Home | Amazing | Today | Tags | Publishers | Years | Search 
Expert Oracle Exadata
Expert Oracle Exadata

Expert Oracle Exadata, 2nd Edition opens up the internals of Oracle's Exadata platform so that you can fully benefit from the most performant and scalable database hardware appliance capable of running Oracle Database. This edition is fully-updated to cover Exadata 5-2 and Oracle Database 12c. If you're new to Exadata,...

The Toaster Project: Or a Heroic Attempt to Build a Simple Electric Appliance from Scratch
The Toaster Project: Or a Heroic Attempt to Build a Simple Electric Appliance from Scratch

Where do our things really come from? China is the most common answer, but Thomas Thwaites decided he wanted to know more. In The Toaster Project, Thwaites asks what lies behind the smooth buttons on a mobile phone or the cushioned soles of running sneakers. What is involved in extracting and processing materials? To answer these...

Embedded Linux
Embedded Linux

Embedded Linux provides the reader the information needed to design, develop, and debug an embedded Linux appliance. It explores why Linux is a great choice for an embedded application and what to look for when choosing hardware.

...
Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance (2nd Edition)
Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance (2nd Edition)

For organizations of all sizes, the Cisco ASA product family offers powerful new tools for maximizing network security. Cisco ASA: All-in-One Firewall, IPS, Anti-X and VPN Adaptive Security Appliance, Second Edition, is Cisco's authoritative practitioner's guide to planning, deploying, managing, and troubleshooting...

Citrix Access Gateway VPX 5.04 Essentials
Citrix Access Gateway VPX 5.04 Essentials

A practical step-by-step guide to provide secure remote access using the Citrix Access Gateway VPX

Overview

  • A complete administration companion guiding you through the complexity of providing secure remote access using the Citrix Access Gateway 5 virtual appliance.
  • Establish secure access...
Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security
Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security
Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.

Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the
...
Linux Appliance Design: A Hands-On Guide to Building Linux Appliances
Linux Appliance Design: A Hands-On Guide to Building Linux Appliances
Linux appliances are computers that serve a single, well-defined purpose. Modern appliances are complex machines, with processors, operating systems, and application software. For example, the Tivo is essentially a Linux-based computer with a single purpose: recording television. While there are books that tell readers how to run Linux on embedded...
Cisco ASA : All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Cisco ASA : All-in-One Firewall, IPS, and VPN Adaptive Security Appliance

The definitive insider's guide to planning, installing, configuring, and maintaining the new Cisco Adaptive Security Appliance

  • Delivers expert guidance from Cisco TAC engineers for securing small and medium business networks with the newly released Cisco all-in-one network security...

Practical Standards for Microsoft Visual Basic
Practical Standards for Microsoft Visual Basic

As members of a functional society, we adhere to standards every day of our lives. Often we don't think about these standards; rather, we take them for granted and apply them naturally. For instance, when you pull up to an intersection that's a four-way stop, you stop your car and check for cross-traffic. Once any cars already crossing the...

Cisco NAC Appliance: Enforcing Host Security with Clean Access (Networking Technology: Security)
Cisco NAC Appliance: Enforcing Host Security with Clean Access (Networking Technology: Security)
Almost every contemporary corporation and organization has acquired and deployed security solutions or mechanisms to keep its networks and data secure. Hardware and software tools such as firewalls, network-based intrusion prevention systems, antivirus and antispam packages, host-based intrusion prevention solutions, and...
Nokia Firewall, VPN, and IPSO Configuration Guide
Nokia Firewall, VPN, and IPSO Configuration Guide
The Only Book and Companion Web Site Covering Nokia's Firewall/VPN Appliances, which is the #3 security appliance worldwide.

"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its
...
Oracle Exadata Survival Guide (Expert's Voice in Oracle)
Oracle Exadata Survival Guide (Expert's Voice in Oracle)

Oracle Exadata Survival Guide is a hands-on guide for busy Oracle database administrators who are migrating their skill sets to Oracle's Exadata database appliance. The book covers the concepts behind Exadata, and the available configurations for features such as smart scans, storage indexes, Smart Flash Cache, hybrid columnar...

Result Page: 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy