Home | Amazing | Today | Tags | Publishers | Years | Search 
Green IT: Reduce Your Information System's Environmental Impact While Adding to the Bottom Line
Green IT: Reduce Your Information System's Environmental Impact While Adding to the Bottom Line

Reduce the environmental and budgetary impact of your IT infrastructure

This groundbreaking work offers a complete roadmap for integrating environmentally sound techniques and technologies into your Information Systems architecture. Green IT explains how to adopt a business-driven green initiative and provides a...

Network-Centric Service Oriented Enterprise
Network-Centric Service Oriented Enterprise
The emergence of Enterprise services has triggered a major paradigm shift in distributed computing: from Object-Oriented Architecture (OOA) to Service-Oriented Architecture (SOA). As the need grows to incorporate and exchange information across wire-line and wireless networks, so grows the necessity to establish an infrastructure for...
The Best Damn Windows Server 2008 Book Period, Second Edition
The Best Damn Windows Server 2008 Book Period, Second Edition
In depth coverage for Windows Server 2008 SysAdmins of this new operating system's most challenging features, with bonus coverage of IIS, Exchange, and SQL.

The Second Edition of the Best Damn Windows Server Book Period is completely revised and updated to Windows Server 2008.

This book will show you how to
...
Simply Rails 2
Simply Rails 2
Want to learn all about Ruby on Rails 2.0, the web application framework that is inspiring developers around the world?

The second edition of this practical, hands on book will:

  • show you how to install Ruby on Rails on Windows, Mac, or Linux
  • walk you, step by step, through the development of a Web 2.0...
Windows Server 2008 Bible
Windows Server 2008 Bible

Moving to Windows Server 2008? Start with this book.

Windows Server 2008 has arrived with many new features and choices, and this hands-on reference shows you how to handle them all. Whether you're starting from scratch or upgrading, you'll find a wealth of information on how to install, configure, manage, and...

VoIP Voice and Fax Signal Processing
VoIP Voice and Fax Signal Processing
Voice over IP (VoIP) gained popularity through actual deployments and by making use of VoIP - based telephone and fax calls with global roaming and connectivity via the Internet. Several decades of effort have gone into VoIP, and these efforts are benefi tting real applications. Several valuable books have been published by experts in the fi eld....
Special Edition Using Linux System Administration (Special Edition Using)
Special Edition Using Linux System Administration (Special Edition Using)
Special Edition Using Linux Administration is the complete, comprehensive reference book for the experienced administrator who needs to learn to run a Linux system and successfully manage it. This book has a great appeal to those administrators whose knowledge is limited to Windows or NetWare networks as they integrate Linux into their...
Upgrading SAP (SAP R/3)
Upgrading SAP (SAP R/3)
The purpose of this book is to remove the veil of secrecy surrounding SAP upgrade techniques and concepts, and to provide the user with a detailed description of the steps needed for a successful implementation. This popular, but very complex software system must be constantly reconfigured and upgraded to accommodate its latest releases. This book...
Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks (Wiley Series on Parallel and Distributed Computing)
Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks (Wiley Series on Parallel and Distributed Computing)
Learn the fundamental algorithms and protocols for wireless and mobile ad hoc networks

Advances in wireless networking and mobile communication technologies, coupled with the proliferation of portable computers, have led to development efforts for wireless and mobile ad hoc networks. This book focuses on several aspects of wireless ad hoc...

Phishing: Cutting the Identity Theft Line
Phishing: Cutting the Identity Theft Line
Have you been caught yet?

They don't just want to know who you are, they want to BE who you are. By duplicating a legitimate website, phishers can convince you that email asking for your personal information came from your bank, an online retailer, even your ISP. Their high-tech identity theft costs American consumers and businesses billions,...

The Best Damn Server Virtualization Book Period: Including Vmware, Xen, and Microsoft Virtual Server
The Best Damn Server Virtualization Book Period: Including Vmware, Xen, and Microsoft Virtual Server
Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of Ownership of their physical infrastructure. Combining software applications onto a single server, even if those applications are from the same software vendor, can be dangerous and problems hard to...
Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks
Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks
An organizations employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regarding the company and its customers. This makes employees prime candidates for sabotaging a system if they become disgruntled or for selling privileged information if they become greedy. Insider...
Result Page: 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy