Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
PostgreSQL 10 High Performance: Expert techniques for query optimization, high availability, and efficient database maintenance
PostgreSQL 10 High Performance: Expert techniques for query optimization, high availability, and efficient database maintenance

Leverage the power of PostgreSQL 10 to design, administer and maintain a high-performance database solution

Key Features

  • Obtain optimal PostgreSQL 10 database performance, ranging from initial design to routine maintenance
  • Fine tune the performance of your queries and...
Understanding Social Dynamics in South Asia: Essays in Memory of Ramkrishna Mukherjee
Understanding Social Dynamics in South Asia: Essays in Memory of Ramkrishna Mukherjee

This volume includes fourteen essays by eminent sociologists in memory of Ramkrishna Mukherjee (1919–2017), the last of the founding architects of sociology in India. It also includes two interviews with Ramkrishna Mukherjee by senior sociologists. The essays cover a variety of themes and topics close to the works of...

Process-Driven Applications with BPMN
Process-Driven Applications with BPMN

How can we optimize differentiating business processes and exploit their full potential? Here Volker Stiehl provides answers, utilizing the various options that the BPMN (Business Process Model and Notation) standard offers for planning, implementing and monitoring processes.

The book presents an approach for implementing an...

HL7 for BizTalk
HL7 for BizTalk

HL7 for BizTalk provides a detailed guide to the planning and delivery of a HL7-compliant system using the dedicated Microsoft BizTalk for HL7 Accelerator. The HL7 Primary Standard, its various versions, and the use of the HL7 Accelerator for BizTalk are broken out and fully explained. HL7 for BizTalk provides clear guidance...

Pro SQL Server on Linux: Including Container-Based Deployment with Docker and Kubernetes
Pro SQL Server on Linux: Including Container-Based Deployment with Docker and Kubernetes
Get SQL Server up and running on the Linux operating system and containers. No database professional managing or developing SQL Server on Linux will want to be without this deep and authoritative guide by one of the most respected experts on SQL Server in the industry. Get an inside look at how SQL Server for Linux works through the...
Scalability Patterns: Best Practices for Designing High Volume Websites
Scalability Patterns: Best Practices for Designing High Volume Websites

In this book, the CEO of Cazton, Inc. and internationally-acclaimed speaker, Chander Dhall, demonstrates current website design scalability patterns and takes a pragmatic approach to explaining their pros and cons to show you how to select the appropriate pattern for your site. He then tests the patterns by deliberately...

Working with Microsoft® Visual Studio® 2005 Team System
Working with Microsoft® Visual Studio® 2005 Team System

Learn how to collaborate and streamline your development process using Visual Studio Team System.

This overview of Microsoft Visual Studio 2005 Team System offers practical information and role-based guidance to get key members of your software development team working together. With insights from the Visual Studio...

Pro .NET 2.0 Code and Design Standards in C#
Pro .NET 2.0 Code and Design Standards in C#
This is not a book that tells you what you should or shouldn’t do! So, in the immortal words
of Douglas Adams (www.douglasadams.com): “Don’t Panic!” Yes, it is a book on standards, but
the standards are not presented as a set of rules; rather, they are presented and explained as
a catalog of standard practices
...
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

Must-have guide for professionals responsible for securing credit and debit card transactions

As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking...

Protect Your Windows Network From Perimeter to Data
Protect Your Windows Network From Perimeter to Data
In this book, two senior members of Microsoft's Security and Business Technology Unit present a complete "Defense in Depth" model for protecting any Windows networkno matter how large or complex. Drawing on their work with hundreds of enterprise customers, they systematically address all three elements of a successful security...
Patterns in Network Architecture: A Return to Fundamentals
Patterns in Network Architecture: A Return to Fundamentals
Groundbreaking Patterns for Building Simpler, More Powerful Networks

 

In Patterns in Network Architecture, pioneer John Day takes a unique approach to solving the problem of network architecture. Piercing the fog of history, he bridges the gap between our experience from the...

Microsoft PerformancePoint 2007 For Dummies (Computer/Tech)
Microsoft PerformancePoint 2007 For Dummies (Computer/Tech)
Microsoft PerformancePoint provides you with an integrated performance management application that enables you to better plan, analyze and monitor how your business is doing. It gives decision-makers in your company more control. Microsoft PerformancePoint 2007 For Dummies® shows you how to utilize this powerful tool so you can gain...
unlimited object storage image
Result Page: 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy