Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Enterprise Mac Managed Preferences
Enterprise Mac Managed Preferences

Many systems administrators on the Mac need a way to manage machine configuration after initial setup and deployment. Apple’s Managed Preferences system (also known as MCX) is under-documented, often misunderstood, and sometimes outright unknown by sys admins. MCX is usually deployed in conjunction with an OS X server, but it can also...

Clinical Studies Management: A Practical Guide to Success
Clinical Studies Management: A Practical Guide to Success

What if you were suddenly in charge? After the initial excitement of a "battlefield promotion" wears off, you need to get in the trenches and get the job done. And if you are already in the trenches, you need quick access to information that will make your job easier. A comprehensive desk reference and guide, Clinical Studies...

Creating Mobile Apps with Sencha Touch 2
Creating Mobile Apps with Sencha Touch 2

If you have basic to intermediate knowledge of Sencha Touch, this tutorial will give you a deep insight into its full capabilities when creating mobile apps. Learn the language through building ten unique applications.

Overview

  • Learn the Sencha Touch programming language by building real, working...
Emotional Terrors in the Workplace: Protecting Your Business' Bottom Line
Emotional Terrors in the Workplace: Protecting Your Business' Bottom Line
The failure to adequately address the victims and the emotional dimensions of corporate problems changes adverse events into crises and catastrophes. This book aims to arm employees and managers with the tools necessary to manage emotional distress.

Emotional Terrors in the Workplace: Protecting Your Business' Bottom Line is an...

Software Fortresses: Modeling Enterprise Architectures
Software Fortresses: Modeling Enterprise Architectures

This book introduces a new approach for modeling large enterprise systems: the software fortress model. In the software fortress model, an enterprise architecture is viewed as a series of self-contained, mutually suspicious, marginally cooperating software fortresses interacting with each other through carefully crafted and meticulously managed...

Great People Decisions: Why They Matter So Much, Why They are So Hard, and How You Can Master Them
Great People Decisions: Why They Matter So Much, Why They are So Hard, and How You Can Master Them
Great organizations are made up of great people. And for leaders at all levels within those organizations, the ability to find, hire, integrate, and retain great people is an absolutely critical skill—critical to their organization's success, and critical to their own success.

But for most people, making great appointments is difficult,...

Getting Started with InstallShield Developer and Windows Installer Setups
Getting Started with InstallShield Developer and Windows Installer Setups
InstallShield Developer is the most powerful and flexible solution for creating today’s Windows Installer setups. And this book is your authoritative guide to this most critical step in the software release process: the installation.

InstallShield authority Bob Baker guides you through Developer’s integrated development environment...

Security Monitoring with Cisco Security MARS (Networking Technology: Security)
Security Monitoring with Cisco Security MARS (Networking Technology: Security)
Learn the differences between various log aggregation and correlation systems
  • Examine regulatory and industry requirements
  • Evaluate various deployment scenarios
  • Properly size your deployment
  • Protect the Cisco Security MARS appliance from attack
  • Generate reports,...
Java Security (2nd Edition)
Java Security (2nd Edition)
One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is...
Mastering Active Directory for Windows Server 2008
Mastering Active Directory for Windows Server 2008
Detailed Coverage of Active Directory for Windows Server 2008, 2003, 2003 R2, and 2000

If you are responsible for the day-to-day operations of Active Directory, you need this book. From Windows Server 2000 up through the new features available in Windows Server 2008, this comprehensive guide gives you the practical...

Changing Software Development: Learning to Become Agile
Changing Software Development: Learning to Become Agile

“Successful companies have known the importance of continuous change and learning for a long time; this is the first book that describes these concepts in an organic way in the context of software development. A must read for everybody involved in this business.”

Giovanni Asproni, Director, Asprotunity...

Cisco Voice over IP (CVOICE) (Authorized Self-Study Guide) (3rd Edition)
Cisco Voice over IP (CVOICE) (Authorized Self-Study Guide) (3rd Edition)
Cisco Voice over IP (CVOICE), Third Edition, is a Cisco-authorized, self-paced learning tool for CCVP foundation learning. This book provides you with the knowledge and skills required to plan, design, and deploy a Cisco voice-over-IP (VoIP) network and to integrate gateways and gatekeepers into an enterprise VoIP network. By reading this...
unlimited object storage image
Result Page: 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122 121 120 119 118 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy