Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for...
IT Service Management Guide: Vol. 1
IT Service Management Guide: Vol. 1
The importance of IT Service Management is becoming widely recognized. Whereas in the 1960s and 1970s interest was still focused mainly on the improvement of hardware, and whereas the development of software was the major concern until well into the 1980s, the 1990s was the decade that saw the rise of service management.

For decades,
...
Getting Started with Mule Cloud Connect: Accelerating Integration with SaaS, Social Media, and Open APIs
Getting Started with Mule Cloud Connect: Accelerating Integration with SaaS, Social Media, and Open APIs
There’s no question that we are undergoing a generational shift in computing. With the massive adoption of social media, SaaS, and cloud computing, enterprises are relying more and more on resources beyond the firewall. With this shift, we have seen an explosion in the number of open APIs that are required to...
Mental Models: Aligning Design Strategy with Human Behavior
Mental Models: Aligning Design Strategy with Human Behavior

There is no single methodology for creating the perfect product—but you can increase your odds. One of the best ways is to understand users' reasons for doing things. Mental Models gives you the tools to help you grasp, and design for, those reasons. Adaptive Path co-founder Indi Young has written a roll-up-your-sleeves book for...

Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they...
Oracle Essbase & Oracle OLAP: The Guide to Oracle's Multidimensional Solution
Oracle Essbase & Oracle OLAP: The Guide to Oracle's Multidimensional Solution
We have seen tremendous consolidation in the high-technology industry in recent years. Mergers and acquisitions strengthen the product offerings of a company, but they also sometimes bring together products that, on the face of it, seem either to duplicate a solution or to present no possibility of working together.

In 2007, Oracle
...
Mastering Microsoft Lync Server 2010
Mastering Microsoft Lync Server 2010
This book is the fi rst time the Sybex Mastering series has touched on the subject of Microsoft’s Unifi ed Communications (UC) platform. With the release of Lync 2010, we are into the third generation of a platform that provides a comprehensive set of functionality, which has placed it in the top right of the Gartner Magic...
Technology Paradise Lost: Why Companies Will Spend Less to Get More from Information Technology
Technology Paradise Lost: Why Companies Will Spend Less to Get More from Information Technology
Debunking many of today’s myths about the future prospects and growth of information technology, this book uses a variety of well-accepted economic, technological, and market data to come to the contrary conclusion that IT is poised to shrink and not grow. Discussed is how this conclusion does not imply that companies will slow their use...
CTOs at Work
CTOs at Work

Scott Donaldson, Stanley Siegel and Gary Donaldson interview many of the world's most influential chief technology officers in CTOs at Work, offering a brand-new companion volume to the highly acclaimed elite At Work books including Coders at Work, CIOS at Work and...

The Mezonic Agenda: Hacking the Presidency
The Mezonic Agenda: Hacking the Presidency
"Hack-Along" with the Heroes and Villains of the Mezonic Agenda as the American Presidency hangs in the balance of cyber-space... In six days Hugh Davis will testify before Congress on the security, stability, and safety of Advice Software Inc.'s e-vote software. He is a world-renowned expert on software security, and his testimony will...
IBM Cognos Business Intelligence 10.1 Dashboarding Cookbook
IBM Cognos Business Intelligence 10.1 Dashboarding Cookbook
This book covers, in detail, the various aspects of dashboard creation and use, in IBM Cognos 10 BI.

It includes detailed information and documentation about the tools available in IBM Cognos 10 BI to show users how to create dashboards and distribute them within an organization.

Step-by-step practical
...
Liferay Portal Performance Best Practices
Liferay Portal Performance Best Practices

To maximize the performance of your Liferay Portals you need to acquire best practices. By the end of this tutorial you’ll understand making the most appropriate architectural decisions, fine-tuning, load testing, and much more.

Overview

  • Learn best practices for architecting high performing Liferay-...
unlimited object storage image
Result Page: 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy