Home | Amazing | Today | Tags | Publishers | Years | Search 
Cloud Computing Best Practices for Managing and Measuring Processes for On-demand Computing, Applications and Data Centers in the Cloud with SLAs
Cloud Computing Best Practices for Managing and Measuring Processes for On-demand Computing, Applications and Data Centers in the Cloud with SLAs
The evolution of managing Cloud Computing Services in principles and practices provided by the best practices IT Service Management framework provides the more holistic guidance needed for an industry that continues to mature and develop at a rapid pace.

Many organizations and individuals who had previously struggled
...
Web Performance Daybook Volume 2
Web Performance Daybook Volume 2

Performance is critical to the success of any website, and help with using today’s new tools is key. In this remarkable guide, 32 leading web performance experts offer practical tips, techniques, and advice for optimizing your site’s user experience.

Originally written for an online calendar, this collection...

Jenkins Continuous Integration Cookbook
Jenkins Continuous Integration Cookbook
Jenkins is a Java-based Continuous Integration (CI) server that supports the discovery of defects early in the software cycle. Thanks to over 400 plugins, Jenkins communicates with many types of systems, building and triggering a wide variety of tests.

CI involves making small changes to software, and then building and
...
Data Analysis and Decision Making
Data Analysis and Decision Making
With today’s technology, companies are able to collect tremendous amounts of data with relative ease. Indeed, many companies now have more data than they can handle. However, the data are usually meaningless until they are analyzed for trends, patterns, relationships, and other useful information. This book...
CCNA Wireless (640-722 IUWNE) Quick Reference
CCNA Wireless (640-722 IUWNE) Quick Reference

As a final exam preparation tool, the CCNA Wireless (640-722 IUWNE) Quick Reference provides a concise review of all objectives on the new exams.  The short eBook provides readers with detailed,...

Pro Website Development and Operations: Streamlining DevOps for large-scale websites (Professional Apress)
Pro Website Development and Operations: Streamlining DevOps for large-scale websites (Professional Apress)

Pro Website Development and Operations gives you the experience you need to create and operate a large-scale production website. Large-scale websites have their own unique set of problems regarding their design—problems that can get worse when agile methodologies are adopted for rapid results. Managing large-scale...

Pro Windows Phone 7 Development
Pro Windows Phone 7 Development
Authoring a book on mobile development with a title that starts with “Pro” is a daunting task. Put in too much introductory material and you lose the knowledgeable developer looking to take his application to the next level. Breeze through key concepts and the cross-platform professional mobile developer may struggle...
Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Getting Started with Windows 8 Apps: A Guide to the Windows Runtime
Getting Started with Windows 8 Apps: A Guide to the Windows Runtime
The personal computer (PC), which first hit the market over 30 years ago, has undergone tectonic changes that, in turn, launched the PC era. PCs were primarily used in the workplace where software was simple and optimized for use with the keyboard; touching a screen was unheard of until recently. Slowly computers...
Chemistry of Pyrotechnics: Basic Principles and Theory
Chemistry of Pyrotechnics: Basic Principles and Theory
Everyone has observed chemical reactions involving pyrotechnic mixtures. Beautiful 4th of July fireworks, highway distress signals, solid fuel boosters for the Space Shuttle, and the black powder used by muzzle-loading rifle enthusiasts all have a common technical background.

The chemical principles underlying
...
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Beyond Constructivism: Models and Modeling Perspectives on Mathematics Problem Solving, Learning, and Teaching
Beyond Constructivism: Models and Modeling Perspectives on Mathematics Problem Solving, Learning, and Teaching
This book evolved out of research that began more than 25 years ago, based on a National Science Foundation-supported project investigating the question: what is needed, beyond having a mathematical idea that enables students to use it in everyday problem-solving situations! (Lesh, Landau, & Hamilton, 1983). Large portions...
Result Page: 217 216 215 214 213 212 211 210 209 208 207 206 205 204 203 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy