Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Deployment of Microsoft Azure Cloud Solutions: A complete guide to cloud development using Microsoft Azure
Deployment of Microsoft Azure Cloud Solutions: A complete guide to cloud development using Microsoft Azure

Master all the important and tough decision-making aspects involved in architecting an Azure public cloud for your organization.

Key Features

  • Deploy Azure Active Directory and implement synchronization
  • Manage storage solutions with Azure network services
  • ...
Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names
Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names

This book will give you an all encompassing view of the domain name ecosystem combined with a comprehensive set of operations strategies.

Key Features

  • Manage infrastructure, risk, and management of DNS name servers. Get hands-on with factors like types of name servers, DNS queries and and...
Architecting Microsoft Azure Solutions – Exam Guide 70-535: A complete guide to passing the 70-535 Architecting Microsoft Azure Solutions exam
Architecting Microsoft Azure Solutions – Exam Guide 70-535: A complete guide to passing the 70-535 Architecting Microsoft Azure Solutions exam

Get certified as an Azure architect by acing the 70-535 Architecting Microsoft Solutions (70-535) exam using this comprehensive guide with full coverage of the exam objectives

Key Features

  • Learn to successfully design and architect powerful solutions on the Azure Cloud platform
  • ...
Professional Azure SQL Database Administration: Equip yourself with the skills you need to manage and maintain your SQL databases on the Microsoft cloud
Professional Azure SQL Database Administration: Equip yourself with the skills you need to manage and maintain your SQL databases on the Microsoft cloud

Discover how you can migrate a traditional on-premise SQL server database to a cloud-based solution with Microsoft Azure. Built with database administrators in mind, this book emulates different scenarios you might come across while working with large, complex SQL database migrations and provides solutions for effectively managing...

C++ High Performance: Boost and optimize the performance of your C++17 code
C++ High Performance: Boost and optimize the performance of your C++17 code

Write code that scales across CPU registers, multi-core, and machine clusters

Key Features

  • Explore concurrent programming in C++
  • Identify memory management problems
  • Use SIMD and STL containers for performance improvement

Book...

Fundamentals of Economics
Fundamentals of Economics

Based on the comprehensive two-semester text by the same authors, this version of Economics "boils down" the formal economic theories and concepts into their essential parts, emphasizing domestic and international applications and policy issues. Fundamentals of Economics is a concise but thorough survey of economics for instructors...

Virtualization Security: Protecting Virtualized Environments
Virtualization Security: Protecting Virtualized Environments

Securing virtual environments for VMware, Citrix, and Microsoft hypervisors

Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the technologies, best practices,...

The Blockchain Alternative: Rethinking Macroeconomic Policy and Economic Theory
The Blockchain Alternative: Rethinking Macroeconomic Policy and Economic Theory

Examine what would happen if we were to deploy blockchain technology at the sovereign level and use it to create a decentralized cashless economy. This book explains how finance and economics work today, and how the convergence of various technologies related to the financial sector can help us find solutions to problems,...

Pro iOS Security and Forensics: Enterprise iPhone and iPad Safety
Pro iOS Security and Forensics: Enterprise iPhone and iPad Safety
Examine how to keep iOS devices safe in the physical world, including creating company policies for iPhones; assessing and defending against cyber vulnerabilities and attacks; working with preinstalled as well as third party tools; and strategies for keeping your data safe including backing up and screen locks.

...
Power Plays: Energy Options in the Age of Peak Oil
Power Plays: Energy Options in the Age of Peak Oil

Many people wonder: Are we really running out of oil, or is it all a ruse to drive prices up? Is nuclear power safe and economical? Is solar energy really the key to providing plenty of carbon-free energy? Do we have enough natural gas or coal to make any loss of oil production irrelevant?

In Power Plays: Energy Options in the...

Juniper Networks  Reference Guide: JUNOS Routing, Configuration, and Architecture
Juniper Networks Reference Guide: JUNOS Routing, Configuration, and Architecture

Juniper Networks(R) Reference Guide is the ideal implementation guide to the Juniper Networks(R) family of Internet routers and the network operating system JUNOS(TM). With concise explanations of internetworking theory and detailed examples, this book teaches readers how to configure,...

Leveraging WMI Scripting (HP Technologies)
Leveraging WMI Scripting (HP Technologies)

Leveraging Scripting is the second in a series of two books dedicated to WMI. Understanding WMI, Lissoir’s first book, explained to Windows Administrators the various WMI scripting techniques and manageability capabilities of this new Windows Server 2003 platform. Illustrated with hundreds of scripts and detailed...

Result Page: 43 42 41 40 39 38 37 36 35 34 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy