Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering SAP NetWeaver PI - Administration
Mastering SAP NetWeaver PI - Administration

As the core middleware in your system landscape, SAP NetWeaver PI plays an enterprise-critical role. But how can you ensure smooth operation? This book answers your questions. Using a highly detailed scenario as an example, the authors guide you through all administration tasks and provide useful tips for your daily work.

...

Windows Server 2012 Unified Remote Access Planning and Deployment
Windows Server 2012 Unified Remote Access Planning and Deployment

DirectAccess, introduced in Windows Server 2008 R2, has been a ground breaking VPN-like connectivity solution, adopted by thousands of organizations worldwide. Allowing organizations to deploy without manually configuring every client and providing always-on connectivity has made this technology world-famous. Now, with Windows Server 2012,...

Flexible, Reliable Software: Using Patterns and Agile Development (Chapman & Hall/CRC Textbooks in Computing)
Flexible, Reliable Software: Using Patterns and Agile Development (Chapman & Hall/CRC Textbooks in Computing)

Flexible, Reliable Software: Using Patterns and Agile Development guides students through the software development process. By describing practical stories, explaining the design and programming process in detail, and using projects as a learning context, the text helps readers understand why a given...

Storage Area Networks: Designing and Implementing a Mass Storage System
Storage Area Networks: Designing and Implementing a Mass Storage System

The complete guide to SAN technology for every implementer and manager!

Every month, enterprises require more information, delivered faster, with greater reliability—and traditional data storage methods no longer suffice. Enter the Storage Area Network (SAN), which can store enormous...

Network Security Assessment: From Vulnerability to Patch
Network Security Assessment: From Vulnerability to Patch
This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks.

This is unique in that it details both the management and technical skill and tools
...
Game Engine Toolset Development
Game Engine Toolset Development
Toolset development is an extremely broad topic. Game Engine Toolset Development provides you with a core set of skills and a comprehensive insight that will aid you in the development of game engine utilities, significantly reducing the time period associated with the construction phase of a project. The book starts off with topics regarding...
VMware ESX Server in the Enterprise: Planning and Securing Virtualization Servers
VMware ESX Server in the Enterprise: Planning and Securing Virtualization Servers
VMware ESX Server in the Enterprise is the definitive, real-world guide to planning, deploying, and managing today’s leading virtual infrastructure platform in mission-critical environments.

 

Drawing on his extensive experience consulting on large-scale ESX Server implementations,...

PCI-X System Architecture
PCI-X System Architecture

The PCI-X bus will start appearing in advanced PCs within months, delivering breakthrough performance, transfer rates of up to 1.06 Gb/sec, and backward compatibility with the PCI standard. Now, there's a comprehensive guide to PCI-X, covering everything engineers and developers need to create robust, reliable PCI-X boards and software....

Instant Microsoft Forefront UAG Mobile Configuration Starter
Instant Microsoft Forefront UAG Mobile Configuration Starter

UAG provides your employees, clients, or partners secure remote access to your vital corporate resources, while delivering a seamless integration with your existing network environment. UAG is able to optimize content for different mobile devices, and is also able to publish complex applications in a simple manner. You are also able to...

Cisco® BGP-4 Command and Configuration Handbook (CCIE Professional Development)
Cisco® BGP-4 Command and Configuration Handbook (CCIE Professional Development)

As the means by which Internet destinations are communicated between subscribers and service providers, BGP-4 provides a critical function for Internet operations. Whether associated with Internet service providers or enterprise networks that depend heavily on the Internet, a background in BGP-4 is essential. Moving beyond...

Practical Perforce
Practical Perforce

When developers build software, they're able to keep track of all the different versions and all the components they use with software configuration management (SCM) systems. One of the more popular SCM products is Perforce.

Authored by Perforce's own VP of product technology, ...

Java and XML
Java and XML
Two hot topics come together in this developer's guide from Brett McLaughlin, Java and XML. Both Java and XML are cross-platform technologies; by using Java for code and XML for transporting data, you can build truly portable applications. This title is aimed at intermediate to advanced programmers; while XML topics are explained more or...
Result Page: 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy