Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microsoft SQL Server 2000 High Availability
Microsoft SQL Server 2000 High Availability

Get the definitive reference to maximizing the availability of your critical, SQL Server 2000-based business systems. Developed by Microsoft field consultants who create and support high availability solutions every day, this practical guide explains how to plan, design, implement, and support highly available SQL Server 2000-based systems...

Windows Server 2003 Clustering & Load Balancing
Windows Server 2003 Clustering & Load Balancing

Plan, design, and implement highly available Windows solutions using the expert advice in this detailed guide. Written by a network infrastructure design specialist, this book covers the planning, development, cost analysis, management, installation, configuration, and roll out of several clustering and load balancing technologies....

Microsoft systems management server 2003 administrator's companion
Microsoft systems management server 2003 administrator's companion

Streamline—and centralize—the management of your Microsoft Windows-based desktops with the essential guide to planning, deploying, and supporting Systems Management Server (SMS) 2003. This in-depth administrator’s reference drills into SMS features and components and provides easy-to-follow procedures, practical...

Microsoft Exchange Server 2003 Administrator's Companion
Microsoft Exchange Server 2003 Administrator's Companion

Get your mission-critical messaging and collaboration systems up and running quickly with the essential guide to deploying and managing Exchange Server 2003. This comprehensive administrator’s reference details system features and capabilities, sharing hands-on insights for working with new connectivity, information management, and...

AD HOC NETWORKS: Technologies and Protocols
AD HOC NETWORKS: Technologies and Protocols
Wireless mobile networks and devices are becoming increasingly popular as
they provide users access to information and communication anytime and anywhere.
Conventional wireless mobile communications are usually supported
by a wired fixed infrastructure. A mobile device would use a single-hop wireless
radio communication to
...
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers (2nd Edition)
VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers (2nd Edition)

Edward L. Haletky’s Complete, Solutions-Focused Guide to Running ESX Server 3.5, vSphere, and VMware 4.x

 

Extensively updated and revised, this is the definitive real-world guide to planning, deploying, and managing VMware ESX Server 3.5,...

VMware vSphere PowerCLI Reference: Automating vSphere Administration
VMware vSphere PowerCLI Reference: Automating vSphere Administration

The book is, of course, primarily targeted at administrators of vSphere environments who want to automate tasks. But the subjects that we discuss in the book cover so many aspects of the management of a VMware vSphere environment that everyone who comes into contact with a VMware vSphere environment will be able to pick up something...

The Black Death (Great Historic Disasters)
The Black Death (Great Historic Disasters)
In 1346, Europe was hit by the worst natural disaster in its recorded history: the Black Death. Generally believed to be a combination of bubonic plague and two other plague strains, the Black Death ravaged the length and breadth of Europe from Sicily to Norway, from Ireland to Russia, for five terrible years. Scholars can...
Preparing for the Worst: A Comprehensive Guide to Protecting Your Family from Terrorist Attacks, Natural Disasters, and Other Catastrophes
Preparing for the Worst: A Comprehensive Guide to Protecting Your Family from Terrorist Attacks, Natural Disasters, and Other Catastrophes

Preparing for the Worst details the best practices in antiterrorism tactics and preparing for disaster. This book is for typical American families, business travelers, corporate executive management personnel, emergency first responders, school administrators, and local government officials responsible for public safety and emergency...

Mechanical Trading Systems: Pairing Trader Psychology with Technical Analysis
Mechanical Trading Systems: Pairing Trader Psychology with Technical Analysis
In 1987 my father and I purchased a seat on the New York Futures Exchange
for $100 and established a trading account with $25,000. The goal, he explained,
was to make $2,500 a week. Although this seemed like an extraordinary
annualized return on investment, I had heard of legendary traders
who had taken meager sums and
...
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
A one-stop source of information covering everything you’ll need to know in order to pass the CISSP examination

The CISSP Prep Guide

From stolen intellectual proprietary and denial of service attacks to unauthorized use of critical resources and computer viruses, e-business companies face numerous threats each day that can...

Result Page: 29 28 27 26 25 24 23 22 21 20 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy