Home | Amazing | Today | Tags | Publishers | Years | Search 
VMware ESX Server in the Enterprise: Planning and Securing Virtualization Servers
VMware ESX Server in the Enterprise: Planning and Securing Virtualization Servers
VMware ESX Server in the Enterprise is the definitive, real-world guide to planning, deploying, and managing today’s leading virtual infrastructure platform in mission-critical environments.

 

Drawing on his extensive experience consulting on large-scale ESX Server implementations,...

Expert F# (Expert's Voice in .Net)
Expert F# (Expert's Voice in .Net)
Expert F# is about practical programming in a beautiful language that puts the power and elegance of functional programming into the hands of .NET developers. In combination with .NET, F# achieves unrivaled levels of programmer productivity and program clarity. This books serves as
  • The authoritative guide to F# by the...
Tomcat: The Definitive Guide
Tomcat: The Definitive Guide
It takes a book as versatile as its subject to cover Apache Tomcat, the popular open source Servlet and JSP container and high performance web server. Tomcat: The Definitive Guide is a valuable reference for administrators and webmasters, a useful guide for programmers who want to use Tomcat as their web application server during...
Pro JavaScript Design Patterns
Pro JavaScript Design Patterns

As a web developer, you’ll already know that JavaScript™ is a powerful language, allowing you to add an impressive array of dynamic functionality to otherwise static web sites. But there is more power waiting to be unlocked--JavaScript is capable of full object-oriented capabilities, and by applying OOP principles, best practices,...

Web Application Vulnerabilities: Detect, Exploit, Prevent
Web Application Vulnerabilities: Detect, Exploit, Prevent
This book is about Web Application Hacking. The world-renowned authors teach the reader to use publicly available tools to conduct thorough assessments of web application. This assessment process provides the reader with an understanding of Web application vulnerabilities and how they are exploited. The book goes on to teach the reader to detect,...
Developing International Software for Windows 95 and Windows NT (Microsoft Programming Series)
Developing International Software for Windows 95 and Windows NT (Microsoft Programming Series)

In the late 1980s, Microsoft's International Product Group (IPG), the team responsible for creating most of the localized versions of Microsoft products, distributed a booklet internally that contained guidelines for writing code that accommodated the needs of international developers and users. The International Handbook for Software...

Implementing ITIL Configuration Management
Implementing ITIL Configuration Management
Practical, Real-World ITIL Configuration Management–From Start to Finish

 

The IT Infrastructure Library® (ITIL) places the “best practices” in IT operations at your command. ITIL helps you make better technology choices, manages IT more effectively,...

Fedora Linux Toolbox: 1000+ Commands for Fedora, CentOS and Red Hat Power Users
Fedora Linux Toolbox: 1000+ Commands for Fedora, CentOS and Red Hat Power Users

Explore a ton of powerful Fedora Linux commands

This handy, compact guide teaches you to use Fedora Linux as the experts do: from the command line. Try out over 1000 commands to find and get software, monitor system health and security, and access network resources. Apply skills you learn from this book to use and...

How to Cheat at Configuring VmWare ESX Server
How to Cheat at Configuring VmWare ESX Server
This book will detail the default and custom installation of VMwares ESX server as well as basic and advanced virtual machine configurations. It will then walk the reader through post installation configurations including installation and configuration of VirtualCenter. From here, readers will learn to efficiently create and deploy virtual machine...
A Practical Guide to Trusted Computing
A Practical Guide to Trusted Computing
Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable

 

Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed is secure hardware. The Trusted Platform Module (TPM) makes...

Ubuntu Linux Toolbox: 1000+ Commands for Ubuntu and Debian Power Users
Ubuntu Linux Toolbox: 1000+ Commands for Ubuntu and Debian Power Users

Explore a ton of powerful Ubuntu Linux commands

This handy, compact guide teaches you to use Ubuntu Linux as the experts do: from the command line. Try out over 1000 commands to find and get software, monitor system health and security, and access network resources. Apply skills you learn from this book to use and...

Todd Lammle's CCNA IOS Commands Survival Guide
Todd Lammle's CCNA IOS Commands Survival Guide
Let Todd Lammle help you master IOS commands for CCNA prep

To become a Cisco Certified Network Associate (CCNA), you must learn the hundreds of IOS commands used by Cisco routers and switches. This handy reference from Cisco networking authority Todd Lammle is just what you need to master those commands.

From a...

Result Page: 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy