Home | Amazing | Today | Tags | Publishers | Years | Search 
VMware vSphere 5 Clustering Technical Deepdive
VMware vSphere 5 Clustering Technical Deepdive

** Black & White edition ** VMware vSphere 5 Clustering Technical Deepdive zooms in on three key components of every VMware based infrastructure and is by no means a "how to" guide. It covers the basic steps needed to create a vSphere HA and vSphere DRS cluster and to implement vSphere Storage DRS. Even more important, it...

NX-OS and Cisco Nexus Switching: Next-Generation Data Center Architectures (Networking Technology)
NX-OS and Cisco Nexus Switching: Next-Generation Data Center Architectures (Networking Technology)

Cisco® Nexus switches and the new NX-OS operating system are rapidly becoming the new de facto standards for data center distribution/aggregation layer networking. NX-OS builds on Cisco IOS to provide advanced features that will be increasingly crucial to efficient data center operations. NX-OS and Cisco...

Representations and Techniques for 3D Object Recognition & Scene Interpretation
Representations and Techniques for 3D Object Recognition & Scene Interpretation

3D scene understanding and object recognition are among the grandest challenges in computer vision. A wide variety of techniques and goals, such as structure from motion, optical flow, stereo, edge detection, and segmentation, could be viewed as subtasks within scene understanding and recognition. Many of these applicable methods are...

Network Safety: Network5 Safety Certification
Network Safety: Network5 Safety Certification

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Guide to Tactical Perimeter Defense
Guide to Tactical Perimeter Defense

This course is the official courseware for the Security Certified Program SC0-451 certification exam. The Tactical Perimeter Defense course is designed to provide network administrators and certification candidates with hands-on tasks on the most fundamental perimeter security technologies. The network perimeter is often the first...

Disaster Recovery (EC-Council Disaster Recovery Professional)
Disaster Recovery (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Supercharged JavaScript Graphics: with HTML5 canvas, jQuery, and More
Supercharged JavaScript Graphics: with HTML5 canvas, jQuery, and More

With HTML5 and improved web browser support, JavaScript has become the tool of choice for creating high-performance web graphics. This faced-paced book shows you how to use JavaScript, jQuery, DHTML, and HTML5's Canvas element to create rich web applications for computers and mobile devices.

By following real-world...

Intelligent Video Event Analysis and Understanding (Studies in Computational Intelligence)
Intelligent Video Event Analysis and Understanding (Studies in Computational Intelligence)

With the vast development of Internet capacity and speed, as well as wide adoptation of media technologies in people’s daily life, a large amount of videos have been surging, and need to be efficiently processed or organized based on interest. The human visual perception system could, without difficulty, interpret and recognize...

Apple Pro Training Series: Aperture 3
Apple Pro Training Series: Aperture 3

Welcome to the official Apple Pro Training course for Aperture, the powerful photo editing and management software from Apple. This book includes a variety of real-world photography projects, which are used as clear examples of the way Aperture works, from import and organization to image editing and output.

Whether...

Fires in Silos: Hazards, Prevention, and Fire Fighting
Fires in Silos: Hazards, Prevention, and Fire Fighting
Storage of chemicals in silos is ubiquitous in the chemical, pharmaceutical and other producing industries, and some 80 % of all bulk materials are inflammable. It is here that the risk of large fires arises due to self-ignition or the intrusion of different ignition sources. For firefighters, most silo fires are very difficult to handle due to the...
Ion Chromatography
Ion Chromatography
The first edition of this book in 1982 described the emergence of ion-exchange chromatography as a practical and rapid method of separation and analysis. The initial and somewhat restrictive definition of the subject was broadened to 'ion chromatography' in order to describe the efficient chromatographic separation of anions or cations using any...
Drools JBoss Rules 5.0 Developer's Guide
Drools JBoss Rules 5.0 Developer's Guide
Business rules can help your business by providing a level of agility and flexibility. As a developer, you will be largely responsible for implementing these business rules effectively, but implementing them systematically can often be difficult due to their complexity. Drools, or JBoss Rules, makes the process of implementing these rules quicker...
Result Page: 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy