Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SQL Server 2008 Administration in Action
SQL Server 2008 Administration in Action

SQL Server 2008 Administration isn't a standard SQL Server tutorial-there are dozens of those to choose from. Instead, this book breaks down the role of "SQL Server Administrator" into its key focus areas and tasks and details the techniques and best practices that make an administrator effective. In this book, a reader can...

Building a Cisco Network for WIndows 2000
Building a Cisco Network for WIndows 2000
The release of Windows 2000 Server represents a major advance in the integration of Microsoft's and Cisco's network technologies. Windows 2000 provides an LDAP-compliant directory service called Active Directory. It is accessible over any TCP/IP based internetwork, including the Internet. As such, the Active Directory is the foundation of this...
Designing for the Social Web
Designing for the Social Web
No matter what type of web site or application you’re building, social interaction among the people who use it will be key to its success. They will talk about it, invite their friends, complain, sing its high praises, and dissect it in countless ways. With the right design strategy you can use this social interaction...
Pentaho Kettle Solutions: Building Open Source ETL Solutions with Pentaho Data Integration
Pentaho Kettle Solutions: Building Open Source ETL Solutions with Pentaho Data Integration

A complete guide to Pentaho Kettle, the Pentaho Data lntegration toolset for ETL

This practical book is a complete guide to installing, configuring, and managing Pentaho Kettle. If you’re a database administrator or developer, you’ll first get up to speed on Kettle basics and how to apply Kettle to create ETL...

Customer Success with Microsoft Dynamics Sure Step
Customer Success with Microsoft Dynamics Sure Step

Having invested in Microsoft Dynamics, your enterprise will want to make a success of it, which is where this guide to Sure Step comes in, teaching you how to apply the methodologies to ensure optimum results.

Overview

  • Understand how Sure Step helps you envision and implement the right Microsoft Dynamics...
Maven: The Definitive Guide
Maven: The Definitive Guide

For too long, developers have worked on disorganized application projects, where every part seemed to have its own build system, and no common repository existed for information about the state of the project. Now there's help. The long-awaited official documentation to Maven is here.

Written by Maven creator
...

Software Metrics: Best Practices for Successful IT Management
Software Metrics: Best Practices for Successful IT Management
This unique book gives the technical, subject background necessary to make Software Metrics work, and presents a full lifecycle for measurement program development and implementation.

More years ago than I care to remember, let us say twenty five to thirty, Software Metrics was a curiosity confined to a few university...

Jenkins Continuous Integration Cookbook
Jenkins Continuous Integration Cookbook
Jenkins is a Java-based Continuous Integration (CI) server that supports the discovery of defects early in the software cycle. Thanks to over 400 plugins, Jenkins communicates with many types of systems, building and triggering a wide variety of tests.

CI involves making small changes to software, and then building and
...
Game Analytics: Maximizing the Value of Player Data
Game Analytics: Maximizing the Value of Player Data

Developing a successful game in today’s market is a challenging endeavor. Thousands of titles are published yearly, all competing for players’ time and attention. Game analytics has emerged in the past few years as one of the main resources for ensuring game quality, maximizing success, understanding player behavior and enhancing...

Wireless Security and Privacy: Best Practices and Design Techniques
Wireless Security and Privacy: Best Practices and Design Techniques

The trick to sound security is to begin early, know your threats,... design for security, and subject your design to thorough objective risk analyses and testing. This book will help."—From the Foreword by Gary McGraw, CTO of Cigital, and coauthor of Building Secure...

The DevOps 2.0 Toolkit: Automating the Continuous Deployment Pipeline with Containerized Microservices
The DevOps 2.0 Toolkit: Automating the Continuous Deployment Pipeline with Containerized Microservices

This book is about different techniques that help us architect software in a better and more efficient way with microservices packed as immutable containers, tested and deployed continuously to servers that are automatically provisioned with configuration management tools. It's about fast, reliable and continuous deployments with...

Proceedings of the Tiangong-2 Remote Sensing Application Conference: Technology, Method and Application (Lecture Notes in Electrical Engineering)
Proceedings of the Tiangong-2 Remote Sensing Application Conference: Technology, Method and Application (Lecture Notes in Electrical Engineering)
This book gathers a selection of peer-reviewed papers presented at the Tiangong-2 Data Utilization Conference, which was held in Beijing, China, in December 2018. As the first space laboratory in China, Tiangong-2 carries 3 new types of remote sensing payloads – the Wide-band Imaging Spectrometer (WIS), Three-dimensional Imaging...
unlimited object storage image
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy