Home | Amazing | Today | Tags | Publishers | Years | Search 
TcL Scripting for Cisco IOS (Networking Technology)
TcL Scripting for Cisco IOS (Networking Technology)

A guide to building and modifying Tcl scripts to automate network administration tasks

 

Streamline Cisco network administration and save time with Tcl scripting

Cisco networking professionals are under relentless pressure to...

Handbook of Data Intensive Computing
Handbook of Data Intensive Computing
This handbook is carefully edited book – contributors are worldwide experts in the field of data intensive computing and their applications. The scope of the book includes leading edge data intensive computing architectures and systems, innovative storage, virtualization, and parallel processing technologies applied in...
Master Data Management and Customer Data Integration for a Global Enterprise
Master Data Management and Customer Data Integration for a Global Enterprise

This book is about interesting and exciting new developments in the area of information management. These developments are focused on new ways of structuring, choosing, understanding, and integrating information that is needed to run a business, service customers, and comply with numerous regulatory requirements.

To...

Migrating to iPhone and iPad for .NET Developers
Migrating to iPhone and iPad for .NET Developers

Ever since I spotted and started reading my first computer book in 1981, I knew Information Technology (IT) was going to be an important part of my life. I feel privileged to have been able to make a career out of something I enjoy, and the fact that it changes on what seems to be a monthly basis means it never gets boring. It still...

Food Chemical Risk Analysis (Food Science & Safety Series)
Food Chemical Risk Analysis (Food Science & Safety Series)

The recognition that chemicals in food, whatever their origin, might present a risk to the consumer has long been recognised. However, early food regulations at the beginning of the century were primarily aimed at prevention of adulteration and fraud rather than directed at consumer safety. It is only in the second half of the century...

Microsoft SQL Server 2008 R2 Administration Cookbook
Microsoft SQL Server 2008 R2 Administration Cookbook

Most books about SQL Server take one of the two approaches. The first approach is to provide a broad introduction to SQL Server administration. While overviews are great for beginners, they don't provide enough information, leaving the reader wanting for details and practical advice. The second approach is to attempt to cover every...

Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010
Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010

The 11th International Workshop on Information Security Applications (WISA 2010)was held on Jeju Island, Korea, during August 24–26, 2010. The workshop was hosted by the Korea Institute of Information Security and Cryptology (KIISC), supported by the Electronics and Telecommunications Research Institute (ETRI) and the Korea...

The Python Standard Library by Example (Developer's Library)
The Python Standard Library by Example (Developer's Library)

Distributed with every copy of Python, the standard library contains hundreds of modules that provide tools for interacting with the operating system, interpreter, and Internet. All of them are tested and ready to be used to jump start the development of your applications. This book presents selected examples demonstrating how to use the most...

The Oracle Universal Content Management Handbook
The Oracle Universal Content Management Handbook

Enterprise Content Management (ECM) is getting a lot of attention in corporations around the world today. Corporations create a large amount of unstructured content in the form of documents, scanned content, videos, audio, photos, images, and so on. Some statistics show that more than 80 percent of a corporation's intellectual property...

Information Systems Strategic Management: An Integrated Approach (Routledge Information Systems Textbooks)
Information Systems Strategic Management: An Integrated Approach (Routledge Information Systems Textbooks)

This comprehensive guide to the strategic management of information systems within business and public sector organizations integrates the two, often disparate, domains of strategic management and information systems.  Focusing on managing information systems within a broader organizational context, it covers key issues...

Mining Complex Data (Studies in Computational Intelligence)
Mining Complex Data (Studies in Computational Intelligence)

Data mining and knowledge discovery can today be considered as stable fields with numerous efficient methods and studies that have been proposed to extract knowledge from data. Nevertheless, the famous golden nugget is still challenging. Actually, the context evolved since the first definition of the KDD process and knowledge has now...

Systems Thinking, Third Edition: Managing Chaos and Complexity: A Platform for Designing Business Architecture
Systems Thinking, Third Edition: Managing Chaos and Complexity: A Platform for Designing Business Architecture

This is an unconventional book for an unconventional reader. It is intended for those professionals who, in addition to their specialized knowledge, would like to get a handle on life so they may put their special text into its proper context. It speaks to those thinkers and practitioners who have come to realize that learning to be...

Result Page: 202 201 200 199 198 197 196 195 194 193 192 191 190 189 188 187 186 185 184 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy