Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Microsoft Azure IaaS: Migrating and Building Scalable and Secure Cloud Solutions
Practical Microsoft Azure IaaS: Migrating and Building Scalable and Secure Cloud Solutions
Adopt Azure IaaS and migrate your on-premise infrastructure partially or fully to Azure. This book provides practical solutions by following Microsoft’s design and best practice guidelines for building highly available, scalable, and secure solution stacks using Microsoft Azure IaaS. 

The author starts by
...
Big Breaches: Cybersecurity Lessons for Everyone
Big Breaches: Cybersecurity Lessons for Everyone
Neil and Moudy have written a book that will help us reduce our exposure as a society to future “big breaches” but also to many of the technology risks we face in an increasingly digitized society. They do this not by presenting a “recipe” for success but by making the subject accessible to audiences who...
Six Sigma and Beyond: Statistics and Probability, Volume III
Six Sigma and Beyond: Statistics and Probability, Volume III
This text explains the tools of statistics and how to apply them effectively to improve processes and profitability in an organization, and also delineates the importance of collecting, analyzing, and interpreting data.

Researchers and professionals in all walks of life need to use the many tools offered by the statistical world, but...

Mac OS X 10.4 Tiger: Peachpit Learning Series
Mac OS X 10.4 Tiger: Peachpit Learning Series
If you want to tame Mac OS X Tiger, but you want to do so in the comfort of your own home, this guide makes it possible! Robin Williams uses her trademark friendly teaching style to reveal exactly what you want to know: What's new in Tiger, what's great about it, and how can you get the most out of it fast!...
Security+ Study Guide, 2nd Edition (SYO-101)
Security+ Study Guide, 2nd Edition (SYO-101)
Here's the book you need to prepare for CompTIA's Security+ exam. This updated edition of the best-selling Security+ Study Guide was developed to meet the exacting requirements of today's certification candidates and aspiring IT security professionals. In addition to the consistent and accessible instructional...
Don't Give Me That Attitude!: 24 Rude, Selfish, Insensitive Things Kids Do and How to Stop Them
Don't Give Me That Attitude!: 24 Rude, Selfish, Insensitive Things Kids Do and How to Stop Them
Does Your Child Have Attitude?
  • Does your kid never take no for an answer and demand things go his way?
  • Do her theatrics leave you drained at the end of the day?
  • Are you resorting to bribes and threats to get your kid to do chores?
  • Does he cheat, complain, or blame others for his...
Wi-Fi Home Networking
Wi-Fi Home Networking

For many professionals, wireless home computer networking delivers the power of corporate technology — without the hassles of corporate living, and the mobile connectivity to all of the computers throughout your home (or backyard) — without rewiring.

That’s why if you plan to set up a wireless...

Absolute Beginner's Guide to Networking, Fourth Edition
Absolute Beginner's Guide to Networking, Fourth Edition

Absolute Beginner's Guide to Networking, Fourth Edition gives readers the ability and understanding necessary to create and administer a network. The book shows the reader how to physically connect computers and other devices to a network and access peripherals such as printers over the...

Inside Internet Security: What Hackers Don't Want You To Know
Inside Internet Security: What Hackers Don't Want You To Know
This book is a practical guide for anyone designing or administering a corporate or e-business network that runs across a number of platforms via the Internet. It will arm systems administrators with a thorough understanding of the problems of network security and their solutions, and thus help realize the tremendous potential of e-business....
Introduction to ATM/IP Design and Performance with Applications Analysis Software
Introduction to ATM/IP Design and Performance with Applications Analysis Software
Many engineers and students experience difficulty in making sense of issues associated with IP and ATM teletraffic techniques. This is partly because of the subject itself: networks are flexible, complicated, and still evolving. However, some of the difficulties arise because of the advanced mathematical methods that have been applied to provide...
Protected: Internet, Intranet, & Virtual Private Networks
Protected: Internet, Intranet, & Virtual Private Networks
A systematic guide to the technologies, standards, protocols, and means used for the transparent security of information interaction in computer networks, this resource enables an independent understanding of the various methods of providing computer and information security when using modern network technology. The basic features of both Web...
Flash MX Savvy (With CD-ROM)
Flash MX Savvy (With CD-ROM)
Anticipates your goals and uses professional examples to show you the best ways to attain them. Hands-on tutorials allows you to apply different techniques to projects that will yield useful, real-world results. Softcover. CD-ROM included.

This is the first book in our Savvy series, a new line of premium quality, in-depth
...
unlimited object storage image
Result Page: 717 716 715 714 713 712 711 710 709 708 707 706 705 704 703 702 701 700 699 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy