Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Securing HP NonStop Servers in an Open Systems World: TCP/IP, OSS and SQL
Securing HP NonStop Servers in an Open Systems World: TCP/IP, OSS and SQL
This second handbook represents the efforts of many individuals at XYPRO, who collectively have over 250 years of experience with the HP NonStop platform. In addition, we’ve been privileged to work with a group of contributors and expert reviewers from the HP NonStop Server user community. Their cooperation and experience added dimension to...
Integrating Service Level Agreements: Optimizing Your OSS for SLA Delivery
Integrating Service Level Agreements: Optimizing Your OSS for SLA Delivery
Uncover a revolutionary approach to SLAs that will help you gain a competitive advantage in the field

The use of Service Level Agreements (SLAs) will soon become the prevailing business model for delivering a large number of products and services. SLAs offer service providers the ability to distinguish themselves from the competition in...

The Best Damn Cisco Internetworking Book Period
The Best Damn Cisco Internetworking Book Period
Cisco is almost synonymous with networking.There is almost no area of networking in which
Cisco is not a key player, or is not making inroads.You name it Cisco makes it—routers, switches,
firewalls, management software, and so on. It can be quite an undertaking to locate and acquire
all of the information needed to configure,
...
Successful OSS Project Design and Implementation
Successful OSS Project Design and Implementation

The open source phenomenon has attracted an increased interest among commercial firms and governments. It is becoming one of the most influential paradigm shifts not only in software development but in social and economic value creation as well. While software development is perhaps the most prominent example of open source, its principles...

Coding Freedom: The Ethics and Aesthetics of Hacking
Coding Freedom: The Ethics and Aesthetics of Hacking

Who are computer hackers? What is free software? And what does the emergence of a community dedicated to the production of free and open source software--and to hacking as a technical, aesthetic, and moral project--reveal about the values of contemporary liberalism? Exploring the rise and political significance of the free and open source...

Operating Systems: A Spiral Approach
Operating Systems: A Spiral Approach

We have long felt that the traditional approach to teaching about Operating Systems (OSs) was not the best approach. The purpose of this book is to support a different approach to this task. When studying any complex domain of knowledge, the order in which one learns the hierarchy of principles, laws, ideas, and concepts can make the...

Network Management: Accounting and Performance Strategies
Network Management: Accounting and Performance Strategies
Understanding network performance and effectiveness is now crucial to business success. To ensure user satisfaction, both service providers and enterprise IT teams must provide service-level agreements (SLA) to the users of their networks–and then consistently deliver on those commitments. Now, two of the Cisco® leading network...
Firms in Open Source Software Development: Managing Innovation Beyond Firm Boundaries
Firms in Open Source Software Development: Managing Innovation Beyond Firm Boundaries

In open innovation scenarios, firms are able to profit from technological developments that take place beyond the legal boundaries. However, in the absence of contract-based vertical command chains, such as in the case of open source software (OSS), it is difficult for firms to obtain control over the innovation project's trajectory. In...

The IP Multimedia Subsystem (IMS): Session Control and Other Network Operations
The IP Multimedia Subsystem (IMS): Session Control and Other Network Operations
There are two camps of service providers who make money off of the residential Internet users today. Camp one is made up of the Googles, Yahoos, and AOLs who are often referred to as “over the top” or WEB 2.0 service providers. This camp doesn’t need IMS, or at least they haven’t shown much interest in IMS. On the other...
BSD UNIX Toolbox: 1000+ Commands for FreeBSD, OpenBSD and NetBSD
BSD UNIX Toolbox: 1000+ Commands for FreeBSD, OpenBSD and NetBSD
Explore a ton of powerful BSD UNIX commands

This handy, compact guide teaches you to use BSD UNIX systems as the experts do: from the command line. Try out more than 1,000 commands to find and get software, monitor system health and security, and access network resources. Apply the skills you learn from this book to use and...

Open Source Software for Digital Forensics
Open Source Software for Digital Forensics

Open Source Applications
Springer Book Series
Editor: Ernesto Damiani, University of Milan, Italy
http://sesar.dti.unimi.it/ossbook/

Open Source Software for Digital Forensics is the first book dedicated to the use of FLOSS (Free Libre Open Source Software) in...

Open Source Systems Security Certification
Open Source Systems Security Certification
Open Source Advances in Computer Applications book series provides timely technological and business information for:

Enabling Open Source Systems (OSS) to become an integral part of systems and devices produced by technology companies;

Inserting OSS in the critical path of complex network development and embedded...

unlimited object storage image
Result Page: 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy