 |
|
 Microsoft Data Protection Manager 2010
Microsoft Data Protection Manager (DPM) 2010 is a backup and recovery solution which provides continuous data protection for Windows application and file servers to seamlessly integrated disk, tape, and cloud.
This Data Protection Manager book is a practical, step-by-step tutorial that will show you how to effectively back up your... |  |  Disaster Recovery (EC-Council Disaster Recovery Professional)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |  |  Hands-On Networking Fundamentals
Hands-On Networking Fundamentals opens the world of computer networks to you. Computer networks
arc a staple in homes, offices, and organizations. Through sharing information and resources, networks
extend the power of computers worldwide. If you are new to networking or just beginning, this book is your
chance to learn about networks... |
|
 Operating System Concepts Essentials
Operating systems are an essential part of any computer system. Similarly,
a course on operating systems is an essential part of any computer-science
education. This field is undergoing rapid change, as computers are now
prevalent in virtually every application, from games for children through the
most sophisticated planning tools for... |  |  Crystal Reports 2008 Official Guide
Organizations of all sizes today find themselves increasingly awash in data, yet hungering for
information to help them meet their business objectives. These corporations, from Main
Street and Wall Street alike, have spent large amounts of time and money over the past 10
or so years implementing systems to help collect data on and... |  |  Writing Fiction For Dummies
5o, you want to write a novel? Great! Writing a novel Is a worthwhile goal.
It'll challenge you, stretch you, and change you. Getting It published will
gain you respect from your family and friends, and It may even earn you a bit
of fame and money.
But respect, fame, and money aren't the only reasons for writing a... |
|
|
 Virtualization Security (EC-Council Disaster Recovery Professional)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |  |  Information Modeling for Internet Applications
Different kinds of objects containing data are found on the Internet, including structured (e.g., relational) databases, collections of documents, and search engines. On the one hand, creating, storing, manipulating, and retrieving Internet documents can benefit from techniques known from the databases and data modeling... |  |  Managing Software Debt: Building for Inevitable Change
Shipping imperfect software is like going into debt. When you incur debt, the illusion of doing things faster can lead to exponential growth in the cost of maintaining software. Software debt takes five major forms: technical, quality, configuration management, design, and platform experience. In today’s rush to market, software debt is... |
|
Result Page: 169 168 167 166 165 164 163 162 161 160 159 158 157 156 155 154 153 152 151 |