Home | Amazing | Today | Tags | Publishers | Years | Search 
VMware vSphere 5 Clustering Technical Deepdive
VMware vSphere 5 Clustering Technical Deepdive

** Black & White edition ** VMware vSphere 5 Clustering Technical Deepdive zooms in on three key components of every VMware based infrastructure and is by no means a "how to" guide. It covers the basic steps needed to create a vSphere HA and vSphere DRS cluster and to implement vSphere Storage DRS. Even more important, it...

Information Technology Auditing (with ACL CD-ROM)
Information Technology Auditing (with ACL CD-ROM)

The third edition of this text contains key improvements and changes that continue to provide instructors and students with the best information technology auditing text available. This edition has been reorganized and expanded to address the internal control and audit issues mandated by Sarbanes-Oxley legislation. The third edition...

Virtualization Security (EC-Council Disaster Recovery Professional)
Virtualization Security (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Penetration Testing: Procedures & Methodologies
Penetration Testing: Procedures & Methodologies

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Computer Vision: Detection, Recognition and Reconstruction (Studies in Computational Intelligence)
Computer Vision: Detection, Recognition and Reconstruction (Studies in Computational Intelligence)

Computer vision is the science and technology of making machines that see. It is concerned with the theory, design and implementation of algorithms that can automatically process visual data to recognize objects, track and recover their shape and spatial layout.

The International Computer Vision Summer School - ICVSS was...

Network Defense: Perimeter Defense Mechanisms
Network Defense: Perimeter Defense Mechanisms

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Introducing HTML5 Game Development
XNA 4.0 Game Development by Example: Beginner's Guide - Visual Basic Edition
XNA 4.0 Game Development by Example: Beginner's Guide - Visual Basic Edition

The Microsoft XNA Framework provides a powerful set of tools to allow development teams of any size, from the individual developer to larger independent teams, to rapidly develop high-performance quality games for multiple Microsoft-related platforms.

This book will present a series of video games, utilizing Visual Basic and...

Modular Neural Networks and Type-2 Fuzzy Systems for Pattern Recognition (Studies in Computational Intelligence)
Modular Neural Networks and Type-2 Fuzzy Systems for Pattern Recognition (Studies in Computational Intelligence)

We describe in this book, hybrid intelligent systems using type-2 fuzzy logic and modular neural networks for pattern recognition applications. Hybrid intelligent systems combine several intelligent computing paradigms, including fuzzy logic, neural networks, and bio-inspired optimization algorithms, which can be used to produce...

The Software IP Detective's Handbook: Measurement, Comparison, and Infringement Detection
The Software IP Detective's Handbook: Measurement, Comparison, and Infringement Detection

This book is generally about software intellectual property and specifically about the field of software forensics. While you may never testify in a courtroom, attempt to deduce the true owner of a valuable program, or measure the intellectual property (IP) value of software source code, if you are at all involved with software you...

Chromatography for Sustainable Polymeric Materials: Renewable, Degradable and Recyclable
Chromatography for Sustainable Polymeric Materials: Renewable, Degradable and Recyclable

Polymericmaterials, both “inert” and degradable, constantly interact with the surroundings. Because of this interaction changes take place in the polymer matrix and small molecules are released to the environment. Reliable methods for testing biodegradability and environmental interaction of renewable resources and...

Reasoning in Event-Based Distributed Systems (Studies in Computational Intelligence)
Reasoning in Event-Based Distributed Systems (Studies in Computational Intelligence)

Event-based distributed systems are playing an ever increasing role in areas such as enterprise management, information dissemination, finance, environmental monitoring and geo-spatial systems. Event-based processing originated with the introduction of Event-Condition-Action (ECA) rules to database systems in the 1980s. Since then,...

Result Page: 69 68 67 66 65 64 63 62 61 60 59 58 57 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy