Home | Amazing | Today | Tags | Publishers | Years | Search 
iPad Enterprise Application Development BluePrints
iPad Enterprise Application Development BluePrints

With the release of the iPad and the iOS 5, this latest release comes packed with some great new features and improvements to the various frameworks and contains over 1,500 new APIs. You will learn how to integrate iCloud storage and how to go about using the Facebook and the OpenGraph APIs, as well as applying the various image and...

The Official VCP5 Certification Guide (VMware Press Certification)
The Official VCP5 Certification Guide (VMware Press Certification)

Trust the bestselling Official Cert Guide series from VMware Press to help you learn, prepare, and practice for VCP5 exam success. They are the only VMware authorized self-study books and are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your...

Quantitative Remote Sensing of Land Surfaces
Quantitative Remote Sensing of Land Surfaces
Remote sensing has entered a new era in the twenty-first century with a series of operating satellites from the NASA Earth Observing System (EOS) program, other international programs, and commercial programs. Since November 2000 the first civilian spaceborne hyperspectral sensor, Hyperion, has observed land surfaces on the...
Managing and Optimizing VMware vSphere Deployments
Managing and Optimizing VMware vSphere Deployments

In our experience as consultants, VMware vSphere is the most robust virtualization

solution on the market. The technology is proven and the user base is large.

Although the benefits of virtualization using vSphere are many, proper planning is required to gain these benefits from a vSphere
...
OpenVPN 2 Cookbook
OpenVPN 2 Cookbook

OpenVPN is one of the world's most popular packages for setting up a Virtual Private Network (VPN). OpenVPN provides an extensible VPN framework which has been designed to ease site-specific customization, such as providing the capability to distribute a customized installation package to clients, or supporting alternative authentication...

Aston University 'Branding' Bundle: Creating Powerful Brands, Fourth Edition
Aston University 'Branding' Bundle: Creating Powerful Brands, Fourth Edition
As we look forward with confidence that this new edition significantly benefits students and managers, we look back to how this book became a well established core text in many business schools internationally and amongst a lot of managers. It seems not that long ago when we embarked on this project, yet as our publisher...
The Drinking Water Handbook, Second Edition
The Drinking Water Handbook, Second Edition

When you open the tap to fill your glass with drinking water, you expect the water to be of good quality. But is the water from your tap really safe? The second edition of an industry-wide bestseller, The Drinking Water Handbook explains the many processes employed to make water safe to drink. Starting at the source, it...

Puppet 3 Cookbook
Puppet 3 Cookbook

A revolution is happening in web operations. Configuration management tools can build servers in seconds, and automate your entire network. Tools like Puppet are essential to taking full advantage of the power of cloud computing, and building reliable, scalable, secure, high-performance systems. More and more systems administration and IT...

Fish Physiology: Organic Chemical Toxicology of Fishes, Volume 33: Fish Physiology Volume 33
Fish Physiology: Organic Chemical Toxicology of Fishes, Volume 33: Fish Physiology Volume 33

Fish Physiology: Organic Chemical Toxicology of Fishes discusses the different types of organic chemical contaminants and their respective toxic effects in fish. The book also covers the detection of dissolved organic compounds and methods to assess organic toxicity. Substances addressed in this book include organometallics,...

VMware View Security Essentials
VMware View Security Essentials

Most people associate security with network security and focus on firewalls and network monitoring. However, there is more to security than that. Security starts with the establishment of a stable environment, protecting this environment not only from intrusion, but also from malicious intent. It is about tracking the issue and recovering...

Performance Testing With JMeter 2.9
Performance Testing With JMeter 2.9

Performance testing with JMeter 2.9 is critical to the success of any software product launch and continued scalability. Irrespective of the size of the application’s user base, it’s vital to deliver the best user experience to consumers. Apache JMeter is an excellent testing tool that provides an insight into how applications...

Textbook of Neurointensive Care
Textbook of Neurointensive Care

This updated and refined new edition is the only book to provide a comprehensive approach to the intensive care of neurologically injured patients from the emergency room and ICU through the operating room and post-surgical period. It reviews neuroanatomy, neuroradiology, and neurophysiology, examines the neurological problems most frequently...

Result Page: 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy