Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation
Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation

Getting software released to users is often a painful, risky, and time-consuming process. This groundbreaking new book sets out the principles and technical practices that enable rapid, incremental delivery of high quality, valuable new functionality to users. Through automation of the build, deployment, and testing...

Windows Server 2012 Unified Remote Access Planning and Deployment
Windows Server 2012 Unified Remote Access Planning and Deployment

DirectAccess, introduced in Windows Server 2008 R2, has been a ground breaking VPN-like connectivity solution, adopted by thousands of organizations worldwide. Allowing organizations to deploy without manually configuring every client and providing always-on connectivity has made this technology world-famous. Now, with Windows Server 2012,...

Cloud Capacity Management (Expert's Voice in Information Technology)
Cloud Capacity Management (Expert's Voice in Information Technology)

Cloud Capacity Management helps readers in understanding what the cloud, IaaS, PaaS, SaaS are, how they relate to capacity planning and management  and which stakeholders are involved in delivering value in the cloud value chain. It explains the role of capacity management for a creator, aggregator, and consumer of cloud...

CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide

The only official study guide for the new CCSP exam

CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you prepare faster and smarter...

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Communication between people has changed with the invention of the telephone. The ability to communicate across continents in real-time has also helped our society in several dimensions including entertainment, trade, finance, and defense. But this new capability did not come without an investment. Building an international telephony...

VMware ESX Server in the Enterprise: Planning and Securing Virtualization Servers
VMware ESX Server in the Enterprise: Planning and Securing Virtualization Servers
VMware ESX Server in the Enterprise is the definitive, real-world guide to planning, deploying, and managing today’s leading virtual infrastructure platform in mission-critical environments.

 

Drawing on his extensive experience consulting on large-scale ESX Server implementations,...

Programming Microsoft's Clouds: Windows Azure and Office 365
Programming Microsoft's Clouds: Windows Azure and Office 365

This book is intended for developers interested in learning more about how to develop against the set of Microsoft cloud services: Windows Azure and Office 365. In some cases, you can combine the two technologies to build your solution, but in other cases you will use only one of the cloud solutions, so understanding what each has to offer...

Fabrication of SiGe HBT BiCMOS Technology
Fabrication of SiGe HBT BiCMOS Technology
While the idea of cleverly using silicon–germanium (SiGe) and silicon (Si) strained-layer epitaxy to practice bandgap engineering of semiconductor devices in the highly manufacturable Si material system is an old one, only in the past decade has this concept become a practical reality. The final success of creating novel Si...
Expert Oracle RAC Performance Diagnostics and Tuning
Expert Oracle RAC Performance Diagnostics and Tuning

Expert Oracle RAC Performance Diagnostics and Tuning provides comprehensive coverage of the features, technology and principles for testing and tuning RAC databases. The book takes a deep look at optimizing RAC databases by following a methodical approach based on scientific analysis rather than using a speculative approach, twisting...

CISA: Certified Information Systems Auditor Study Guide
CISA: Certified Information Systems Auditor Study Guide
Take charge of your career with certification that can increase your marketability. Demand for information systems auditors has increased dramatically since the adoption of the Sarbanes-Oxley Act in 2002. Now you can prepare for CISA certification and improve your job skills with the targeted training you'll receive in this valuable book.

...

Implementing ITIL Configuration Management
Implementing ITIL Configuration Management
Practical, Real-World ITIL Configuration Management–From Start to Finish

 

The IT Infrastructure Library® (ITIL) places the “best practices” in IT operations at your command. ITIL helps you make better technology choices, manages IT more effectively,...

Hands-On System Programming with Linux: Explore Linux system programming interfaces, theory, and practice
Hands-On System Programming with Linux: Explore Linux system programming interfaces, theory, and practice

Get up and running with system programming concepts in Linux

Key Features

  • Acquire insight on Linux system architecture and its programming interfaces
  • Get to grips with core concepts such as process management, signalling and pthreads
  • Packed with industry...
unlimited object storage image
Result Page: 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy