Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Core JSP
Core JSP

In recent years, a large amount of software development activity has migrated from the client to the server. The client-centric model, in which a client executes complex programs to visualize and manipulate data, is no longer considered appropriate for the majority of enterprise applications. The principal reason is deployment—it is a...

Home Networking Do-It-Yourself For Dummies
Home Networking Do-It-Yourself For Dummies

Fifty years ago, most households had only one television and one telephone. As the price of these technological marvels dropped, families began purchasing additional televisions and telephones — and the home network was born!

Think about it: Your televisions are basically networked together on a cable network. Okay, not a...

Microsoft Forefront UAG 2010 Administrator's Handbook
Microsoft Forefront UAG 2010 Administrator's Handbook

The Israeli department of defence has one of the strictest information security guidelines in the world, and a part of these guidelines is the requirement to have complete physical separation between the public and internal networks. A regular firewall just won't do, and this requirement gave birth to the concept of the Air-Gap, a...

The IBM Totalstorage Solutions Handbook (IBM Redbooks)
The IBM Totalstorage Solutions Handbook (IBM Redbooks)

This IBM Redbook provides overviews and pointers for information on the most current IBM TotalStorage products, showing how IBM is uniquely positioned to help you build up an on-demand business, considering its depth and breadth of storage IT experience and strong lineup of products, solutions, and services.

This Redbook is divided into...

IBM Sametime 8.5.2 Administration Guide
IBM Sametime 8.5.2 Administration Guide
Allow me to be the first to congratulate you for purchasing this book. Sametime 8.5 is a very different product from previous versions of the product. What once was a simple offering that provided secure instant messaging with some web conferencing capabilities has now evolved into a robust, flexible, sophisticated communications...
Cisco AVVID and IP Telephony Design and Implementation
Cisco AVVID and IP Telephony Design and Implementation
Cisco AVVID Design and Implementation is a complete reference for network administrators and engineers responsible for a complicated AVVID network. This book covers history, protocols, hardware, servers, switches, bridges, and routers, and discusses implementation issues, realities of cost, requirements, and network limitations. Engineers will...
Linux Networking Cookbook
Linux Networking Cookbook
This soup-to-nuts collection of recipes covers everything you need to know to perform your job as a Linux network administrator, whether you're new to the job or have years of experience. With Linux Networking Cookbook, you'll dive straight into the gnarly hands-on work of building and maintaining a computer network. Running a network doesn't mean...
Beginning Kinect Programming with the Microsoft Kinect SDK
Beginning Kinect Programming with the Microsoft Kinect SDK

Beginning Kinect Programming with the Microsoft Kinect SDK gets you up and running developing Kinect applications for your PC using Microsoft tools and the official SDK. You will have a working Kinect program by the end of the first chapter! The following chapters will open up the secrets of three-dimensional vision, skeleton...

Microservices for the Enterprise: Designing, Developing, and Deploying
Microservices for the Enterprise: Designing, Developing, and Deploying
Understand the key challenges and solutions around building microservices in the enterprise application environment. This book provides a comprehensive understanding of microservices architectural principles and how to use microservices in real-world scenarios.

Architectural challenges using microservices with service
...
AVIEN Malware Defense Guide for the Enterprise
AVIEN Malware Defense Guide for the Enterprise
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected...
Building Telephony Systems with OpenSIPS 1.6
Building Telephony Systems with OpenSIPS 1.6

SIP is the most important VoIP protocol and OpenSIPS is clearly the open source leader in VoIP platforms based on pure SIP. The whole telecommunication industry is changing to an IP environment, and telephony in the way we know today will disappear in less than ten years. SIP is the protocol leading this disruptive revolution and it is one of...

Serverless Applications with Node.js: Using AWS Lambda and Claudia.js
Serverless Applications with Node.js: Using AWS Lambda and Claudia.js
Summary

Serverless Applications with Node.js walks you through building serverless apps on AWS using JavaScript. Inside, you'll discover what Claudia.js brings to the table as you build and deploy a scalable event-based serverless application, based around a pizzeria that's fully integrated with AWS
...
unlimited object storage image
Result Page: 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy