Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
IBM Cognos 8 Planning
IBM Cognos 8 Planning
Business planning is no longer just about defining goals, identifying critical issues, and then mapping out strategies. In today's dynamic and highly competitive business environment, companies with complex business models want their abstract strategies turned into discrete, executable plans. They want information from the field to reach decision...
Mobile Location Services: The Definitive Guide
Mobile Location Services: The Definitive Guide

Tomorrow's mobile applications must be smarter than ever, accessing and intelligently using a wide range of location data. In Mobile Location Services, leading mobile application consultant Andrew Jagoe presents the first end-to-end solutions guide to building and deploying location-based...

Deploying Wireless Networks
Deploying Wireless Networks
deployment cycle in cellular and broadband wireless networks, including OFDM-WiMAX/LTE

Wireless operators will find this practical, hands-on guide to network deployment invaluable. Based on their own extensive experience, the authors describe an end-to-end network planning process to deliver the guaranteed Quality of Service
...
The Definitive Guide to CentOS
The Definitive Guide to CentOS
CentOS is just like Red Hat, but without the price tag and with the virtuous license. When belts have to be tightened, we want to read about an OS with all the features of a commercial Linux variety, but without the pain. The Definitive Guide to CentOS is the first definitive reference for CentOS and focuses on CentOS alone, the workhorse...
IBM WebSphere DataPower SOA Appliance Handbook
IBM WebSphere DataPower SOA Appliance Handbook

Expert Guide to Deploying, Using, and Managing DataPower SOA Appliances

 

IBM® WebSphere® DataPower® appliances can simplify SOA deployment, strengthen SOA security, enhance SOA performance, and dramatically improve SOA return on...

OpenEdge Development: Progress 4GL Handbook
OpenEdge Development: Progress 4GL Handbook
This book is a comprehensive tour of all the essential elements of the Progress 4GL. The Progress 4GL remains by far the most powerful and comprehensive language for developing serious business applications. Combined with the Progress RDBMS(tm) database and the other components of the Progress OpenEdge(tm) product family, the Progress 4GL can...
NTP Security: A Quick-Start Guide
NTP Security: A Quick-Start Guide

Learn the risks associated with Network Time Protocol (NTP) security and how to minimize those risks while deploying and managing the protocol. You will be able to reduce the disruption of communication between servers on the network and the risk that the entire network will be taken offline.

NTP Security: A Quick-Start...

Implementing 802.1X Security Solutions for Wired and Wireless Networks
Implementing 802.1X Security Solutions for Wired and Wireless Networks
When deploying a wireless or wired network, you must ensure that proper security safeguards are put in place. An enterprise, for example, often has valuable resources stored inside databases that are attached to the network. Using passwords to access specific applications is usually not good enough to keep hackers from accessing the resources in an...
Pro iOS Continuous Integration
Pro iOS Continuous Integration

Pro iOS Continuous Integration teaches you how to utilize the strengths of continuous integration in your everyday work. CI is more popular now than ever, as iOS developers realize how time-consuming building and deploying an application for testing purposes and quality assurance can be. This book shows you how to make your...

Definitive MPLS Network Designs
Definitive MPLS Network Designs

The only design guide covering key MPLS technologies: MPLS VPNs, Pseudowires, QoS, Traffic Engineering, network recovery, IPv6, multicast

  • The definitive design guide for key MPLS technologies

  • Benefit from the authors' vast experience in...

Designing Secure Web-Based Applications for Microsoft(r) Windows(r) 2000
Designing Secure Web-Based Applications for Microsoft(r) Windows(r) 2000

Although numerous books on security are available, many of them cover only theory or perhaps a security silo—that is, an island of security based on a particular tool, application, or technology. It should be obvious that no complete security solution is a silo; all secure business applications touch many tools and many technologies. Also,...

Distributed Work
Distributed Work
Technological advances and changes in the global economy are motivating and enabling an increasing geographic distribution of work. Today, the geographic distance between an average pair of workers is increasing in industries ranging from banking, to wine production, to clothing design. According to Bureau of Labor surveys of workers, more people...
unlimited object storage image
Result Page: 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy