Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Storage Area Networks: Designing and Implementing a Mass Storage System
Storage Area Networks: Designing and Implementing a Mass Storage System

The complete guide to SAN technology for every implementer and manager!

Every month, enterprises require more information, delivered faster, with greater reliability—and traditional data storage methods no longer suffice. Enter the Storage Area Network (SAN), which can store enormous...

Pattern-Oriented Software Architecture, Patterns for Resource Management (Wiley Software Patterns Series)
Pattern-Oriented Software Architecture, Patterns for Resource Management (Wiley Software Patterns Series)

This is a book about patterns for resource management in software systems. The patterns provide solutions for problems that are typically encountered by software architects and developers when trying to provide an effective and efficient means of managing resources in a software system. Efficient management of resources is critical in the...

Sas 9.1 Companion For Windows: Books
Sas 9.1 Companion For Windows: Books
Every SAS Windows user will benefit from this companion! This companion describes aspects of the SAS interface and the SAS language that are specific to the Microsoft Windows NT, Windows 2000, and Windows XP environments. You will learn how to configure and customize your SAS session to accommodate the way you like to work, manage SAS libraries and...
Stealing the Network: How to Own the Box
Stealing the Network: How to Own the Box
Stealing the Network: How to Own the Box is a unique book in the fiction department.
It combines stories that are fictional with technology that is real.While
none of these specific events have happened, there is no reason why they could
not.You could argue it provides a roadmap for criminal hackers, but I say it does
something
...
Ethernet Passive Optical Networks (McGraw-Hill Communications Engineering)
Ethernet Passive Optical Networks (McGraw-Hill Communications Engineering)
THE DEFINITIVE GUIDE TO EPON
Written by one of the authors of the IEEE802.3ah standard, this is the first book to fully explain the EPON architecture, analyze its performance, and annotate the standard.

Clearly addressing efficiency, performance, and implementation issues, Ethernet Passive Optical Networks...

Integration of ICT in Smart Organizations
Integration of ICT in Smart Organizations
The production and service of the 21st century is based on distributed or networked organizations. The denomination of these organizations can be different (extended-, virtual-, smart-organization, etc.), but there are some main important common characteristics. In this type of organizations, flexible, independent organizational and production...
Hacking Exposed: Network Security Secrets & Solutions
Hacking Exposed: Network Security Secrets & Solutions
In today's round-the-clock, hyper-connected, all-digital economy, computer security is everyone's business. Hacking Exposed: Network Security Secrets & Solutions, Second Edition brings even more in-depth insight into how hackers infiltrate e-business, and how they can be stopped. Security insiders Stuart McClure, Joel Scambray, and George Kurtz...
Network Security Assessment: From Vulnerability to Patch
Network Security Assessment: From Vulnerability to Patch
This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks.

This is unique in that it details both the management and technical skill and tools
...
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Communication between people has changed with the invention of the telephone. The ability to communicate across continents in real-time has also helped our society in several dimensions including entertainment, trade, finance, and defense. But this new capability did not come without an investment. Building an international telephony...

CCNA Portable Command Guide (2nd Edition) (Self-Study Guide)
CCNA Portable Command Guide (2nd Edition) (Self-Study Guide)
Scott Empson is currently the associate chair of the bachelor of applied information systems technology degree program at the Northern Alberta Institute of Technology in Edmonton, Alberta, Canada, teaching Cisco® routing, switching, and network design courses in certificate, diploma, and applied degree programs at the post-secondary level. He...
VMware ESX Server in the Enterprise: Planning and Securing Virtualization Servers
VMware ESX Server in the Enterprise: Planning and Securing Virtualization Servers
VMware ESX Server in the Enterprise is the definitive, real-world guide to planning, deploying, and managing today’s leading virtual infrastructure platform in mission-critical environments.

 

Drawing on his extensive experience consulting on large-scale ESX Server implementations,...

The Best Damn Exchange, SQL and IIS Book Period
The Best Damn Exchange, SQL and IIS Book Period
Exchange, SQL and IIS are at the core of most Microsoft enterprise servers. The 2007 releases of these products, along with the release of Windows Vista and Windows 2008 Server, represents the biggest overhaul of Windows enterprise products since Windows 2000. The dramatic changes to security tools and the addition of features that support...
unlimited object storage image
Result Page: 343 342 341 340 339 338 337 336 335 334 333 332 331 330 329 328 327 326 325 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy