 |
|
 VMware ESXi: Planning, Implementation, and Security
VMware ESXi is the easiest way to get started with virtualization. It has been steadily growing in popularity since it was released in the free VMware vSphere Hypervisor edition. As part of the vSphere family, it can be licensed at the same levels as VMware ESX and provides the same functionality that you’re accustomed to with ESX. ... |  |  IBM Lotus Quickr 8.5 for Domino Administration
When the IT strategy calls for maximizing the value of social software for building effective teams, neither social networking nor team collaboration are sufficient on their own. IBM Lotus Quickr team collaboration software delivers the promise of social software, but ensuring that a business's social networking site is compliant, can be... |  |  Essential Software Architecture
Job titles like “Technical Architect” and “Chief Architect” nowadays abound in software industry, yet many people suspect that “architecture” is one of the most overused and least understood terms in professional software development.
Gorton’s book tries to resolve this dilemma. It... |
|
 |  |  Microsoft SharePoint 2010 Developer Reference
Microsoft SharePoint is one of the biggest productivity frameworks released during the last ten years. Microsoft SharePoint 2010 is just the last step of a fabulous journey (that began in 2001) in the world of business productivity, collaboration, knowledge sharing, search technologies, and social networking.
From a... |  |  SharePoint 2010 Workflows in Action
SharePoint 2010 is a huge technology with tens of thousands of companies adopting it from all across the globe. Within the SharePoint product stack, workflows are one of the most compelling and ROI generating features for many business.
SharePoint 2010 Workflows in Action will take you through the SharePoint... |
|
|
 Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition
There are two kinds of cryptography in this world: cryptography that will stop your kid sister from
reading your files, and cryptography that will stop major governments from reading your files. This
book is about the latter.
If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the... |  |  |  |  Pervasive Information Architecture: Designing Cross-Channel User Experiences
I knew the Internet before it got famous. There were places but no paths, no
maps, no search engines. Entry required a key in the form of an IP address
and an incantation in the language of UNIX. It was a small world that felt big
because it was so easy to get lost in the shadowy realm of texts and data, completely
devoid of color.... |
|
Result Page: 202 201 200 199 198 197 196 195 194 193 192 191 190 189 188 187 186 185 184 |