Home | Amazing | Today | Tags | Publishers | Years | Search 
Cacti 0.8 Beginner's Guide
Cacti 0.8 Beginner's Guide

Generally speaking, network management refers to the tasks associated with running a network, along with the software, tools, and technology required to support these tasks. One major part of running a network is to monitor the devices on it in order to know
what is happening.

One definition of network management from the...

Practical System Reliability
Practical System Reliability

THE RISE OF THE INTERNET, sophisticated computing and communications technologies, and globalization have raised customers’ expectations of powerful “always on” services. A crucial characteristic of these “always on” services is that they are highly available; if the customer cannot get a search result,...

CERT Resilience Management Model (RMM): A Maturity Model for Managing Operational Resilience
CERT Resilience Management Model (RMM): A Maturity Model for Managing Operational Resilience

CERT® Resilience Management Model (CERT-RMM) is an innovative and transformative way to manage operational resilience in complex, risk-evolving environments. CERT-RMM distills years of research into best practices for managing the security and survivability of people, information, technology, and facilities. It...

The New C Standard: A Cultural and Economic Commentary
The New C Standard: A Cultural and Economic Commentary

This book contains a detailed analysis of the International Standard for the C language,-3.1 excluding the library from a number of perspectives. The organization of the material is unusual in that it is based on the actual text of the published C Standard. The unit of discussion is the individual sentences from the C Standard (2022 of...

IT Auditing Using Controls to Protect Information Assets, 2nd Edition
IT Auditing Using Controls to Protect Information Assets, 2nd Edition

When we began writing this book, we had a fundamental tenet: Write a clear handbook for creating the organization’s IT audit function and for performing their IT audits. We wanted this book to provide more than checklists and textbook theories but instead to provide real-life practical guidance from people who have performed IT...

Modelling Systems: Practical Tools and Techniques in Software Development
Modelling Systems: Practical Tools and Techniques in Software Development

For developers of computer-based systems, capturing and understanding the complex functional requirements and behaviour of software components has come to represent a considerable challenge. This book aims to equip readers with skills and techniques which will help them to address this challenge. It does so by stressing the value of...

Guide to ILDJIT (SpringerBriefs in Computer Science)
Guide to ILDJIT (SpringerBriefs in Computer Science)

We are all familiar with the time-honored idea of a Virtual Machine that is neutral with respect to computer architecture and can be used to execute a high-level language, after its translation to the VM byte-code. This approach can be found in several successful mono-language systems, that support popular languages such as Java or...

Handbook of Human Factors in Web Design, Second Edition (Human Factors and Ergonomics)
Handbook of Human Factors in Web Design, Second Edition (Human Factors and Ergonomics)

Since the World Wide Web became widely available in the mid 1990s, Web-based applications have developed rapidly. The Web has come to be used by a range of people for many different purposes, including online banking, e-commerce, distance education, social networking, data sharing, collaborating on team projects, and...

Networking Fundamentals: Wide, Local and Personal Area Communications
Networking Fundamentals: Wide, Local and Personal Area Communications

Information networking has emerged as a multidisciplinary diversified area of research over the past few decades. From traditional wired telephony to cellular voice telephony and from wired access to wireless access to the Internet, information networks have profoundly impacted our lifestyle. At the time of writing, over 3 billion...

The Complete IS-IS Routing Protocol
The Complete IS-IS Routing Protocol
IS-IS has always been my favourite Interior Gateway Protocol. Its elegant simplicity, its well-structured data formats, its flexibility and easy extensibility are all appealing – IS-IS epitomizes link-state routing. Whether for this reason or others, IS-IS is the IGP of choice in some of the world’s largest networks....
Chemical testing of textiles (Woodhead Publishing Series in Textiles)
Chemical testing of textiles (Woodhead Publishing Series in Textiles)
It has long been my desire to contribute to a textbook that is solely devoted to the chemical analysis of textiles. Thus, when Woodhead Publishing contacted me about editing this book, I enthusiastically accepted the offer. Now, with the hard work of a team of contributors who are professors, material researchers and textile analysts from...
Microsoft SQL Server 2012 T-SQL Fundamentals
Microsoft SQL Server 2012 T-SQL Fundamentals
I’m very happy that Itzik has managed to find the time and energy to produce a book about T-SQL fundamentals. For many years, Itzik has been using his great Microsoft SQL Server teaching, mentoring, and consulting experience to write books on advanced programming subjects, leaving a significant gap not only...
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy