Home | Amazing | Today | Tags | Publishers | Years | Search 
APM Best Practices: Realizing Application Performance Management (Books for Professionals by Professionals)
APM Best Practices: Realizing Application Performance Management (Books for Professionals by Professionals)

The objective of APM Best Practices: Realizing Application Performance Management is to establish reliable application performance management (APM) practices—to demonstrate value, to do it quickly, and to adapt to the client circumstances. It's important to balance long-term goals with short-term deliverables, but...

IPv6 for Enterprise Networks (Networking Technology)
IPv6 for Enterprise Networks (Networking Technology)

Internet Protocol version 6 (IPv6) is the next version of the protocol that is used for communication among devices of all types on the Internet. IPv6 has been in existence for many years, but recently the deployment of IPv6 has accelerated greatly in the enterprise. IPv6 has been under continuous development and is maturing as real-world...

Active Directory: Designing, Deploying, and Running Active Directory, Fourth Edition
Active Directory: Designing, Deploying, and Running Active Directory, Fourth Edition

Active Directory is a common repository for information about objects that reside on the network, such as users, groups, computers, printers, applications, and files. The default Active Directory schema supports numerous attributes for each object class that can be used to store a variety of information. Access Control Lists (ACLs) are...

Getting Started with Microsoft Application Virtualization 4.6
Getting Started with Microsoft Application Virtualization 4.6

Every organization, no matter what the business involved, to achieve efficiency needs efficient people working for them. For a long time now, operating systems and applications have represented important tools in the work of these people and organizations. And if we are not capable of providing users with the proper tools, gaining an...

IPv6 Security
IPv6 Security

Internet Protocol version 6 (IPv6) is the next version of the protocol that is used for communications on the Internet. IPv6 is a protocol that has been in existence for many years, but it has not yet replaced IPv4. IPv4 has some limitations that were not anticipated when it was first created. Because IPv6 overcomes many of these...

Multimedia Systems: Algorithms, Standards, and Industry Practices
Multimedia Systems: Algorithms, Standards, and Industry Practices

Multimedia is now a broad “umbrella” that innovatively combines different fields of research and industry to produce practical solutions that are used on a wide scale today. Some of these fields are signal processing, imaging and color science, video and audio analysis, 2D/3D graphics, information theory, compression,...

Automating Microsoft Windows Server 2008 R2 with Windows PowerShell 2.0
Automating Microsoft Windows Server 2008 R2 with Windows PowerShell 2.0

PowerShell is a scripting language built into Windows Server 2008 R2 servers. PowerShell is designed to help you perform routine and repetitive tasks in a scriptable fashion. PowerShell helps alleviate many of the time-consuming and tedious tasks administrators have had to do in the past. You may have used various scripting technologies over...

Smashing WordPress: Beyond the Blog (Smashing Magazine Book Series)
Smashing WordPress: Beyond the Blog (Smashing Magazine Book Series)

Smashing WordPress shows you how to utilize the power of the WordPress platform, and provides a creative spark to help you build WordPress-powered sites that go beyond the obvious. The second edition of Smashing WordPress has been updated for WordPress 3.1+, which includes internal, custom post types, the admin bar, and lots of other...

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

Microsoft BizTalk Server 2010 Unleashed
Microsoft BizTalk Server 2010 Unleashed

Microsoft BizTalk Server 2010 Unleashed is the 100% new, 100% practical developer’s guide to Microsoft’s most powerful version of BizTalk Server. Written by an expert team of Microsoft insiders and BizTalk MVPs, it reflects unsurpassed experience with all phases of BizTalk enterprise solutions...

Cisco Unified Customer Voice Portal: Building Unified Contact Centers (Networking Technology: IP Communications)
Cisco Unified Customer Voice Portal: Building Unified Contact Centers (Networking Technology: IP Communications)

The definitive guide to deploying Cisco Unified Customer Voice Portal IVRs in any contact center environment

 

Thousands of companies are replacing legacy ACD/TDM-based contact centers with pure IP-based unified contact center solutions. One of these...

SharePoint 2010 Development with Silverlight (Microsoft .Net Development Series)
SharePoint 2010 Development with Silverlight (Microsoft .Net Development Series)

This book is for every SharePoint developer who wants to build state-of-the-art solutions with Silverlight—within the enterprise, for consulting clients, or for commercial sale.

 

Developers increasingly want to build rich applications that run in the...

Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy