Home | Amazing | Today | Tags | Publishers | Years | Search 
Microsoft SharePoint 2010 Developer's Compendium: The Best of Packt for Extending SharePoint
Microsoft SharePoint 2010 Developer's Compendium: The Best of Packt for Extending SharePoint
A Packt Compendium is a book formed by drawing existing content from several related Packt titles. In other words, it is a mash-up of published Packt content – Professional Expertise Distilled in the true sense. Such a compendium of Packt's content allows you to learn from each of the chapters' unique styles and Packt...
SharePoint 2010 Field Guide
SharePoint 2010 Field Guide

Hands-on solutions for common SharePoint 2010 challenges

Aimed at the more than 100 million licensed SharePoint 2010 users, this indispensable field guide addresses an abundance of common SharePoint 2010 problems and offers proven solutions. A team of authors encourages you to customize SharePoint beyond the out-of-the-box...

Introducing Windows Server 2012
Introducing Windows Server 2012
Windows Server 2012 is probably the most significant release of the Windows Server platform ever. With an innovative new user interface, powerful new management tools, enhanced Windows PowerShell support, and hundreds of new features in the areas of networking, storage, and virtualization, Windows Server 2012...
Expert Scripting and Automation for SQL Server DBAs
Expert Scripting and Automation for SQL Server DBAs
As the ratio of DBAs to supported instances and supported databases continues to drop, DBAs must look to automation, to allow them to continue to improve or, in some cases, even offer the same level of service to the business as they have historically. This book attempts to give DBAs the tools they need to implement strategic...
Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

Azure Automation Using the ARM Model: An In-Depth Guide to Automation with Azure Resource Manager
Azure Automation Using the ARM Model: An In-Depth Guide to Automation with Azure Resource Manager

Focus exclusively on the Azure Resource Manager (ARM) deployment model for Azure automation and gain in-depth knowledge of topics such as runbook authoring, different types of automation runbooks, and hybrid cloud automation. This book covers practical approaches to creating runbooks for multiple use cases, including operational tasks such as...

Mastering Docker
Mastering Docker

Rethink what's possible with Docker – become an expert in the innovative containerization tool to unlock new opportunities in the way you use and deploy software

About This Book

  • Create highly scalable applications and services using the Linux container virtualization paradigm
  • ...
Using Chef with Microsoft Azure
Using Chef with Microsoft Azure

This book is your hands-on guide to infrastructure provisioning and configuration management in the cloud using Chef’s open source, cross-platform toolset. With over 10,000 customers joining the Microsoft Azure cloud platform each week and steadily increasing usage, the need for automation approaches has never been greater. This book...

VMware vRealize Orchestrator Cookbook
VMware vRealize Orchestrator Cookbook

Master the configuration, programming, and interaction of plugins with Orchestrator to efficiently automate your VMware infrastructure

About This Book

  • Program with Orchestrator to automate and synchronize your infrastructure
  • Integrate the base plug-ins into your workflows
  • ...
Microservices, IoT and Azure: Leveraging DevOps and Microservice Architecture to deliver SaaS Solutions
Microservices, IoT and Azure: Leveraging DevOps and Microservice Architecture to deliver SaaS Solutions

This book provides practical guidance for adopting a high velocity, continuous delivery process to create reliable, scalable, Software-as-a-Service (SaaS) solutions that are designed and built using a microservice architecture, deployed to the Azure cloud, and managed through automation. Microservices, IoT, and Azure offers software...

Microsoft System Center Data Protection Manager 2012 SP1
Microsoft System Center Data Protection Manager 2012 SP1

Written by a team of Microsoft System Center Most Valued Professionals (MVPs), this is the ultimate guide to using Data Protection Management (DPM) to safeguard your organization's valuable information. Packed with tips and real-life solutions.

Overview

  • Practical guidance that will help you get the...
Intermediate Security Testing with Kali Linux 2
Intermediate Security Testing with Kali Linux 2

With computer hacking attacks making headline news on a frequent occasion, learning ethical hacking has become a priority for those tasked with defending their networks. But in the sea of training material it is hard to find effectual training using the latest tools and techniques. In “Intermediate Security Testing with Kali Linux...

Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy