Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Novell Cluster Services for Linux and NetWare (Novell Press)
Novell Cluster Services for Linux and NetWare (Novell Press)

Need to configure or manage Novell Cluster Services on NetWare, Linux or a mixed environment? Pick up a copy of the official reference guide, Novell Cluster Services for Linux and NetWare. This book blends in-depth information with practical, real world examples to cover cluster services configuration...

Building Embedded Linux Systems
Building Embedded Linux Systems
There's a great deal of excitement surrounding the use of Linux in embedded systems -- for everything from cell phones to car ABS systems and water-filtration plants -- but not a lot of practical information. Building Embedded Linux Systems offers an in-depth, hard-core guide to putting together embedded systems based on Linux.
...
Network Infrastructure Security
Network Infrastructure Security
Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure...
Optimizing Sales and Distribution in SAP ERP: Functionality and Configuration
Optimizing Sales and Distribution in SAP ERP: Functionality and Configuration
Any company selling products or services must have the ability to efficiently fulfill orders and deliver their products and services. An integrated sales and distribu tion system enables them to create contracts and agreements, acknowledge order receipt, fulfill orders, and provide accurate invoices. In today's competitive envi...
KNIME Essentials
KNIME Essentials

Perform accurate data analysis using the power of KNIME

Overview

  • Learn the essentials of KNIME, from importing data to data visualization and reporting
  • Utilize a wide range of data processing solutions
  • Visualize your final data sets using KNIME’s powerful data...
Hyper-V Replica Essentials
Hyper-V Replica Essentials

For Windows Server administrators, Hyper-V Replica is the free disaster recovery tool that can transform system availability. This book is the ultimate guide, taking a totally practical, empirical approach to teaching best practices.

Overview

  • A practical step-by-step guide that goes beyond theory and...
Packet Filtering: Catching the Cool Packets
Packet Filtering: Catching the Cool Packets

This book covers the basic through advanced methods of filtering on hack traffic, ICMP traffic, IP fragments, subnet traffic and more. If you want to know how to build filters to capture specific application traffic based on its signature, this is the book for you. Includes instructions for capturing 'data theft' using signatures rather than...

Cisco ISP Essentials
Cisco ISP Essentials
A comprehensive guide to the best common practices for Internet service providersLearn the best common practices for configuring routers on the Internet from experts who helped build the InternetGain specific advice through comprehensive coverage of all Cisco routers and current versions of Cisco IOS SoftwareUnderstand the Cisco IOS tools essential...
Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation
Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation

Getting software released to users is often a painful, risky, and time-consuming process. This groundbreaking new book sets out the principles and technical practices that enable rapid, incremental delivery of high quality, valuable new functionality to users. Through automation of the build, deployment, and testing...

Mastering SAP NetWeaver PI - Administration
Mastering SAP NetWeaver PI - Administration

As the core middleware in your system landscape, SAP NetWeaver PI plays an enterprise-critical role. But how can you ensure smooth operation? This book answers your questions. Using a highly detailed scenario as an example, the authors guide you through all administration tasks and provide useful tips for your daily work.

...

Windows Server 2012 Unified Remote Access Planning and Deployment
Windows Server 2012 Unified Remote Access Planning and Deployment

DirectAccess, introduced in Windows Server 2008 R2, has been a ground breaking VPN-like connectivity solution, adopted by thousands of organizations worldwide. Allowing organizations to deploy without manually configuring every client and providing always-on connectivity has made this technology world-famous. Now, with Windows Server 2012,...

Flexible, Reliable Software: Using Patterns and Agile Development (Chapman & Hall/CRC Textbooks in Computing)
Flexible, Reliable Software: Using Patterns and Agile Development (Chapman & Hall/CRC Textbooks in Computing)

Flexible, Reliable Software: Using Patterns and Agile Development guides students through the software development process. By describing practical stories, explaining the design and programming process in detail, and using projects as a learning context, the text helps readers understand why a given...

unlimited object storage image
Result Page: 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy