Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Designing and Developing Scalable IP Networks
Designing and Developing Scalable IP Networks
Today's aggressively competitive networking market requires offering the maximum range of services using prevailing assets, not building bigger, more complicated networks, but smarter, more scalable infrastructures. It isn't an easy thing to do.

The challenge is to develop an existing network so as to maximise its...

Delphi/Kylix Database Development
Delphi/Kylix Database Development
The aim of this book is to teach cross-platform database programming to Delphi 6 or Kylix programmers. The book will assume the reader has a basic understanding of databases, such as what tables, rows, columns, fields, indexes, etc. are. It will also assume the reader has a working knowledge of Delphi and/or Kylix. A thorough investigation of...
Security in Sensor Networks
Security in Sensor Networks

Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities.

Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers,
...

Web Services Platform Architecture: SOAP, WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and More
Web Services Platform Architecture: SOAP, WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and More
The Insider's Guide to Building Breakthrough Services with Today's New Web Services PlatformUsing today's new Web services platform, you can build services that are secure, reliable, efficient at handling transactions, and well suited to your evolving service-oriented architecture. What's more, you can do all that without compromising the...
Art of Java Web Development: Struts, Tapestry, Commons, Velocity, JUnit, Axis, Cocoon, InternetBeans, WebWork
Art of Java Web Development: Struts, Tapestry, Commons, Velocity, JUnit, Axis, Cocoon, InternetBeans, WebWork
A guide to the skills required for state-of-the-art web development, this book covers a variety of web development frameworks. The uses of the standard web API to create applications with increasingly sophisticated architectures are highlighted, and a discussion of the development of industry-accepted best practices for architecture is...
ScreenOS Cookbook
ScreenOS Cookbook
Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and keep...
Designing Security Architecture Solutions
Designing Security Architecture Solutions
The first guide to tackle security architecture at the software engineering level

Computer security has become a critical business concern, and, as such, the responsibility of all IT professionals. In this groundbreaking book, a security expert with AT&T Business's renowned Network Services organization explores system security
...
vSphere Design Best Practices
vSphere Design Best Practices

Apply industry-accepted best practices to design reliable high-performance datacenters for your business needs with this book and ebook.

Overview

  • Learn how to utilize the robust features of VMware to design, architect, and operate a virtual infrastructure using the VMware vSphere platform
  • ...
Video Demystified, Fourth Edition (Demystifying Technology)
Video Demystified, Fourth Edition (Demystifying Technology)
This international bestseller and essential reference is the "bible" for digital video engineers and programmers worldwide. This is by far the most informative analog and digital video reference available, includes the hottest new trends and cutting-edge developments in the field.

Video Demystified, Fourth Edition is a
...
Comparing, Designing, and Deploying VPNs
Comparing, Designing, and Deploying VPNs

Virtual private networks (VPNs) enable organizations to connect offices or other sites over the Internet or a service provider network and allow mobile or home-based users to enjoy the same level of productivity as those who are in the same physical location as the central network. However, with so many flavors of VPNs available,...

The Value Factor: How Global Leaders Use Information for Growth and Competitive Advantage
The Value Factor: How Global Leaders Use Information for Growth and Competitive Advantage

Capitalizing on the information a company owns about its customers, suppliers and partners is now the value proposition for sustainable long-term growth. Authors Mark Hurd and Lars Nyberg go inside companies to see the value proposition in practice. Combining case studies and analysts’ insights with common sense and surprisingly simple...

php|architect's Guide to E-Commerce Programming with Magento
php|architect's Guide to E-Commerce Programming with Magento
This highly anticipated book will give you the insight you need to successfully manage and customize your Magento Commerce installation. php|architect's Guide to Programming with Magento takes you from installation to deployment of this popular e-commerce open source software. Magentos flexibility and Zend Framework-based structure have made it...
unlimited object storage image
Result Page: 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy