Home | Amazing | Today | Tags | Publishers | Years | Search 
Managing Oracle Fusion Applications (Oracle Press)
Managing Oracle Fusion Applications (Oracle Press)
Fusion Applications takes the concept of an Enterprise Application to a whole new level. Whether you’re in the IT department, a systems integrator, a business leader, or an end user, Fusion Applications has more of what you need, less of what you don’t, and some of what you didn’t even think possible.
...
Cfengine 3 Beginner's Guide
Cfengine 3 Beginner's Guide
This book starts off with step-by-step instructions for installing and configuring the CFEngine server and clients, and then moves on to configuring systems using CFEngine scripts. The author then walks you through the policy decision flow as well as conducting system and security audits.

This is followed by
...
America's Secret Establishment: An Introduction to the Order of Skull & Bones
America's Secret Establishment: An Introduction to the Order of Skull & Bones
The book began with an anonymous donation to the author of an 8-inch package of documents in the early 1980s. Nothing less than the membership list and supporting documents for a truly secret society the Yale Skull and Bones.

The late Johnny Johnson, of Phoenix Arizona was the spark that moved me to write first a
...
iPhone with Microsoft Exchange Server 2010 - Business Integration and Deployment
iPhone with Microsoft Exchange Server 2010 - Business Integration and Deployment
Have you been tasked with getting iPhones into the hands of your business executives, and need to ensure they can reliably and securely access corporate e-mail? This book will teach you what you need to know about getting Exchange 2010 set up and then help you deploy iPhones in a secure and manageable way.

...
Security and Privacy for Microsoft Office 2010 Users
Security and Privacy for Microsoft Office 2010 Users
SECURITY AND PRIVACY issues with computers and computer networks are constantly in the news these days, and everyone seems to be concerned about them to some degree. Businesses everywhere are worried about having sensitive customer information such as credit card numbers or email addresses stolen,...
Families in America: A Reference Handbook (Contemporary World Issues)
Families in America: A Reference Handbook (Contemporary World Issues)

Families in America: A Reference Handbook is an in-depth and multifaceted examination of the contemporary American family. The volume is designed for a wide range of readers in college, high school, and public library settings. It supplies a solid conceptual foundation of basic terms, concepts, and policies related...

The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes

Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT® Guide to Insider...

Euroscepticism: Party Politics, National Identity and European Integration (European Studies 20)
Euroscepticism: Party Politics, National Identity and European Integration (European Studies 20)

The accelerated pace of European integration since the early 1990s has been accompanied by the emergence of increasingly prominent and multiform oppositions to the process. The term Euroscepticism has appeared with growing frequency in a range of political, media, and academic discourses. Yet, the label is applied to a wide range of...

HBase in Action
HBase in Action

I got my start with HBase in the fall of 2008. It was a young project then, released only in the preceding year. As early releases go, it was quite capable, although not without its fair share of embarrassing warts. Not bad for an Apache subproject with fewer than 10 active committers to its name! That was the height of the NoSQL...

Bad Data Handbook: Cleaning Up The Data So You Can Get Back To Work
Bad Data Handbook: Cleaning Up The Data So You Can Get Back To Work

What is bad data? Some people consider it a technical phenomenon, like missing values or malformed records, but bad data includes a lot more. In this handbook, data expert Q. Ethan McCallum has gathered 19 colleagues from every corner of the data arena to reveal how they’ve recovered from nasty data problems.

From...

Windows 8 Administration Pocket Consultant
Windows 8 Administration Pocket Consultant
Writing Windows 8 Administration Pocket Consultant was a lot of fun—and a lot of work. As I set out to write this book, my initial goals were to determine how Windows 8 was different from its predecessors and what new features and options were available. As with any new operating system, I had to do a...
Windows Server 2012 Pocket Consultant
Windows Server 2012 Pocket Consultant
Welcome to Windows Server 2012 Pocket Consultant. Over the years, I’ve written about many different server technologies and products, but the one product I like writing about the most is Microsoft Windows Server. For anyone transitioning to Windows Server 2012 from an earlier release of Windows Server,...
Result Page: 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy