Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
OpenNebula 3 Cloud Computing
OpenNebula 3 Cloud Computing

OpenNebula is one of the most advanced and highly-scalable open source cloud computing toolkits. If you ever wanted to understand what Cloud Computing is and how to realize it, or if you need a handy way to manage your messy infrastructure in a simple and coherent manner, this is your way.

OpenNebula 3 Cloud Computing guides you...

Windows 2000(r) Active Directory Survival Guide: Planning and Implementation
Windows 2000(r) Active Directory Survival Guide: Planning and Implementation
The biggest challenge and opportunity for IS departments approaching Windows 2000 is probably Active Directory (AD), which can reduce total cost of ownership (TCO) and simplify administration. For any IS professional or administrator, Windows 2000 Active Directory Survival Guide provides both a high-level introduction and a hands-on guide...
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading European researchers showing the present state and future directions of computer science research.

"Methods of Artificial Intelligence and Intelligent Agents" contains 13 contributions...

Carrier Grade Voice Over IP (second edition)
Carrier Grade Voice Over IP (second edition)
NEW EDITION OF---CUTTING-EDGE SOLUTIONS CUT-TO-THE-CHASE STYLE

In the race to put carrier-quality voice over IP (VoIP)——those using this book run faster and falter less. International expert Daniel Collins’ greatly enhanced Carrier Grade Voice over IP brings you leading-edge signaling schemes,...

Scalable VoIP Mobility: Integration and Deployment
Scalable VoIP Mobility: Integration and Deployment
Today's businesses, big and small, are faced with the large scale restructuring concerning daily communications. Enterprises are moving from the standard wired telephony to wired and wireless communication via internet protocol (IP), Wi-Fi, and cellular services. With the stabilization of these networks and the availability of dual-mode handsets...
Microsoft Dynamics CRM 4 Integration Unleashed
Microsoft Dynamics CRM 4 Integration Unleashed

In Microsoft® Dynamics CRM 4 Integration Unleashed, two leading experts present proven techniques, best practices, and example code for going far beyond the out-of-the-box capabilities of Dynamics CRM 4. Using these solutions and sample applications, you will enhance all of...

Enterprise DevOps Framework: Transforming IT Operations
Enterprise DevOps Framework: Transforming IT Operations

Transform your IT organization from one weighed down by set practices to one with a DevOps culture and a cloud-first strategy that is optimized by automation and other lean practices. In this engaging read, you will discover the opportunities, challenges, lessons, and rewards that CA Technologies encountered when making their agile...

Air Power and Freight: The View from the European Union and China (SpringerBriefs in Energy)
Air Power and Freight: The View from the European Union and China (SpringerBriefs in Energy)

This book addresses the challenges of planning sustainable freight transport systems (road and air) in a time when the industry faces increasing pressure from environmental limits, climate change, carbon emission targets, bottlenecks in oil supply, infrastructure shortages and urban congestion.  The author examines sustainable...

Special Edition Using FileMaker 8
Special Edition Using FileMaker 8
If you're looking for the inside scoop on the latest version of FileMaker, you've come to the right place. Authors Scott Love and Steve Lane are FileMaker experts who were involved in the development of FileMaker 8, and they bring that knowledge to you in ...
Hacking for Dummies
Hacking for Dummies
Find out if your system is vulnerable to hack attacks!

"The coverage of security topics in this book can help you avoid a hack attack."
— Stuart McClure

"To catch a thief, think like a thief." Here’s the guide that will help you do just that! It shows you how to become a "white hat...

Silicon Nanoelectronics
Silicon Nanoelectronics
Because the silicon process infrastructure is already in place and because of silicon's compatibility with current CMOS circuits, silicon nanodevices are positioned to become particularly important. Silicon Nanoelectronics examines recent developments of novel devices and materials that hold great promise for creating smaller and more powerful...
Windows Server 2008 Hyper-V: Insiders Guide to Microsoft's Hypervisor
Windows Server 2008 Hyper-V: Insiders Guide to Microsoft's Hypervisor
Hyper-V is one of the top virtualization products, and this practical guide focuses on the essentials of Windows Server 2008 Hyper-V. Written by the Microsoft team behind the Hyper-V product, this book shows you how to perform key virtualization scenarios, such as server consolidation, software test and development, and a dynamic data center and...
unlimited object storage image
Result Page: 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy