Home | Amazing | Today | Tags | Publishers | Years | Search 
Microsoft Hyper-V Cluster Design
Microsoft Hyper-V Cluster Design

The world of virtualization continues to expand, and the reach of Microsoft's  Hyper-V hypervisor continues to expand with it. This book seeks to reach beyond  simple, single-host hypervisor deployment, and provide guidance on clustering hosts  together for redundancy, performance, and more thorough utilization of...

IBM SPSS Modeler Cookbook
IBM SPSS Modeler Cookbook

Over 60 practical recipes to achieve better results using the experts' methods for data mining

Overview

  • Go beyond mere insight and build models than you can deploy in the day to day running of your business
  • Save time and effort while getting more value from your...
Software Defined Networking with OpenFlow
Software Defined Networking with OpenFlow

Get hands-on with the platforms and development tools used to build OpenFlow network applications

Overview

  • Get to grips with the essentials of OpenFlow and its ecosystem features
  • Thorough overview of OpenSource switches, controllers, and tools
  • Build your own laboratory and...
Microsoft SharePoint 2013 Disaster Recovery Guide
Microsoft SharePoint 2013 Disaster Recovery Guide

Learn everything you need to know to design and implement a solid disaster recovery plan for SharePoint 2013

Overview

  • Design, implement, test, and execute solid disaster recovery plans for your SharePoint environment with this essential guide
  • Learn outofthebox backup and restore...
Practical IPv6 for Windows Administrators
Practical IPv6 for Windows Administrators

Practical IPv6 for Windows Administrators is a handy guide to implementing IPv6 in a Microsoft Windows environment. This is the book you need if you are a Microsoft Windows Administrator confronted with IPv6 and in need of a quick resource to get up and going. The book covers the current state of IPv6 and its support in Microsoft...

Mastering ElasticSearch
Mastering ElasticSearch

Extend your knowledge on ElasticSearch, and querying and data handling, along with its internal workings

Overview

  • Learn about Apache Lucene and ElasticSearch design and architecture to fully understand how this great search engine works
  • Design, configure, and distribute your index, coupled...
Design Patterns for Embedded Systems in C: An Embedded Software Engineering Toolkit
Design Patterns for Embedded Systems in C: An Embedded Software Engineering Toolkit
The predominate language for the development of embedded systems is clearly C. Other languages certainly have their allure, but over 80% of all embedded systems are developed in this classic language. Many of the advances in the industry assume the use of object-oriented languages, web clients, and technologies that are either...
Fundamentals of Pervasive Information Management Systems
Fundamentals of Pervasive Information Management Systems

A comprehensive new edition on mobile computing—covering both mobile and sensor data

The new paradigm of pervasive computing was born from the needs of highly mobile workers to access and transfer data while on the go. Significant advances in the technology have lent and will continue to lend prevalence to its...

Beginning ArcGIS for Desktop Development using .NET
Beginning ArcGIS for Desktop Development using .NET

Get the very most out of the ArcGIS for Desktop products through ArcObjects and .NET

ArcGIS for Desktop is a powerful suite of software tools for creating and using maps, compiling, analyzing and sharing geographic information, using maps and geographic information in applications, and managing geographic databases. But...

Activity Recognition in Pervasive Intelligent Environments (Atlantis Ambient and Pervasive Intelligence)
Activity Recognition in Pervasive Intelligent Environments (Atlantis Ambient and Pervasive Intelligence)

This book consists of a number of chapters addressing different aspects of activity recognition, roughly in three main categories of topics. The first topic will be focused on activity modeling, representation and reasoning using mathematical models, knowledge representation formalisms and AI techniques. The second topic will concentrate on...

Everyday Cryptography: Fundamental Principles and Applications
Everyday Cryptography: Fundamental Principles and Applications

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the...

Professional Visual Basic 2012 and .NET 4.5 Programming
Professional Visual Basic 2012 and .NET 4.5 Programming

Explore Visual Basic 2012 and .NET 4.5 with this fully updated resource

After a quick review of the of introductory topics of Visual Basic 2012 and .NET 4.5, this book moves quickly into advanced topics such as data access with ADO.NET, security, ASP.NET web programming with Visual Basic, Windows workflow, and threading....

Result Page: 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy