Home | Amazing | Today | Tags | Publishers | Years | Search 
Microsoft SQL Server 2008 Management and Administration
Microsoft SQL Server 2008 Management and Administration

SQL Server 2008 is Microsoft’s latest data platform providing data management and analytical solutions for the enterprise. The platform is trusted, ensures business continuity, and is more predictable and more scalable than ever before. Although similar to SQL Server 2005, SQL Server 2008 offers a tremendous number of new features and...

Hadoop Operations and Cluster Management Cookbook
Hadoop Operations and Cluster Management Cookbook

We are facing an avalanche of data. The unstructured data we gather can contain many insights that could hold the key to business success or failure. Harnessing the ability to analyze and process this data with Hadoop is one of the most highly sought after skills in today's job market. Hadoop, by combining the computing and storage powers...

High Interstitial Stainless Austenitic Steels (Engineering Materials)
High Interstitial Stainless Austenitic Steels (Engineering Materials)

High Interstitial Stainless Austenitic Steels is of interest to all engineers and resaerchers working with stainless steel, either at universities or R&D departments in Industry. The new applications described appeal to design engineers while procees engineers find interesting challenges. These novel steels enter more and more industrial...

Protocols for Micropropagation of Woody Trees and Fruits
Protocols for Micropropagation of Woody Trees and Fruits

Micropropagation has become a reliable and routine approach for large-scale rapid plant multiplication, which is based on plant cell, tissue and organ culture on well defined tissue culture media under aseptic conditions. A lot of research efforts are being made to develop and refine micropropagation methods and culture media for large-scale...

Network Defense: Perimeter Defense Mechanisms
Network Defense: Perimeter Defense Mechanisms

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

IBM WebSphere Application Server v7.0 Security
IBM WebSphere Application Server v7.0 Security

IBM WebSphere Application Server Network Deployment is IBM's flagship J2EE application server platform. It implements the J2EE technology stack. This stack enables the WebSphere Application Server platform to execute the user's Java enterprise applications that perform business functions. There are several roles who use this platform...

CMS Security Handbook: The Comprehensive Guide for WordPress, Joomla, Drupal, and Plone
CMS Security Handbook: The Comprehensive Guide for WordPress, Joomla, Drupal, and Plone

As a business owner, you are probably faced with hundreds of decisions that must be made weekly. Diving headlong into a technical effort might be scary. Diving into a security and operations effort is something you likely don't know how to do.

That's where this book comes in. This book helps you fill in the blanks for...

Guide to Tactical Perimeter Defense
Guide to Tactical Perimeter Defense

This course is the official courseware for the Security Certified Program SC0-451 certification exam. The Tactical Perimeter Defense course is designed to provide network administrators and certification candidates with hands-on tasks on the most fundamental perimeter security technologies. The network perimeter is often the first...

IT Auditing Using Controls to Protect Information Assets, 2nd Edition
IT Auditing Using Controls to Protect Information Assets, 2nd Edition

When we began writing this book, we had a fundamental tenet: Write a clear handbook for creating the organization’s IT audit function and for performing their IT audits. We wanted this book to provide more than checklists and textbook theories but instead to provide real-life practical guidance from people who have performed IT...

Ultrasonic Processes and Machines: Dynamics, Control and Applications (Foundations of Engineering Mechanics)
Ultrasonic Processes and Machines: Dynamics, Control and Applications (Foundations of Engineering Mechanics)
This work presents the foundations of dynamic and control for ultrasonic processing systems.This book considers ultrasonic systems as special vibratory machines that function by exploiting nonlinear dynamic processes. Recommendations are given for designing and tuning ultrasonic machines. The ultrasonic machines analysed are predominantly concerned...
Windows Server 2008: The Definitive Guide
Windows Server 2008: The Definitive Guide
This practical guide has exactly what you need to work with Windows Server 2008. Inside, you'll find step-by-step procedures for using all of the major components, along with discussions on complex concepts such as Active Directory replication, DFS namespaces and replication, network access protection, the Server Core edition, Windows PowerShell,...
GNU/Linux Application Programming (Programming Series)
GNU/Linux Application Programming (Programming Series)
GNU/Linux is the Swiss army knife of operating systems. You’ll find it in the smallest devices (such as an Apple iPod) to the largest most powerful supercomputers (like IBM’s Blue Gene). You’ll also find GNU/Linux running on the most diverse architectures, from the older x86 processors to the latest cell processor that powers the...
Result Page: 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy