Home | Amazing | Today | Tags | Publishers | Years | Search 
Professional Plone Development
Professional Plone Development
This book teaches Plone development best practices, focusing on Plone 3.0. It covers setting up a development environment, customizing Plone's look and feel, creating new content types and forms, connecting to external databases, managing users and groups intelligently, configuring a production-ready server, LDAP authentication, and caching. Aimed...
Patterns in Network Architecture: A Return to Fundamentals
Patterns in Network Architecture: A Return to Fundamentals
Groundbreaking Patterns for Building Simpler, More Powerful Networks

 

In Patterns in Network Architecture, pioneer John Day takes a unique approach to solving the problem of network architecture. Piercing the fog of history, he bridges the gap between our experience from the...

Generic Model Management: Concepts and Algorithms (Lecture Notes in Computer Science)
Generic Model Management: Concepts and Algorithms (Lecture Notes in Computer Science)
Many challenging problems in information systems engineering involve the manipulation of complex metadata artifacts or models, such as database schema, interface specifications, or object diagrams, and mappings between models. Applications solving metadata manipulation problems are complex and hard to build. The goal of generic model management is...
Implementing ITIL Configuration Management
Implementing ITIL Configuration Management
Practical, Real-World ITIL Configuration Management–From Start to Finish

 

The IT Infrastructure Library® (ITIL) places the “best practices” in IT operations at your command. ITIL helps you make better technology choices, manages IT more effectively,...

Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China

The New Global Hub of IT Outsourcing

Welcome to the new technology outsourcing services industry reality: China!

The factors that point to a country's potential and success as an outsourcing destination inevitably lead to the one country that is rapidly becoming the new hub for IT...

Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks
Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks
An organizations employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regarding the company and its customers. This makes employees prime candidates for sabotaging a system if they become disgruntled or for selling privileged information if they become greedy. Insider...
Creating Assertion-Based IP (Series on Integrated Circuits and Systems)
Creating Assertion-Based IP (Series on Integrated Circuits and Systems)
Assertion-based IP is much more than a comprehensive set of related assertions. It is a full-fledged reusable and configurable transaction-level verification component, which is used to detect both interesting and incorrect behaviors. Upon detecting interesting or incorrect behavior, the assertion-based IP alerts other verification components...
The Best Damn Server Virtualization Book Period: Including Vmware, Xen, and Microsoft Virtual Server
The Best Damn Server Virtualization Book Period: Including Vmware, Xen, and Microsoft Virtual Server
Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of Ownership of their physical infrastructure. Combining software applications onto a single server, even if those applications are from the same software vendor, can be dangerous and problems hard to...
Manage IT!: Organizing IT Demand and IT Supply
Manage IT!: Organizing IT Demand and IT Supply
"This book discusses IT supply and demand, analyzing functional requirements and operational processes, using methods such as those defined in the IT infrastructure library (ITIL). This book will be useful for understanding the key concepts behind modern service-oriented IT organizations. In a nutshell, this is a good book and a good...
Handbook of Database Security: Applications and Trends
Handbook of Database Security: Applications and Trends
Database security has been gaining a great deal of importance as industry, military, and government organizations have increasingly adopted Internet-based technologies on a large-scale, because of convenience, ease of use, and the ability to take advantage of rapid advances in the commercial market. Along with the traditional security aspects of...
Globus® Toolkit 4, : Programming Java Services (The Elsevier Series in Grid Computing)
Globus® Toolkit 4, : Programming Java Services (The Elsevier Series in Grid Computing)
Grid computing is an increasingly popular topic, and numerous books have appeared that describe grid applications and technologies. Indeed, we have contributed to this number, via the two editions of “The Grid: Blueprint for a New Computing Infrastructure,” published in 1999 and 2004, respectively, and via the establishment of the...
Global E-government Readiness Report 2005: From E-government to E-inclusion
Global E-government Readiness Report 2005: From E-government to E-inclusion
In reaffirming the vision of a peaceful, prosperous and just world, leaders at the United Nations World Summit in 2005 outlined a vision of ‘…building a people-centred and inclusive information society, putting the potential of information and communication technologies at the service of development and addressing new challenges of the...
Result Page: 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 95 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy