Home | Amazing | Today | Tags | Publishers | Years | Search 
Microsoft® SQL Server® 2008 Analysis Services Step by Step
Microsoft® SQL Server® 2008 Analysis Services Step by Step

Teach yourself to use SQL Server 2008 Analysis Services for business intelligence?one step at a time. You'll start by building your understanding of the business intelligence platform enabled by SQL Server and the Microsoft Office System, highlighting the role of Analysis Services. Then, you’ll create a simple...

Asterisk Cookbook
Asterisk Cookbook

Asterisk has a wealth of features to help you customize your PBX to fill very specific business needs. This short cookbook offers recipes for tackling dialplan fundamentals, making and controlling calls, and monitoring channels in your PBX environment. Each recipe includes a simple code solution you can put to work immediately, along...

Scaling MongoDB
Scaling MongoDB

This text is for MongoDB users who are interested in sharding. It is a comprehensive look at how to set up and use a cluster.

This is not an introduction to MongoDB; I assume that you understand what a document, collection, and database are, how to read and write data, what an index is, and how and why to set up a...

IBM Rational ClearCase 7.0: Master the Tools That Monitor, Analyze, and Manage Software Configurations
IBM Rational ClearCase 7.0: Master the Tools That Monitor, Analyze, and Manage Software Configurations

My first encounter with software configuration management was way back in the eighties while at university – and way before I knew that it was called software configuration management. We were doing a student project and were five people working on this group project. I was coding away, slipping into experiments that eventually took the...

Cacti 0.8 Beginner's Guide
Cacti 0.8 Beginner's Guide

Generally speaking, network management refers to the tasks associated with running a network, along with the software, tools, and technology required to support these tasks. One major part of running a network is to monitor the devices on it in order to know
what is happening.

One definition of network management from the...

Moodle Security
Moodle Security

Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks. Learn how to safeguard Moodle to keep the bad guys...

VCP4 Exam Cram: VMware Certified Professional (2nd Edition)
VCP4 Exam Cram: VMware Certified Professional (2nd Edition)

Virtualization is one of the hottest topics in the tech industry today. The leader in the virtualization space at the present time is without a doubt VMware with its virtual infrastructure offering. As VMware software began to take its place in the data center and demand respect in the industry, the need for a...

Microsoft Windows Home Server 2011 Unleashed (3rd Edition)
Microsoft Windows Home Server 2011 Unleashed (3rd Edition)

Covers the newest version of WHS!

 

This is the most comprehensive, practical, and useful guide to the brand-new version of Windows Home Server 2011. Paul McFedries doesn’t just cover all facets of running Windows Home Server: He shows how to use it...

30 Arduino Projects for the Evil Genius
30 Arduino Projects for the Evil Genius

30 Ways to Have Some Computer-Controlled Evil Fun!

This wickedly inventive guide shows you how to program and build a variety of projects with the Arduino microcontroller development system. Covering Windows, Mac, and Linux platforms, 30 Arduino Projects for the Evil Genius gets you up to speed with the simplified C...

Digital Preservation for Heritages: Technologies and Applications
Digital Preservation for Heritages: Technologies and Applications

Cultural heritages include rich information related to social, historical and cultural values. Affected by climate, environmental and other factors, some valuable heritage information is threatened through destruction or disappearance, and some is still not utilized sufficiently. How to investigate and utilize such information...

Oracle Streams 11g Data Replication (Osborne ORACLE Press Series)
Oracle Streams 11g Data Replication (Osborne ORACLE Press Series)

Master Oracle Streams 11g Replication

Enable real-time information access and data sharing across your distributed framework using the expert information in this Oracle Press guide. Oracle Streams 11g Data Replication explains how to set up and administer a unified enterprise data sharing infrastructure. Learn how...

Keynote for iPad: Visual QuickStart Guide
Keynote for iPad: Visual QuickStart Guide

Welcome to Keynote for iPad: Visual QuickStart Guide. As the author of the first book about Keynote for Macintosh, I’m excited to also have the opportunity to write a book about the mobile version, Keynote for iPad.

I start the book with an overview of Keynote, move on to creating your first presentation, and...

Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy