Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Native Docker Clustering with Swarm
Native Docker Clustering with Swarm

Key Features

  • Get to grips with Docker Swarm, one of the key components of the Docker ecosystem.
  • Optimize Swarm and SwarmKit features for scaling massive applications through containers.
  • Learn about Docker’s scheduling tricks, high availability, security, and platform scalability.
  • ...
iOS 5 in the Enterprise (Develop and Design)
iOS 5 in the Enterprise (Develop and Design)

 

Those of you who have to deal with more than a handful of iPhones, iPads, or iPod Touches already know why you manage iOS devices. For everyone else, “manage” is not a short way to say “impose draconian control.” Managing devices on your network, including iOS devices,
...
BPEL PM and OSB Operational Management with Oracle Enterprise Manager 10g Grid Control
BPEL PM and OSB Operational Management with Oracle Enterprise Manager 10g Grid Control

In the SOA world, managing distributed services and service infrastructures is critical. Oracle Enterprise Manager - an all-encompassing management product - facilitates increased management capabilities for databases, application servers, and packaged applications. BPEL PM and OSB are two compelling, market leading products that are driving...

Sun Web Server: The Essential Guide
Sun Web Server: The Essential Guide

The authoritative, comprehensive guide to Sun Web Server 7.0

 

Sun Web Server is the secure web serving platform of choice for large-scale enterprises in industries from finance and telecommunications to travel and government. Now there’s a...

Microsoft Windows Security Fundamentals: For Windows 2003 SP1 and R2
Microsoft Windows Security Fundamentals: For Windows 2003 SP1 and R2
This is the first of two books serving as an expanded and up-dated version of Windows Server 2003 Security Infrastructures for Windows 2003 Server R2 and SP1 & SP2. The authors choose to encompass this material within two books in order to illustrate the intricacies of the different paths used to secure MS Windows server networks.
...
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws

Hack the planet

Web applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This innovative book shows you how they do it.

...

Deploying Node.js
Deploying Node.js

Learn how to build, test, deploy, monitor, and maintain your Node.js applications at scale

About This Book

  • Gain comprehensive information on scaling Node.js both vertically and horizontally in the cloud and across virtual machines
  • Learn how to use Gulp, Mocha, Chai, PhantomJS, Git,...
Microsoft Exchange Server 2003 24seven
Microsoft Exchange Server 2003 24seven
Advanced Coverage for Experienced Exchange Administrators

Microsoft Exchange Server 2003 24seven doesn't try to take you back to square one. Instead, it builds on the knowledge you've already earned. Expert Jim McBee with assistance from Barry Gerber delivers targeted instruction and inside tips that will help you...

Sun ONE Messaging Server: Practices and Techniques for Enterprise Customers
Sun ONE Messaging Server: Practices and Techniques for Enterprise Customers
The Sun™ ONE Messaging Server Practices and Techniques for Enterprise Customers book is published under the auspices of the Sun BluePrints™ program. This book is a collection of practices and techniques for deploying a messaging system. These practices and techniques have been gathered from many...
Mastering Microsoft Exchange Server 2007
Mastering Microsoft Exchange Server 2007

By utilizing the latest features of Microsoft Exchange Server 2007, you'll be able to provide your company with the security it needs while enabling employees to access critical information regardless of their location or type of device.

Now with this comprehensive guide, you'll find out how to effectively install, configure, and manage...

Pro Exchange Server 2013 Administration (Expert's Voice in Exchange)
Pro Exchange Server 2013 Administration (Expert's Voice in Exchange)

What you’ll learn

  • A comprehensive set of best practices for administering Exchange Server 2013 on a daily basis.
  • A thorough understanding of new features.
  • How to design and deploy new Exchange 2013 servers and upgrade existing Exchange servers to Exchange 2013.
  • Learn best...
Configuring Juniper Networks NetScreen & SSG Firewalls
Configuring Juniper Networks NetScreen & SSG Firewalls
Juniper Networks family of NetScreen and SSG Firewalls are second only to Cisco in worldwide unit sales. These devices are becoming increasingly sophisticated as threats to networks continue to grow exponentially. This is the essential reference for any IT professional responsible for configuring and managing the devices.

Configuring
...
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy