Home | Amazing | Today | Tags | Publishers | Years | Search 
Oracle Essbase & Oracle OLAP: The Guide to Oracle's Multidimensional Solution
Oracle Essbase & Oracle OLAP: The Guide to Oracle's Multidimensional Solution
We have seen tremendous consolidation in the high-technology industry in recent years. Mergers and acquisitions strengthen the product offerings of a company, but they also sometimes bring together products that, on the face of it, seem either to duplicate a solution or to present no possibility of working together.

In 2007, Oracle
...
Work Naked: Eight Essential Principles for Peak Performance in the Virtual Workplace
Work Naked: Eight Essential Principles for Peak Performance in the Virtual Workplace
"Enlightening, enjoyable, and extremely practical, Work Naked offers real clarity about what is wrong with the way most companies work, plus exact directions on how to fix each and every office foolishness. Do what Froggatt says and watch your employee productivity rise." --Scott Shuster, Business Week "High-tech tools (cell...
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for...
World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing
World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing

"Richard Hunter has seen the future, and its really scary. If you ever plan to do anything wrong, you need to read this book. If you suspect that someone will ever try to do anything wrong to you, you also need to read it. I believe that covers pretty much all of us." —Thomas H. Davenport, Director, Accenture Institute for...

Distributed Computing: Principles, Algorithms, and Systems
Distributed Computing: Principles, Algorithms, and Systems
Designing distributed computing systems is a complex process requiring a solid understanding of the design problems and the theoretical and practical aspects of their solutions. This comprehensive textbook covers the fundamental principles and models underlying the theory, algorithms and systems aspects of distributed computing. Broad and detailed...
Nmap in the Enterprise: Your Guide to Network Scanning
Nmap in the Enterprise: Your Guide to Network Scanning
Richard Stiennon, vice president at Gartner
"Nmap is one of the tools in your toolbox you need as a network analyst. I would recommend everyone in the world use it to check port 135 to see if [they] have desktop servers listening on it. If you don't, you're going to be down in the next couple of weeks."

A
...
How to Cheat at Configuring VmWare ESX Server
How to Cheat at Configuring VmWare ESX Server
This book will detail the default and custom installation of VMwares ESX server as well as basic and advanced virtual machine configurations. It will then walk the reader through post installation configurations including installation and configuration of VirtualCenter. From here, readers will learn to efficiently create and deploy virtual machine...
Patterns for Computer-Mediated Interaction (Wiley Software Patterns Series)
Patterns for Computer-Mediated Interaction (Wiley Software Patterns Series)
The Internet has changed the way we interact and communicate. Two to three decades ago the only way to stay in touch with people was to see them in person, write letters, or use a fixed network phone. At work, we had video conferencing and fax, but that was basically it. The Internet was available, but only few of us actually had an e-mail...
The New Language of Business: SOA & Web 2.0
The New Language of Business: SOA & Web 2.0
In The New Language of Business, senior IBM executive Sandy Carter demonstrates how to leverage SOA, Web 2.0, and related technologies to drive new levels of operational excellence and business innovation.

Writing for executives and business leaders inside and outside IT, Carter explains why flexibility and responsiveness...

Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they...
IT Auditing: Using Controls to Protect Information Assets
IT Auditing: Using Controls to Protect Information Assets

Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and...

Technology Paradise Lost: Why Companies Will Spend Less to Get More from Information Technology
Technology Paradise Lost: Why Companies Will Spend Less to Get More from Information Technology
Debunking many of today’s myths about the future prospects and growth of information technology, this book uses a variety of well-accepted economic, technological, and market data to come to the contrary conclusion that IT is poised to shrink and not grow. Discussed is how this conclusion does not imply that companies will slow their use...
Result Page: 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy