Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Visual Design for the Modern Web
Visual Design for the Modern Web
Just as great artists must understand their tools, great Web designers must understand the technology behind their art. In Visual Design for the Web, author Penny McIntire shows novice Web designers how to use their tools--including HTML, CSS, and JavaScript--in conjunction with the principles of aesthetics and usability to become masters of their...
The Data Access Handbook: Achieving Optimal Database Application Performance and Scalability
The Data Access Handbook: Achieving Optimal Database Application Performance and Scalability
Performance and scalability are more critical than ever in today’s enterprise database applications, and traditional database tuning isn’t nearly enough to solve the performance problems you are likely to see in those applications. Nowadays, 75-95% of the time it takes to process a data request is typically spent in the database...
Network Performance Toolkit: Using Open Source Testing Tools
Network Performance Toolkit: Using Open Source Testing Tools
All of the tools you’ll need to ensure that your network and its applications are performing properly for your environment

As a network administrator, you are the first person customers come to whenever there are performance issues with the network. You have to keep the customers satisfied, but the complaints don’t make your job...

Exploring IBM eServer zSeries and S/390 Servers: See Why IBM's Redesigned Mainframe Computer Family Has Become More Popular than Ever!
Exploring IBM eServer zSeries and S/390 Servers: See Why IBM's Redesigned Mainframe Computer Family Has Become More Popular than Ever!
Considered the bible of the IBM zSeries and S/390 world, this new edition closely examines the role large computers will play in the new century. All the new hardware models and operating system products—Linux, VSE, MVS, VM, AIX, and Open Edition—are now available for the zSeries and are fully explained, as are critical business issues...
Windows Vista: Beyond the Manual
Windows Vista: Beyond the Manual
Windows Vista: Beyond the Manual is a comprehensive guide to installing, configuring, exploiting, and using the richest Microsoft client operating system on the market. It guides you through the complexities of configuring and running a successful Windows Vista client computer. It also takes an in-depth look at the wealth of features and...
Pro WF: Windows Workflow in .NET 3.0 (Expert's Voice in .Net)
Pro WF: Windows Workflow in .NET 3.0 (Expert's Voice in .Net)
Windows Workflow Foundation is a ground-breaking addition to the core of the .NET Framework that allows you to orchestrate human and system interactions as a series of workflows that can be easily mapped, analyzed, adjusted, and implemented.

As business problems become more complex, the need for a workflow-based solution has never been more...

Challenges of Information Technology Education in the 21st Century
Challenges of Information Technology Education in the 21st Century
When teaching in the area of Information Technology, it is necessary to constantly update curriculum, to deal with new challenges brought forth by students, and to modify teaching methods to accommodate these new situations. Challenges of Information Technology Education in the 21st Century strives to address a variety of pertinent questions...
Pro Windows Small Business Server 2003
Pro Windows Small Business Server 2003
Microsofts Windows Small Business Server has taken the market by storm, offering a compelling solution for business with 50 or fewer employees. Pro Windows Small Business Server 2003 is a complete guide for you intermediate-to-advanced administrators who have deployed SBS, gotten it working for your organizations, and want to take the...
Computer Security Handbook
Computer Security Handbook

The definitive formula for computer security, from power outages to theft and sabotage

Whether you are in charge of many computers, or even one important one, there are immediate steps you can take to safeguard your company’s computer system and its contents. The Computer Security Handbook provides a readable and...

Distributed Database Management Systems: A Practical Approach
Distributed Database Management Systems: A Practical Approach

This book addresses issues related to managing data across a distributed database system. It is unique because it covers traditional database theory and current research, explaining the difficulties in providing a unified user interface and global data dictionary. The book gives implementers guidance on hiding discrepancies across systems and...

Database Archiving: How to Keep Lots of Data for a Very Long Time (The MK/OMG Press)
Database Archiving: How to Keep Lots of Data for a Very Long Time (The MK/OMG Press)
This book is about archiving database data. It is not a general purpose book about archiving. It is also not a book about archiving any or all kinds of data. It is about archiving data in traditional IT databases (e.g., relational databases, hierarchical databases, and structured data in computer files). Examples of source data for archiving are...
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for...
unlimited object storage image
Result Page: 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy