Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Solaris(TM) Performance and Tools: DTrace and MDB Techniques for Solaris 10 and OpenSolaris
Solaris(TM) Performance and Tools: DTrace and MDB Techniques for Solaris 10 and OpenSolaris

"The Solaris™Internals volumes are simply the best and most comprehensive treatment of the Solaris (and OpenSolaris) Operating Environment. Any person using Solaris--in any capacity--would be remiss not to include these two new volumes in their personal library. With advanced observability tools in Solaris (like DTrace), you...

Nuclear Engineering Handbook (Mechanical Engineering)
Nuclear Engineering Handbook (Mechanical Engineering)

Nuclear power has, in recent years, undergone a major transformation, resulting in major technical developments and a new generation of nuclear scientists and engineers. A comprehensive book that reflects the latest nuclear technologies has been lacking—until now.

The Nuclear Engineering Handbook is a response to...

Software Engineering: A Practitioner's Approach
Software Engineering: A Practitioner's Approach

When computer software succeeds—when it meets the needs of the people who use it, when it performs flawlessly over a long period of time, when it is easy to modify and even easier to use—it can and does change things for the better. But when software fails—when its users are dissatisfied, when it is error prone, when...

Planning for Survivable Networks
Planning for Survivable Networks
Keep your network safe from security disasters with a dependable recovery strategy

Companies are finally learning that a network disaster recovery plan is mandatory in these times, and they must be prepared to make difficult choices about network security.

In the information-packed pages of this book, Annlee Hines shares her...

CCENT/CCNA ICND1 Official Exam Certification Guide, 2nd Edition
CCENT/CCNA ICND1 Official Exam Certification Guide, 2nd Edition
Congratulations! If you're reading this Introduction, you've probably already decided to go for your Cisco certification. If you want to succeed as a technical person in the networking industry, you need to know Cisco. Cisco has a ridiculously high market share in the router and switch marketplace—more than 80 percent in some markets. In...
Extreme NXT: Extending the LEGO MINDSTORMS NXT to the Next Level (Technology in Action)
Extreme NXT: Extending the LEGO MINDSTORMS NXT to the Next Level (Technology in Action)
Extreme NXT: Extending the LEGO MIDSTORMS NXT to the Next Level is for intermediate-level users of NXT who would like to advance their capabilities by learning some of the basics of electronics. Plenty of examples are provided, and easy-to-follow instructions are included for building over 15 different sensors.

This makes a great...

Data Conversion Handbook (Analog Devices)
Data Conversion Handbook (Analog Devices)
Analog-to-digital (A/D) and digital-to-analog (D/A) converters provide the link between analog data produced by sensors and transducers (links to the real world, from microphones and video cameras to radar speed guns) and the digital data of signal processing, computing and other digital data collection or data processing systems. This complete...
Practical PowerPivot & DAX Formulas for Excel 2010
Practical PowerPivot & DAX Formulas for Excel 2010

PowerPivot: What a name! Or I should really say what’s in a name? Powerful Pivoting? Pivot-table for power users?

PowerPivot is a lot more than that. When I started the PowerPivot project back in 2007, along with Amir Netz (Microsoft BI Distinguished Engineer), the incubation project was called BI Sandbox. We had been looking...

Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Data is stolen; this is no uncommon occurrence. The electronic information age has made the theft of data a very lucrative occupation. Whether it’s phishing scams or largescale data breaches, criminals stand to greatly benefit from electronic crimes, making their investment well worth the risk. When I say that this occurrence is not...
Windows Server 2019 Automation with PowerShell Cookbook: Powerful ways to automate and manage Windows administrative tasks, 3rd Edition
Windows Server 2019 Automation with PowerShell Cookbook: Powerful ways to automate and manage Windows administrative tasks, 3rd Edition

A practical guide to Windows Server 2019 and PowerShell

Key Features

  • Use PowerShell to effectively configure and administer Windows Server 2019
  • Improve the performance of new features such as DevOps and containers using PowerShell
  • Enhance PowerShell's...
Mac X OS Headaches: How to Fix common (and Not So Common) Problems in a Hurry
Mac X OS Headaches: How to Fix common (and Not So Common) Problems in a Hurry

Fast, Effective Relief from Mac OS X Troubles

Diagnose and cure problems for Mac OS X and OS X 10.2 Jaguar

Seeking relief from mouse mishaps or memory malfunctions? Take the cure and achieve peak performance with Mac OS X and OS X 10.2 Jaguar. In this valuable resource, Mac guru and best-selling author Curt Simmons covers...

Ethernet in the First Mile
Ethernet in the First Mile
IEEE standard 802.3, Ethernet in the First Mile (EFM), approved this July, standardizes broadband Ethernet, allowing service providers to focus on providing critical broadband services without worrying about interoperability conflicts. This book will annotate and explain the dense language of the standard document, taking particular care how to...
unlimited object storage image
Result Page: 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy