Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Persistence in the Enterprise: A Guide to Persistence Technologies (developerWorks Series)
Persistence in the Enterprise: A Guide to Persistence Technologies (developerWorks Series)

The Definitive Guide to Today's Leading Persistence Technologies

Persistence in the Enterprise is a unique, up-to-date, and objective guide to building the persistence layers of enterprise applications. Drawing on their extensive experience, five leading IBM® Web...

Kathy Jacobs on Powerpoint: PPT 2000, PPT 2002, PPT 2003 (On Office series)
Kathy Jacobs on Powerpoint: PPT 2000, PPT 2002, PPT 2003 (On Office series)
Learn to design presentations to fit any audience, create reports and graphical essays, use PowerPoint with other Microsoft Office products, and more with this timesaving guide.

A recognized expert in teaching Microsoft PowerPoint skills demonstrates how to design presentations to meet the needs of every audience. The peskiest PowerPoint...

Programming the Microsoft Windows Driver Model
Programming the Microsoft Windows Driver Model
Microsoft’s new driver model for Windows 98 and Windows 2000 supports Plug and Play, provides power management capabilities, and expands on the driver/minidriver approach. Written by device-driver expert Walter Oney in cooperation with the Windows DDK team, this book provides extensive practical examples, illustrations, advice, and...
The Power of Management Innovation: 24 Keys for Accelerating Profitability and Growth (Mighty Managers Series)
The Power of Management Innovation: 24 Keys for Accelerating Profitability and Growth (Mighty Managers Series)

The world’s most profitable companies share two things in common: quality of management and management capital. Combining leadership passion for creating growth and profitability (quality of management) and the effective deployment of resources for accelerating growth (management capital) is the formula for thriving in...

Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps
Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps

Protect your organization's security at all levels by introducing the latest strategies for securing DevOps

Key Features

  • Integrate security at each layer of the DevOps pipeline
  • Discover security practices to protect your cloud services by detecting fraud and...
Embedded Linux Primer: A Practical Real-World Approach
Embedded Linux Primer: A Practical Real-World Approach

Comprehensive Real-World Guidance for Every Embedded Developer and Engineer

This book brings together indispensable knowledge for building efficient, high-value, Linux-based embedded products: information that has never been assembled in one place before. Drawing on years of experience as an...

IT Investment: Making a Business Case (Computer Weekly Professional Series)
IT Investment: Making a Business Case (Computer Weekly Professional Series)
Frequently not enough attention is given to producing a comprehensive business case or to producing an economic justification for an information systems investment. In fact many organizations are not clear as to what constitutes a sound business case and how to go about producing one. This Professional level book for the Computer Weekly...
Large Scale Component Based Development
Large Scale Component Based Development
"This book is very well written. I have never seen a book on the market that discusses these concepts as well as this book. Anyone involved with Information Technology should be familiar with this material. If not, they need to get this book ASAP and read it cover to cover." -William H. Murray, author of many...
Linux Kernel in a Nutshell
Linux Kernel in a Nutshell

Written by a leading developer and maintainer of the Linux kernel, Linux Kernel in a Nutshell is a comprehensive overview of kernel configuration and building, a critical task for Linux users and administrators.

No distribution can provide a Linux kernel that meets all users' needs. Computers big and small have special...

Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century

The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention

 

Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments....

Cost Optimal and Nearly Zero-Energy Buildings (nZEB): Definitions, Calculation Principles and Case Studies
Cost Optimal and Nearly Zero-Energy Buildings (nZEB): Definitions, Calculation Principles and Case Studies

Cost optimal and nearly zero energy performance levels are principles initiated by the European Union’s (EU) Energy Performance of Buildings Directive which was recast in 2010. These will be major drivers in the construction sector in the next few years, because all new buildings in the EU from 2021 onwards are expected to be nearly...

The Data Access Handbook: Achieving Optimal Database Application Performance and Scalability
The Data Access Handbook: Achieving Optimal Database Application Performance and Scalability
Performance and scalability are more critical than ever in today’s enterprise database applications, and traditional database tuning isn’t nearly enough to solve the performance problems you are likely to see in those applications. Nowadays, 75-95% of the time it takes to process a data request is typically spent in the database...
unlimited object storage image
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy