Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cisco Catalyst QoS: Quality of Service in Campus Networks
Cisco Catalyst QoS: Quality of Service in Campus Networks

Quality of service (QoS) is the set of techniques designed to manage network resources. QoS refers to the capability of a network to provide better service to selected network traffic over various LAN and WAN technologies. The primary goal of QoS is to provide flow priority, including dedicated bandwidth, controlled jitter and...

Programming C#
Programming C#
C# is designed from the ground up for development on Microsoft's new .NET framework. As such, it's a high-performance language that's simple, safe, object-oriented, and Internet-centric. Programming C# teaches this new language in a way that experienced programmers will appreciate--by grounding its applications firmly in the context of...
Open-Source ESBs in Action
Open-Source ESBs in Action
Most modern business systems include independent applications that exchange information with each other-a technique usually called enterprise integration. An architectural approach called the Enterprise Service Bus (ESB) offers developers a way to handle the messages between those independent applications without creating a lot of custom code....
Bio-MEMS: Technologies and Applications
Bio-MEMS: Technologies and Applications
Microelectromechanical systems (MEMS) are evolving into highly integrated technologies for a variety of application areas. Add the biological dimension to the mix and a host of new problems and issues arise that require a broad understanding of aspects from basic, materials, and medical sciences in addition to engineering. Collecting the efforts of...
Software Development on a Leash (Expert's Voice)
Software Development on a Leash (Expert's Voice)

Software Development on a Leash is designed as a roadmap for experienced developers and architects who are interested in implementing a turbocharged software development process that encourages reuse and innovation. Author David Birmingham's products have been successfully deployed in a variety of venues, including...

The Scrumban [R]Evolution: Getting the Most Out of Agile, Scrum, and Lean Kanban (Agile Software Development Series)
The Scrumban [R]Evolution: Getting the Most Out of Agile, Scrum, and Lean Kanban (Agile Software Development Series)

Create Thriving, High-Performing Teams and Organizations with Scrumban

 

Scrumban allows you to use Kanban as a catalyst for increasingly valuable changes to your existing software development processes, amplifying and expanding upon Scrum’s...

Content Networking: Architecture, Protocols, and Practice (The Morgan Kaufmann Series in Networking)
Content Networking: Architecture, Protocols, and Practice (The Morgan Kaufmann Series in Networking)
"This book is an invaluable resource for anyone interested in understanding the rationale and technology driving the evolution of the Web. I especially liked the way the authors tie together the various elements and protocols that make up content distribution systems over the Web."
--Prof. Dr. Ralf Steinmetz, Head of Multimedia
...
The Red Gate Guide to SQL Server Team-based Development
The Red Gate Guide to SQL Server Team-based Development

Only small projects, relevant to very few people, are built by the sweat and toil of a lone developer. Larger projects, affecting whole organizations, will invariably require a team of people to design and develop the application and its storage layer, or database.

In some cases, this will mean some developers and one or two DBAs,...

Jenkins: The Definitive Guide
Jenkins: The Definitive Guide

This book is aimed at relatively technical readers, though no prior experience with Continuous Integration is assumed. You may be new to Continuous Integration, and would like to learn about the benefits it can bring to your development team. Or, you might be using Jenkins or Hudson already, and want to discover how you can...

Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

The Mental Health Professional and the New Technologies: A Handbook for Practice Today
The Mental Health Professional and the New Technologies: A Handbook for Practice Today
Technology, used for both informational and telecommunication purposes, is becoming one of the most important factors in the future of health care delivery. One can see the oncoming change simply by surfing the Internet and looking at the proliferation of health-related Web sites. The 7 million Web sites uncovered by the Alta Vista search engine...
SQL Server 2005 Reporting Essentials
SQL Server 2005 Reporting Essentials

SQL Server 2005 Reporting Services lets you create, manage, and deliver a variety of report types that contain data from relational and multidimensional data sources as well as any data source that has a .NET Framework managed data provider, an OLE DB data provider, or an ODBC provider.

You can create...

unlimited object storage image
Result Page: 63 62 61 60 59 58 57 56 55 54 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy