|
|
|
|
DB2(R) Universal Database V8 Handbook for Windows, UNIX, and LinuxIBM DB2 Universal Database V8 offers breakthrough availability, manageability, performance, and scalability. Now, straight from IBM, there's a start-to-finish guide to DB2 Universal Database V8 administration and development for UNIX, Linux, and Windows.
This definitive reference covers every aspect of deploying and managing DB2 Universal... | | Design, Deployment and Performance of 4G-LTE Networks: A Practical Approach
This book provides an insight into the key practical aspects and best practice of 4G-LTE network design, performance, and deployment
Design, Deployment and Performance of 4G-LTE Networks addresses the key practical aspects and best practice of 4G networks design, performance, and deployment. In addition, the book... | | |
|
Improving Web Application Security: Threats and CountermeasuresThis guide helps you to design, build, and configure hack-resilient Web applications. These are applications that reduce the likelihood of successful attacks and mitigate the extent of damage should an attack occur. This guide uses a three-layered approach: securing the network, securing the host, and securing the application. This guide... | | Pro OpenSSHSSH, or Secure Shell, is the de facto standard among users and administrators who wish to establish secure communication between disparate networks. This book is authored by a Fortune 100 system administrator, who will provide you with a highly practical reference for configuring and deploying OpenSSH in your own environment.
Some of the... | | The Rails Way (Addison-Wesley Professional Ruby Series)The expert guide to building Ruby on Rails applications
Ruby on Rails strips complexity from the development process, enabling professional developers to focus on what matters most: delivering business value. Now, for the first time, there’s a comprehensive,... |
|
|
|
|
Result Page: 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 |