Home | Amazing | Today | Tags | Publishers | Years | Search 
TcL Scripting for Cisco IOS (Networking Technology)
TcL Scripting for Cisco IOS (Networking Technology)

A guide to building and modifying Tcl scripts to automate network administration tasks

 

Streamline Cisco network administration and save time with Tcl scripting

Cisco networking professionals are under relentless pressure to...

Microsoft Visual Basic 2010 for Windows, Web, Office, and Database Applications: Comprehensive (Shelly Cashman Series)
Microsoft Visual Basic 2010 for Windows, Web, Office, and Database Applications: Comprehensive (Shelly Cashman Series)

The Shelly Cashnian Series® offers the finest textbooks in computer education-This .Microsoft Visual Basic 2010 book utilizes an innovative step-bv-step pedagogy,  which integrates demonstrations of professional-quality programs with in-depth discussions of programming concepts and techniques and opportunities for hands-on practice...

Systems Analysis and Design with UML
Systems Analysis and Design with UML
Systems Analysis and Design (SAD) is an exciting, active field in which analysts continually learn new techniques and approaches to develop systems more effectively and efficiently. However there is a core set of skills that all analysts need to know—no matter what approach or methodology is used. All information systems...
Digital Signal Processing Using MATLAB for Students and Researchers
Digital Signal Processing Using MATLAB for Students and Researchers
I was once asked what signal processing is. The questioner thought it had something to do with traffi c lights. It became clear to me at that moment that although the theory and practice of signal processing in an engineering context has made possible the massive advances of recent times in everything from consumer electronics to...
Social Media for Trainers: Techniques for Enhancing and Extending Learning (Essential Tools Resource)
Social Media for Trainers: Techniques for Enhancing and Extending Learning (Essential Tools Resource)

This book is intended primarily for the workplace training practitioner, working partly or entirely in the traditional four - walled classroom. It will also be of use to those working in delivering training online via web conferencing tools, such as WebEx or Elluminate, and those involved in instructional design work for both traditional and...

Starting Out with Java: From Control Structures through Data Structures (2nd Edition) (Gaddis Series)
Starting Out with Java: From Control Structures through Data Structures (2nd Edition) (Gaddis Series)

Welcome to Starting Out with Java: From Control Structures through Data Structures, Second Edition. This book is intended for a traditional two-semester CS1/CS2 sequence of courses. The first half of the book, intended for a CS1 class, teaches fundamental programming and problem-solving concepts using Java. The...

Algorithms in C++ Part 5: Graph Algorithms (3rd Edition) (Pt.5)
Algorithms in C++ Part 5: Graph Algorithms (3rd Edition) (Pt.5)

GRAPHS AND GRAPH algorithms are pervasive in modern computing applications. This book describes the most important known methods for solving the graph-processing problems that arise in practice. Its primary aim is to make these methods and the basic principles behind them accessible to the growing number of people in need of knowing them. The...

Computer Networks, Fifth Edition: A Systems Approach (The Morgan Kaufmann Series in Networking)
Computer Networks, Fifth Edition: A Systems Approach (The Morgan Kaufmann Series in Networking)
Once again, this now-classic textbook has been revised to keep it up-to-date with our evolving field. While the Internet and its protocols now dominate networking everywhere, we see continued evolution in the technology used to support the Internet, with switching at “layer 2” providing rich functionality and...
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Penetration testers are faced with a combination of firewalls, intrusion detection systems, host-based protection, hardened systems, and teams of knowledgeable analysts that pour over data collected by their security information management systems. In an environment such as this, simply running automated tools will typically...
High Performance MySQL: Optimization, Backups, and Replication
High Performance MySQL: Optimization, Backups, and Replication
We wrote this book to serve the needs of not just the MySQL application developer but also the MySQL database administrator. We assume that you are already relatively experienced with MySQL. We also assume some experience with general system administration, networking, and Unix-like operating systems.

The second edition of
...
Oracle BAM 11gR1 Handbook
Oracle BAM 11gR1 Handbook
An integral component of Oracle SOA and BPM Suite, Oracle BAM Business Activity Monitoring (BAM) ultimately empowers business executives to react quickly to the changing business situations. BAM enables business service and process monitoring through real-time data streaming and operational reports, and this book helps you to...
Professional Workflow in SharePoint 2010: Real World Business Workflow Solutions
Professional Workflow in SharePoint 2010: Real World Business Workflow Solutions
SharePoint workfl ow comes in many shapes and fl avors, yet to the average SharePoint user it is a master magician’s art learned through a formidable journey. Why is it that one of the most important aspects of SharePoint is also one of the hardest to comprehend and learn? SharePoint default workfl ows, SharePoint Designer...
Result Page: 332 331 330 329 328 327 326 325 324 323 322 321 320 319 318 317 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy