Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering VMware vSphere Storage
Mastering VMware vSphere Storage

Monitor and optimize the storage capabilities of your vSphere environment

About This Book

  • Design a storage solution for your vSphere environment
  • Troubleshoot vSphere Storage performance problems
  • An advanced guide to vSphere Storage performance along with best practices to...
WarDriving: Drive, Detect, Defend: A Guide to Wireless Security
WarDriving: Drive, Detect, Defend: A Guide to Wireless Security

The term WarDriving originates from WarDialing, a term introduced to the public by Matthew Broderick's character, David Lightman, in the 1983 movie "WarGames." WarDialing is the practice of using a modem attached to a computer to dial an entire exchange of telephone numbers to locate any computers with modems attached to them....

Sex Magicians: The Lives and Spiritual Practices of Paschal Beverly Randolph, Aleister Crowley, Jack Parsons, Marjorie Cameron, Anton LaVey, and Others
Sex Magicians: The Lives and Spiritual Practices of Paschal Beverly Randolph, Aleister Crowley, Jack Parsons, Marjorie Cameron, Anton LaVey, and Others
An in-depth look at the lives and occult practices of 12 influential practitioners of sex magic from the 19th century to the present day

• Explores the background and sexual magical beliefs of Paschal Beverly Randolph, Ida Craddock, Aleister Crowley, Maria de Naglowska, Austin Osman Spare, Julius Evola, Franz Bardon,
...
Nokia Firewall, VPN, and IPSO Configuration Guide
Nokia Firewall, VPN, and IPSO Configuration Guide
The Only Book and Companion Web Site Covering Nokia's Firewall/VPN Appliances, which is the #3 security appliance worldwide.

"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its
...
Delivering Utility Computing: Business-driven IT Optimization
Delivering Utility Computing: Business-driven IT Optimization
Learn how to design and deploy utility computing systems to save costs and improve the value that IT delivers.

The economic downturn that occurred after the .com boom and bust has put the cost of IT in the spotlight.  By following the principles of utility computing, also known as on-demand computing, real-time...

Mind and the Cosmic Order: How the Mind Creates the Features & Structure of All Things, and Why this Insight Transforms Physics
Mind and the Cosmic Order: How the Mind Creates the Features & Structure of All Things, and Why this Insight Transforms Physics
The topic of this book is the relationship between mind and the physical world. From once being an esoteric question of philosophy, this subject has become a central topic in the foundations of quantum physics. The book traces this story back to Descartes, through Kant, to the beginnings of 20th Century physics, where it becomes clear...
Hacking the PSP: Cool Hacks, Mods, and Customizations for the Sony Playstation Portable
Hacking the PSP: Cool Hacks, Mods, and Customizations for the Sony Playstation Portable
You hold in your hand the Holy Grail for PSP aficionados—300 pages of ways to have even more fun with that little handheld powerhouse than the manufacturer intended. Use it as a hard drive. Surf the Web wirelessly. Play your own movies in the palm of your hand. Build your own battery pack. Run homebrew apps. And we're just getting started....
Data Quality: Concepts, Methodologies and Techniques (Data-Centric Systems and Applications)
Data Quality: Concepts, Methodologies and Techniques (Data-Centric Systems and Applications)
Poor data quality can seriously hinder or damage the efficiency and effectiveness of organizations and businesses. The growing awareness of such repercussions has led to major public initiatives like the "Data Quality Act" in the USA and the "European 2003/98" directive of the European Parliament.

Batini and...

Cryptography and Network Security: Principles and Practice (5th Edition)
Cryptography and Network Security: Principles and Practice (5th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Android Forensics: Investigation, Analysis and Mobile Security for Google Android
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
The Android mobile platform has quickly risen from its first phone in October 2008 to the most popular mobile operating system in the world by early 2011. The explosive growth of the platform has been a significant win for consumers with respect to competition and features. However, forensic analysts and security engineers have...
Net Crimes & Misdemeanors: Outmaneuvering Web Spammers, Stalkers, and Con Artists
Net Crimes & Misdemeanors: Outmaneuvering Web Spammers, Stalkers, and Con Artists
If you are reading this book or thinking about acquiring it, you have taken an important step toward increasing your awareness of the ways in which the Internet may be abused. J. A. Hitchcock has prepared a second edition of her popular book, Net Crimes and Misdemeanors, reflecting new ways in which you may encounter the dark side of global...
Cryptographic Security Architecture: Design and Verification
Cryptographic Security Architecture: Design and Verification
This book describes various aspects of cryptographic security architecture design, with a
particular emphasis on the use of rigorous security models and practices in the design. The
first portion of the book presents the overall architectural basis for the design, providing a
general overview of features such as the object model and
...
unlimited object storage image
Result Page: 31 30 29 28 27 26 25 24 23 22 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy