Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Troubleshooting Remote Access Networks (CCIE Professional Development)
Troubleshooting Remote Access Networks (CCIE Professional Development)
A guide to understanding the troubleshooting tools, commands, and methodologies that enable reliable performance for remote access services

* Gain a solid grasp of enterprise telecommunications technology fundamentals, including service options and clocking, line coding, and framing in carrier systems
* Understand how network traffic
...

Service-Oriented Computing: ICSOC 2010 International Workshops PAASC
Service-Oriented Computing: ICSOC 2010 International Workshops PAASC

Welcome to the workshop program of the 8th International Conference on Service Oriented Computing (ICSOC 2010), held in San Francisco, December 2010. These workshop proceedings represent high-quality research and industry papers that showcase recent and new working developments in service-oriented computing and related fields.

...

CMS Security Handbook: The Comprehensive Guide for WordPress, Joomla, Drupal, and Plone
CMS Security Handbook: The Comprehensive Guide for WordPress, Joomla, Drupal, and Plone

As a business owner, you are probably faced with hundreds of decisions that must be made weekly. Diving headlong into a technical effort might be scary. Diving into a security and operations effort is something you likely don't know how to do.

That's where this book comes in. This book helps you fill in the blanks for...

Direct3D Programming Kick Start
Direct3D Programming Kick Start

DirectX 9, a brand-new version of Microsoft's multimedia libraries, features the latest 3D graphics technology in the form of Direct3D 9. Direct3D Programming will cover everything a C++ programmer needs to know in order to use Direct3D 9 to create interactive 3D worlds. The book begins with an overview of basic Windows and 3D programming...

Canning Spam: You've Got Mail (That You Don't Want)
Canning Spam: You've Got Mail (That You Don't Want)
We've all seen it — the e-mails that come to us from a sender we don't know and promise a frog that jumps across our screen, a low mortgage rate or a medical miracle pill. These e-mails are otherwise known as spam. Your inbox gets cluttered or worse, your computer is infected with a virus as you scratch your head, wondering how it ever...
Elasticsearch: A Complete Guide
Elasticsearch: A Complete Guide

End-to-end Search and Analytics

About This Book

  • Solve your data analytics problems with the Elastic Stack
  • Improve your user search experience with Elasticsearch and develop your own Elasticsearch plugins
  • Design your index, configure it, and distribute it ― you'll...
Emerging Spatial Information Systems and Applications
Emerging Spatial Information Systems and Applications
Spatial information systems were created manually for many years. For example, historically, the source of cholera in London in 1854 was found by John Snow, by mapping where victims of the disease lived. The graph clearly showed them to be close to the Broad Street Pump,1 one of the city’s water wells. Another example is Zipf’s Law,2...
HTML5 Guidelines for Web Developers
HTML5 Guidelines for Web Developers

In 2010, HTML5 became the buzzword on the web developer scene. Large companies, such as Google, Apple, and Microsoft, began to use the new technology. The popularity of the catchword HTML5 grew, not least of all because of the heated debate between Apple and Adobe over whether this would mean the end of Flash.

In this book,...

SPSS for Starters, Part 2 (SpringerBriefs in Statistics)
SPSS for Starters, Part 2 (SpringerBriefs in Statistics)
The small book ‘‘SPSS for Starters’’ issued in 2010 presented 20 chapters of cookbook like step by step data-analyses of clinical research, and was written to help clinical investigators and medical students analyze their data without the help of a statistician. The book served its purpose well enough, since...
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
Optimizing Wireless/RF Circuits
Optimizing Wireless/RF Circuits

Select and optimize wireless/RF circuits.

Get last-word guidelines for selecting and optimizing wireless/RF ICs with John D. Lenk's Optimizing Wireless/RF Circuits. As you'd expect from an author whose electronics guidebooks have sold over 2 million copies worldwide, instead of complex math and abstract theory this hands-on...

Automating Linux and Unix System Administration, Second Edition (Expert's Voice in Linux)
Automating Linux and Unix System Administration, Second Edition (Expert's Voice in Linux)
Whether you need a network of ten Linux PCs and a server or a datacenter with a few thousand Unix nodes, you need to know how to automate much of the installation, configuration, and standard system administration.

Build your network once using cfengine, and the network build will work, without user intervention, on any hardware you prefer....

unlimited object storage image
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy