Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Docker Cookbook: Over 100 practical and insightful recipes to build distributed applications with Docker , 2nd Edition
Docker Cookbook: Over 100 practical and insightful recipes to build distributed applications with Docker , 2nd Edition

Leverage Docker to deploying software at scale

Key Features

  • Leverage practical examples to manage containers efficiently
  • Integrate with orchestration tools such as Kubernetes for controlled deployments
  • Learn to implement best practices on improving...
Group Policy: Fundamentals, Security, and the Managed Desktop
Group Policy: Fundamentals, Security, and the Managed Desktop

Get up to speed on the latest Group Policy tools, features, and best practices

Group Policy, Fundamentals, Security, and the Managed Desktop, 3rd Edition helps you streamline Windows and Windows Server management using the latest Group Policy tools and techniques. This updated edition covers Windows 10...

Hardening Windows, Second Edition
Hardening Windows, Second Edition

Hardening is the process of protecting a system against unknown threats. System administrators harden against that which they think could be a threat. Administrators know the Internet is a hostile environment. Although they can't tell, for example, that a hacker will attempt to gain access to the SQL server next Tuesday, they can bet...

Microsoft Windows 2000 Scripting Guide
Microsoft Windows 2000 Scripting Guide

Welcome to the Microsoft® Windows® 2000 Scripting Guide.

As computers and computer networks continue to grow larger and more complex, system administrators continue to face new challenges. Not all that long ago, system administration was limited to managing a...

Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

Flash Application Design Solutions: The Flash Usability Handbook
Flash Application Design Solutions: The Flash Usability Handbook
Flash Application Design Solutions shows you how to harness the power of ActionScript 2.0 and make the most of the improved design tools of Flash 8 to create usable, intuitive Flash interfaces.

In this book, you'll find a number of concrete Flash usability solutions that use elements such as navigation menus, data filtering, forms,
...
Oracle 11g For Dummies (Computer/Tech)
Oracle 11g For Dummies (Computer/Tech)
Are you a seasoned system administrator charged with setting up an Oracle database? Or did you suddenly become a DBA by default? If database administration with Oracle is part of your job, you’ll be glad to have Oracle 11g For Dummies in your cubicle.

This nuts-and-bolts guide walks you through the mysteries of Oracle and...

WildFly: New Features
WildFly: New Features

Get acquainted with the exciting new features that WildFly has to offer with this book and ebook

Overview

  • Learn about the latest WildFly components, including CLI management, classloading, and custom modules
  • Customize your web server and applications by managing logs, virtual hosts, and the...
Performance and Fault Management (Cisco Press Core Series)
Performance and Fault Management (Cisco Press Core Series)

The key to efficiently running networks is proper management. Performance management measures a network's level of operation, ensures that it maintains an acceptable level, and provides information for expanding the network. Fault management detects, logs, and notifies users of network problems and automatically fixes many...

Privacy at Risk: The New Government Surveillance and the Fourth Amendment
Privacy at Risk: The New Government Surveillance and the Fourth Amendment
"The discussion of surveillance techniques is excellent, the legal analysis is sound, and the case for Fourth Amendment reform compelling. Recommended."-Choice (D. E. Smith Choice )

Without our consent and often without our knowledge, the government can constantly...
Drupal Intranets with Open Atrium
Drupal Intranets with Open Atrium

In today's global society, online collaboration has gained tremendous importance as businesses look for ways to share ideas and collaborate easily. Open Atrium is a powerful and flexible Drupal installation that provides intranet solutions to businesses and organizations for sharing ideas. It is used to create intranets where co-workers...

Microsoft Windows XP Registry Guide
Microsoft Windows XP Registry Guide

The registry is the heart and soul of Microsoft Windows XP. In my other registry books, I said the same thing about the registry in every version of Windows since Microsoft Windows 95, and by the time you're finished reading this book, I hope you'll agree. The registry contains the configuration data that makes the operating system work. The...

Result Page: 12 11 10 9 8 7 6 5 4 3 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy