Home | Amazing | Today | Tags | Publishers | Years | Search 
C++/CLI: The Visual C++ Language for .NET
C++/CLI: The Visual C++ Language for .NET
C++/CLI: The Visual C++ Language for .NET introduces Microsoft's new extensions to the C++ syntax that allow you to target the common language runtimethe key to the heart of the .NET 3.0 platform. In 12 no-fluff chapters, Microsoft insider Gordon Hogenson takes you into the core of the C++/CLI language and explains both how the language...
Guide to ILDJIT (SpringerBriefs in Computer Science)
Guide to ILDJIT (SpringerBriefs in Computer Science)

We are all familiar with the time-honored idea of a Virtual Machine that is neutral with respect to computer architecture and can be used to execute a high-level language, after its translation to the VM byte-code. This approach can be found in several successful mono-language systems, that support popular languages such as Java or...

Juniper MX Series
Juniper MX Series

Discover why routers in the Juniper MX Series, with their advanced feature sets and record breaking scale, are so popular among enterprises and network service providers. This authoritative book shows you step-by-step how to implement high-density, high-speed Layer 2 and Layer 3 Ethernet services, using Router Engine DDoS Protection,...

Todd Lammle's CCNA/CCENT IOS Commands Survival Guide: Exams 100-101, 200-101, and 200-120
Todd Lammle's CCNA/CCENT IOS Commands Survival Guide: Exams 100-101, 200-101, and 200-120

Your Guide to CCENT and CCNA IOS Commands

This book is an ideal supplement to Todd Lammle’s CCENT and CCNA Study Guides, and a great quick reference for any Cisco networking administrator. Covering IOS version 15, each chapter begins with a short introduction, explaining what tasks will be discussed, followed by...

CCNP Security FIREWALL 642-618 Quick Reference
CCNP Security FIREWALL 642-618 Quick Reference

As a final exam preparation tool, CCNP Security Firewall 642-618 Quick Reference...

Database Systems: The Complete Book (2nd Edition)
Database Systems: The Complete Book (2nd Edition)

Database Systems: The Complete Book is ideal for Database Systems and Database Design and Application courses offered at the junior, senior and graduate levels in Computer Science departments. A basic understanding of algebraic expressions and laws, logic, basic data structure, OOP concepts, and programming environments is implied....

First Course in Database Systems, A (3rd Edition)
First Course in Database Systems, A (3rd Edition)

At Stanford, we are on the quarter system, and as a result, our introductory database instruction is divided into two courses. The first, CS145, is designed for students who will use database systems but, not necessarily take a job im plementing a DBMS. It is a prerequisite for CS245, which is the introduction...

NX-OS and Cisco Nexus Switching: Next-Generation Data Center Architectures (Networking Technology)
NX-OS and Cisco Nexus Switching: Next-Generation Data Center Architectures (Networking Technology)

Cisco® Nexus switches and the new NX-OS operating system are rapidly becoming the new de facto standards for data center distribution/aggregation layer networking. NX-OS builds on Cisco IOS to provide advanced features that will be increasingly crucial to efficient data center operations. NX-OS and Cisco...

How to Use Lotus Notes 6
How to Use Lotus Notes 6
How to Use Lotus Notes R6 provides the beginning user with a straight-forward, visual approach to learning. It presents the most used tasks in an easy-to-follow manner, with simple directions using icons and full-color illustrations and graphics. Readers also find How-To Hints, which provide helpful shortcuts and tips for getting the most...
SSL Remote Access VPNs (Networking Technology: Security)
SSL Remote Access VPNs (Networking Technology: Security)
This book provides a complete guide to the SSL VPN technology and discusses its implementation on Cisco SSL VPN–capable devices. Design guidance is provided to assist you in implementing SSL VPNs in an existing network infrastructure. This includes examining existing hardware and software to determine whether they are SSL VPN capable,...
Nokia Firewall, VPN, and IPSO Configuration Guide
Nokia Firewall, VPN, and IPSO Configuration Guide
The Only Book and Companion Web Site Covering Nokia's Firewall/VPN Appliances, which is the #3 security appliance worldwide.

"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its
...
Virtual Machines: Versatile Platforms for Systems and Processes (The Morgan Kaufmann Series in Computer Architecture and Design)
Virtual Machines: Versatile Platforms for Systems and Processes (The Morgan Kaufmann Series in Computer Architecture and Design)
Virtual Machine technology applies the concept of virtualization to an entire machine, circumventing real machine compatibility constraints and hardware resource constraints to enable a higher degree of software portability and flexibility. Virtual machines are rapidly becoming an essential element in computer system design. They provide system...
Result Page: 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy