Home | Amazing | Today | Tags | Publishers | Years | Search 
Data Protection for Virtual Data Centers
Data Protection for Virtual Data Centers

Essential information on how to protect data in virtual environments!

Virtualization is changing the data center architecture and as a result, data protection is is quickly evolving as well. This unique book, written by an industry expert with over eighteen years of data storage/backup experience, shows you how to approach,...

Terminological Ontologies: Design, Management and Practical Applications
Terminological Ontologies: Design, Management and Practical Applications

Information infrastructures are integrated solutions based on the fusion of information and communication technologies. They are characterized by the large amount of data that must be managed accordingly. An information infrastructure requires an efficient and effective information retrieval system to provide access to the items stored in the...

BPEL PM and OSB Operational Management with Oracle Enterprise Manager 10g Grid Control
BPEL PM and OSB Operational Management with Oracle Enterprise Manager 10g Grid Control

In the SOA world, managing distributed services and service infrastructures is critical. Oracle Enterprise Manager - an all-encompassing management product - facilitates increased management capabilities for databases, application servers, and packaged applications. BPEL PM and OSB are two compelling, market leading products that are driving...

Foundation Flash Catalyst
Foundation Flash Catalyst

This book offers an introduction to Flash Catalyst for designers with intermediate to advanced skills. It discusses where Catalyst sits within the production process and how it communicates with other programs. It covers all of the features of the Flash Catalyst workspace, teaching you how to create designs from scratch, how to build...

Role-Based Access Control
Role-Based Access Control

Role-based access control (RBAC) is a technology that is attracting a great deal of attention, particularly for commercial applications, because of its potential for reducing the complexity and cost of security administration in large networked applications. Under RBAC, security administration is greatly simplified by using roles,...

Hackers and Painters: Big Ideas from the Computer Age
Hackers and Painters: Big Ideas from the Computer Age

"The computer world is like an intellectual Wild West, in which you can shoot anyone you wish with your ideas, if you're willing to risk the consequences. "
--from Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham

We are living in the computer age, in a world increasingly designed and...

Pro PHP and jQuery
Pro PHP and jQuery

This book is for intermediate programmers interested in building AJAX web applications using jQuery and PHP. Along with teaching some advanced PHP techniques, it will teach you how to take your dynamic applications to the next level by adding a JavaScript layer with jQuery.

  • Learn to utilize built-in PHP functions to build...
Foundation Flash CS5 For Designers
Foundation Flash CS5 For Designers

Flash is one of the most engaging, innovative, and versatile technologies available—allowing the creation of anything from animated banners and simple cartoons to Rich Internet Applications, interactive videos, and dynamic user interfaces for web sites, kiosks, devices, or DVDs. The possibilities are endless, and now it just got...

Zend Framework, A Beginner's Guide
Zend Framework, A Beginner's Guide

Essential Skills--Made Easy!

Leverage the power of the Zend Framework to supercharge your PHP development! Zend Framework: A Beginner's Guide covers key features, including model-view-controller implementation, routing, input validation, internationalization, and caching, and shows you how to use them in a practical...

80X86 IBM PC and Compatible Computers: Assembly Language, Design, and Interfacing Volumes I & II
80X86 IBM PC and Compatible Computers: Assembly Language, Design, and Interfacing Volumes I & II

Praised by experts for its clarity and topical breadth, this visually appealing, one-stop source on PCs uses an easy-to-understand, step-by-step approach to teaching the fundamentals of 80x86 assembly language programming and PC architecture. Offering users a fun, hands-on learning experience, it uses the Debug utility to show what action the...

JUnit in Action, Second Edition
JUnit in Action, Second Edition

When JUnit was first introduced a decade ago by Kent Beck and Erich Gamma, the Agile movement was in its infancy, "Test Driven Development" was unknown, and unit testing was just starting to move into the typical developer's vocabulary. Today, most developers acknowledge the benefits of unit testing and rely on the...

Control Engineering: A Guide for Beginners
Control Engineering: A Guide for Beginners

Automatic control is becoming more and more important in this age of automation. In manufacturing processes it ensures that certain parameters, such as temperature, pressure, speed cc voltage, take up specific constant values recognized as the optimum. or are maintained in a particular relationship to other variables. In other words, the duty...

Result Page: 602 601 600 599 598 597 596 595 594 593 592 591 590 589 588 587 586 585 584 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy