Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for...
Workflow Management: Models, Methods, and Systems (Cooperative Information Systems)
Workflow Management: Models, Methods, and Systems (Cooperative Information Systems)
This book offers a comprehensive introduction to workflow management, the management of business processes with information technology. By defining, analyzing, and redesigning an organization's resources and operations, workflow management systems ensure that the right information reaches the right person or computer application at the right time....
Linux Recipes for Oracle DBAs (Recipes: a Problem-Solution Approach)
Linux Recipes for Oracle DBAs (Recipes: a Problem-Solution Approach)

Linux Recipes for Oracle DBAs is an example–based book on managing Oracle Database in a Linux environment. Covering commonly used distributions such as Red Hat Enterprise Linux and Oracle Enterprise Linux, the book is written for database administrators who need to get work done and lack the luxury of curling up fireside with a...

IT Service Management Guide: Vol. 1
IT Service Management Guide: Vol. 1
The importance of IT Service Management is becoming widely recognized. Whereas in the 1960s and 1970s interest was still focused mainly on the improvement of hardware, and whereas the development of software was the major concern until well into the 1980s, the 1990s was the decade that saw the rise of service management.

For decades,
...
Special Edition Using Enterprise JavaBeans (EJB) 2.0
Special Edition Using Enterprise JavaBeans (EJB) 2.0

Special Edition Using EJB 2.0 starts with a description of how EJB fits into the big picture of J2EE development, then covers such topics as:

* Locating EJB's using JNDI
* Managing data with EJB Query Language
* Building JMS applications using the new Message-driven Bean
* Planning EJB applications using design patterns...

Electronic Value Exchange: Origins of the VISA Electronic Payment System (History of Computing)
Electronic Value Exchange: Origins of the VISA Electronic Payment System (History of Computing)

Most anywhere in the developed world, I can use a small rectangular piece of plastic, issued to me by a bank I have never visited, to obtain local currency or purchase goods and services directly from a merchant. The cashier and I may not even speak a common language, and the face of my card may look quite different from those carried...

The Networked Supply Chain: Applying Breakthrough BPM Technology to Meet Relentless Customer Demands
The Networked Supply Chain: Applying Breakthrough BPM Technology to Meet Relentless Customer Demands
This cutting-edge book illustrates how to implement a new breakthrough BPM technology that makes the vision of the networked enterprise a reality. BPM is changing the competitive business landscape. This breakthrough technology provides businesses with the means to manage processes across systems, people, and organizations, providing...
Microsoft Money 2006 For Dummies (Computer/Tech)
Microsoft Money 2006 For Dummies (Computer/Tech)
Covers Premium, Deluxe, and Standard editions of Money

Use Money to save money, make money, manage money, and get your money's worth

Ever hear that it takes money to make money? Spend a little on this book and discover easy ways to set up accounts, do your banking online, research and track investments, make payments on time, even...

Cases on Information Technology Planning, Design and Implementation
Cases on Information Technology Planning, Design and Implementation
Information technology has reformed and restructured the inner workings of companies,
organizations and government agencies over the past several decades, and will
continue to do so well into the future. Managers and administrators are constantly in
search of new tools to be used in support of greater utilization and management of...
Sams Teach Yourself Networking in 24 Hours (3rd Edition)
Sams Teach Yourself Networking in 24 Hours (3rd Edition)
You can't go too far in technology these days without at least a casual understanding of data communications over local and wide-area networks (LANs and WANs). Sams Teach Yourself Networking in 24 Hours will clue you in on the seven-layer Open Systems Interconnect (OSI) networking abstraction and other key facts and concepts having to do...
Spring Persistence with Hibernate
Spring Persistence with Hibernate

Spring is the leading platform to build and run enterprise Java applications. Spring's Hibernate integration makes it easy to mix and match persistence methodologies simplifying your Hibernate applications. You can incorporate lots of Inversion of Control (IoC) convenience features to address many typical Hibernate integration issues,...

FairEconomy: Crises, Culture, Competition and the Role of Law (MPI Studies on Intellectual Property and Competition Law)
FairEconomy: Crises, Culture, Competition and the Role of Law (MPI Studies on Intellectual Property and Competition Law)

​FairEconomy is a concept for a free and fair market economy. In response to the financial and economic crises of the past years, the authors develop fundamental ideas of how a market economy works, what rules markets need and who safeguards fairness and equal opportunity in such an economy. The book sets out the...

unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy