS, and VPN Adaptive Security Appliance

The definitive insider's guide to planning, installing, configuring, and maintaining the new Cisco Adaptive Security Appliance

  • Delivers expert guidance from Cisco TAC engineers for securing small and medium business networks with the newly released Cisco all-in-one network security...

Smart Home Automation with Linux and Raspberry Pi
Smart Home Automation with Linux and Raspberry Pi

Smart Home Automation with Linux and Raspberry Pi shows you how to automate your lights, curtains, music, and more, and control everything via a laptop or mobile phone.

You'll learn how to use Linux, including Linux on Raspberry Pi, to control appliances and everything from kettles to curtains, including how to hack...

SAP HANA Cookbook
SAP HANA Cookbook

Your all-inclusive guide to understanding SAP HANA with practical recipes

Overview

  • Understand the architecture of SAP HANA, effectively transforming your business with the modeler and in-memory computing engine
  • Learn about Business Intelligence, Analytics, and Predictive analytics on top of...
Programming 8-bit PIC Microcontrollers in C: with Interactive Hardware Simulation
Programming 8-bit PIC Microcontrollers in C: with Interactive Hardware Simulation
Embedded microcontrollers are everywhere today. In the average household you will find them far beyond the obvious places like cell phones, calculators, and MP3 players. Hardly any new appliance arrives in the home without at least one controller and, most likely, there will be several—one microcontroller for the user interface (buttons and...
Implementing Netscaler VPX
Implementing Netscaler VPX

Leverage the features of NetScaler VPX™ to optimize and deploy responsive web services and applications on multiple virtualization platforms

Overview

  • Learn how to design, set up, and deploy Netscaler VPX in a virtual environment to make all your Web applications faster and secure
  • ...
Embedded Linux
Embedded Linux

Embedded Linux provides the reader the information needed to design, develop, and debug an embedded Linux appliance. It explores why Linux is a great choice for an embedded application and what to look for when choosing hardware.

...
Expert Oracle Exadata
Expert Oracle Exadata

Expert Oracle Exadata, 2nd Edition opens up the internals of Oracle's Exadata platform so that you can fully benefit from the most performant and scalable database hardware appliance capable of running Oracle Database. This edition is fully-updated to cover Exadata 5-2 and Oracle Database 12c. If you're new to Exadata,...

AsteriskNOW
AsteriskNOW
AsteriskNOW is an open-source software appliance from Digium: a customized Linux distribution, which includes Asterisk (the leading open-source telephony engine and tool kit), the AsteriskGUI, and all the other software needed for an Asterisk telephony system.

This book discusses the installation and configuration of the AsteriskNOW
...
Microsoft Forefront UAG 2010 Administrator's Handbook
Microsoft Forefront UAG 2010 Administrator's Handbook

The Israeli department of defence has one of the strictest information security guidelines in the world, and a part of these guidelines is the requirement to have complete physical separation between the public and internal networks. A regular firewall just won't do, and this requirement gave birth to the concept of the Air-Gap, a...

Cisco Security Professional's Guide to Secure Intrusion Detection Systems
Cisco Security Professional's Guide to Secure Intrusion Detection Systems

This book presents a combination of intrusion detection systems (IDS) and security theory, Cisco security models, and detailed information regarding specific Cisco-based IDS solutions. Cisco Security Professional’s Guide to Secure Intrusion Detection Systems also serves as a guide for security administrators studying for the Cisco...

The Berkeley DB Book (Books for Professionals by Professionals)
The Berkeley DB Book (Books for Professionals by Professionals)
The database technology landscape has been changing rapidly over the last few years. The server-based relational databases, which were so successful in solving the data-storage problem for traditional client/server and web-based applications, are no longer able to meet the requirements of newer applications, such as handheld devices,...
Result Page: 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy