Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Linux on HP Integrity Servers
Linux on HP Integrity Servers
Companies are increasingly turning to Linux on HP Integrity systems for high-performance computing, large enterprise and database applications, and 64-bit application development. However, Linux administration in the HP Integrity's Itanium® 2-based environment is significantly different than on conventional IA-32 platforms. Now, there's a...
Global Brand Strategy: Unlocking Brand Potential Across Countries, Cultures & Markets
Global Brand Strategy: Unlocking Brand Potential Across Countries, Cultures & Markets

In Global Brand Strategy, Sicco van Gelder tackles this central issue head on. He shows how both global and local brand management need to agree on a common basis for their brand strategy and planning. Drawing on his extensive experience, he has created a unique framework—the Global Brand Proposition Model—which enables them...

Concepts of Database Management
Concepts of Database Management
This concise yet comprehensive introduction to fundamental database concepts is an indispensable resource to develop your knowledge of database management concepts. Now in its sixth edition, Concepts of Database Management maintains the focus on real-world cases that made previous editions so effective addressing the most current database issues...
How: Why How We Do Anything Means Everything...in Business (and in Life)
How: Why How We Do Anything Means Everything...in Business (and in Life)
The flood of information and unprecedented transparency reshaping today's business world has dramatically changed the rules of the game. It's no longer what you do that sets you apart from others, but how you do what you do. Whats are commodities, easily duplicated or reverse-engineered. Sustainable advantage and enduring success—for both...
Advanced Error Control Techniques for Data Storage Systems
Advanced Error Control Techniques for Data Storage Systems
With the massive amount of data produced and stored each year, reliable storage and retrieval of information is more crucial than ever. Robust coding and decoding techniques are critical for correcting errors and maintaining data integrity. Comprising chapters thoughtfully selected from the highly popular Coding and Signal Processing for Magnetic...
Network Infrastructure Security
Network Infrastructure Security
Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure...
The HP Virtual Server Environment: Making the Adaptive Enterprise Vision a Reality in Your Datacenter
The HP Virtual Server Environment: Making the Adaptive Enterprise Vision a Reality in Your Datacenter
Use HP virtualization to maximize IT service quality, agility, and value
  • Includes coverage of HP's new Integrity Virtual Machines, Global Workload Manager, Virtualization Manager, and Capacity Advisor

  • Plan, implement, and manage virtualization to drive maximum business...

Introduction to RF Design Using EM Simulators (Artech House Microwave Library)
Introduction to RF Design Using EM Simulators (Artech House Microwave Library)

Richly illustrated and written in an easy-to-comprehend style, this highly accessible resource provides novice engineers and engineering students with a solid introduction to the use of electromagnetics (EM) simulation in RF design. Engineers learn how to use EM software to design microwave circuits and to conduct signal integrity analysis of...

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Communication between people has changed with the invention of the telephone. The ability to communicate across continents in real-time has also helped our society in several dimensions including entertainment, trade, finance, and defense. But this new capability did not come without an investment. Building an international telephony...

Hadoop: The Definitive Guide
Hadoop: The Definitive Guide

Discover how Apache Hadoop can unleash the power of your data. This comprehensive resource shows you how to build and maintain reliable, scalable, distributed systems with the Hadoop framework -- an open source implementation of MapReduce, the algorithm on which Google built its empire. Programmers will find details for analyzing...

The SSCP Prep Guide: Mastering the Seven Key Areas of System Security
The SSCP Prep Guide: Mastering the Seven Key Areas of System Security
A one-stop source of security and privacy information for IT professionals, covering everything you’ll need to know to pass the Systems Security Certified Practitioner examination

This prep guide and general reference will help you breeze through the SSCP security certification test by greatly enhancing your understanding of how to...

Cryptography and Security Services: Mechanisms and Applications
Cryptography and Security Services: Mechanisms and Applications
Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms. Cryptography and Security Devices: Mechanisms and...
Result Page: 29 28 27 26 25 24 23 22 21 20 19 18 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy