Home | Amazing | Today | Tags | Publishers | Years | Search 
Managing and Optimizing VMware vSphere Deployments
Managing and Optimizing VMware vSphere Deployments

In our experience as consultants, VMware vSphere is the most robust virtualization

solution on the market. The technology is proven and the user base is large.

Although the benefits of virtualization using vSphere are many, proper planning is required to gain these benefits from a vSphere
...
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Pro Application Lifecycle Management with Visual Studio 2012 (Professional Apress)
Pro Application Lifecycle Management with Visual Studio 2012 (Professional Apress)

You can have the best coders in the world working in your teams, but if your project management isn’t up to scratch, your project is almost certain to be delayed, to come in over budget, and in some cases to fail entirely. By taking precise control of your application development process, you can make changes, both large and small,...

DevOps for Developers
DevOps for Developers

DevOps for Developers delivers a practical, thorough introduction to approaches, processes and tools to foster collaboration between software development and operations. Efforts of Agile software development often end at the transition phase from development to operations. This book covers the delivery of software, this means...

Ethical Hacking and Countermeasures: Web Applications and Data Servers
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
CCIE Wireless Exam (350-050) Quick Reference
CCIE Wireless Exam (350-050) Quick Reference

With the introduction of wireless LAN (WLAN), IP networks are now also available for those applications on which wired technologies are not suitable or no wired connectivity is available at all. The following are a few wireless use cases:

  • Home ISP connectivity: Consumer products
  • Building-to-building...
Version Control with Git: Powerful tools and techniques for collaborative software development
Version Control with Git: Powerful tools and techniques for collaborative software development
Although some familiarity with revision control systems will be good background material, a reader who is not familiar with any other system will still be able to learn enough about basic Git operations to be productive in a short while. More advanced readers should be able to gain insight into some of Git’s...
Pro jQuery Mobile
Pro jQuery Mobile
jQuery Mobile is a new, simple to use, UI framework for building cross-platform Mobile Web applications. In a matter of minutes, you can create mobile applications (apps) that are optimized to run on nearly every phone, tablet, desktop, and e-reader device available today. That’s right, with a single jQuery Mobile codebase we...
Intuitive Analog Circuit Design
Intuitive Analog Circuit Design
What? Another textbook on analog circuit design? Well, this is not a textbook per se; rather, it is designed to be more of a design handbook for practicing engineers and students interested in learning more real-world techniques for designing and analyzing analog circuits using transistors, diodes, and operational amplifi ers. The...
PostgreSQL: Up and Running
PostgreSQL: Up and Running
PostgreSQL is an open source relational database management system that began as a University of California, Berkeley project. It was originally under the BSD license, but is now called the PostgreSQL License (TPL). For all intents and purposes, it’s BSD licensed. It has a long history, almost dating back to the beginning of...
Android Database Programming
Android Database Programming
Today, we live in an increasingly data-centric and data-driven world. We live in a world where companies like Amazon track every item we view and every item we purchase so as to recommend similar products to us. We live in a world where companies like Google store every search query thrown at them so as to recommend better search queries in...
An Introduction to IMS: Your Complete Guide to IBM Information Management System (2nd Edition)
An Introduction to IMS: Your Complete Guide to IBM Information Management System (2nd Edition)

IBM’s Definitive One-Stop Guide to IMS Versions 12, 11, and 10: for Every IMS DBA, Developer, and System Programmer

 

Over 90% of the top Fortune® 1000 companies rely on IBM’s Information Management System...

Result Page: 117 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy