Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Oracle RMAN Database Duplication
Oracle RMAN Database Duplication

RMAN is Oracle’s flagship backup and recovery tool, but did you know it’s also an effective database duplication tool? Oracle RMAN Database Duplication is a deep dive into RMAN’s duplication feature set, showing how RMAN can make it so much easier for you as a database administrator to satisfy the many requests from...

Beginning Fedora Desktop: Fedora 20 Edition
Beginning Fedora Desktop: Fedora 20 Edition

Beginning Fedora Desktop: Fedora 20 Edition is a complete guide to using the Fedora 20 Desktop Linux release as your daily driver for multimedia, productivity, social networking, the GNOME 3 desktop, administrative tasks, and more. Author and Linux expert Richard Petersen delves into the operating system as a whole and offers you a...

Microsoft IIS 6.0: Administrator's Pocket Consultant
Microsoft IIS 6.0: Administrator's Pocket Consultant

This precise pocket-sized guide delivers immediate answers for the day-to-day administration of Web servers running Microsoft Information Services (IIS) 6.0. Zero in on core IIS support procedures and everyday tasks using quick-reference tables, step-by-step instructions, and lists. You get the focused, streamlined information you need to...

Windows 7 Inside Out, Deluxe Edition
Windows 7 Inside Out, Deluxe Edition

By some measures, Windows 7 sets a new standard for usability. It needs less out-of-the-box tweaking and troubleshooting than any Windows version we’ve ever used. The arrangement of folders and files in Windows Explorer, basic system security, User Account Control settings, and numerous other default configuration options are...

Portable DBA: SQL Server
Portable DBA: SQL Server

Carry essential SQL Server administration information and troubleshooting techniques along with you so you can handle a wide variety of tasks on the spot. This handy resource offers fast access to administrative commands, syntax diagrams, error resolutions, best practices, and more. With coverage of the most commonly used SQL Server...

Solaris 8 System Administrator Exam Cram (Exam: 310-011, 310-012)
Solaris 8 System Administrator Exam Cram (Exam: 310-011, 310-012)
The perfect study companion for UNIX system professionals preparing for both Solaris 8 System Administrator exams. The book contains accurate and efficient coverage of the many new features of the Solaris 8 system including new support for Ipv6, LDAP, and DHCP, installs using Solaris Web Start, new Universal Disk Format (UDF) file system support,...
PHP 5 E-commerce Development
PHP 5 E-commerce Development

The popularity of online shopping has increased dramatically over the past few years. There are plenty of options available if you not are planning to build your own e-commerce solution but sometimes it's better to use your own solutions. It may be easy to find an e-commerce system but when it comes to extending it or using it you might...

Mastering PostgreSQL 11: Expert techniques to build scalable, reliable, and fault-tolerant database applications, 2nd Edition
Mastering PostgreSQL 11: Expert techniques to build scalable, reliable, and fault-tolerant database applications, 2nd Edition

Master the capabilities of PostgreSQL 11 to efficiently manage and maintain your database

Key Features

  • Master advanced concepts of PostgreSQL 11 with real-world datasets and examples
  • Explore query parallelism, data replication, and database performance while working with...
Exploring the JDS Linux Desktop
Exploring the JDS Linux Desktop
The ideal guide to JDS, Exploring the JDS Linux Desktop is clear and direct, and carefully covers such housekeeping chores as setting up networking, updates, and backups. It enters into great depth concerning the key productivity tools every user needs: email, web browsing, instant messaging, word processing,...
Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

Practical Guide to Linux Commands, Editors, and Shell Programming, A (2nd Edition)
Practical Guide to Linux Commands, Editors, and Shell Programming, A (2nd Edition)

For use with all versions of Linux, including Ubuntu,™ Fedora,™ openSUSE,™ Red Hat,® Debian, Mandriva, Mint, and now OS X, too!

  • Get more done faster, and become a true Linux guru by mastering the command line!
  • ...
Sun (R) Certified System Administrator for Solaris (TM) 10 Study Guide (Exams 310-200 & 310-202)
Sun (R) Certified System Administrator for Solaris (TM) 10 Study Guide (Exams 310-200 & 310-202)

Get the book that shows you not only what—but how—to study

  • 100% complete coverage of all official objectives for Sun Solaris exams CX-310-200 and CX-310-202
  • Exam Readiness Checklist at the front of the book--you're ready for the exam when all objectives on the list are checked off...
unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy