Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microsoft SQL Server 2012 Internals (Developer Reference)
Microsoft SQL Server 2012 Internals (Developer Reference)

Dive deep inside the architecture of SQL Server 2012

Explore the core engine of Microsoft SQL Server 2012—and put that practical knowledge to work. Led by a team of SQL Server experts, you’ll learn the skills you need to exploit key architectural features. Go behind the scenes to understand internal operations...

Linux Troubleshooting Bible
Linux Troubleshooting Bible

If something goes wrong, roll up your sleeves, then troubleshoot and fix Linux yourself!

Commercial support packages for Linux can be expensive. This unique book gives you the power to diagnose and fix a wide range of Linux problems. Using Fedora Core Linux and Red Hat Enterprise Linux examples, Thomas Weeks and bestselling Red Hat...

Professional BlackBerry
Professional BlackBerry
Professional BlackBerry

Enabling users to stay connected with wireless access to calendars, corporate data, real-time e-mail, and a phone, BlackBerry devices have experienced an explosion in popularity. Many would argue that they have become a business necessity. In the first book to deal with the support and development of BlackBerry devices,...

Watermarking Systems Engineering
Watermarking Systems Engineering
The growth of the Internet has fueled the demand for enhanced watermarking and data hiding technologies and has stimulated research into new ways to implement watermarking systems in the real world. Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications presents the principles of watermarking system design and...
Cloud Application Architectures: Building Applications and Infrastructure in the Cloud
Cloud Application Architectures: Building Applications and Infrastructure in the Cloud

If you're involved in planning IT infrastructure as a network or system architect, system administrator, or developer, this book will help you adapt your skills to work with these highly scalable, highly redundant infrastructure services.


While analysts hotly debate the advantages and risks of cloud
...
The Middle Ages: 500-1450 (The History of Medicine)
The Middle Ages: 500-1450 (The History of Medicine)
During the Middle Ages (ca. 529-1100), the rise of Christianity had a definite effect on the practice of medicine. Pope Gregory (ca. 540-604) stressed the importance of prayer over medicine, and over time that sentiment became pervasive. Each time a person was healed, it was considered a miracle. The church taught that since God sometimes sent...
Medical Care of the Liver Transplant Patient
Medical Care of the Liver Transplant Patient

This book builds on the success of previous editions, once again providing hepatologists the most current clinical guide on how to best treat the liver transplant recipient. With an international mix of experienced contributors, this new edition highlights initial indication and selection of the potential recipient, management of the donor...

Windows NT Backup & Restore
Windows NT Backup & Restore

As the number of mission-critical applications running on Windows NT grows, it becomes vital for administrators to safeguard data from loss or corruption. While a myriad of Microsoft and third-party software and hardware solutions are currently available (and more are becoming available every day), there is very little guidance for...

Understanding DB2® Learning Visually with Examples
Understanding DB2® Learning Visually with Examples

IBM DB2 Universal Database™ V8.2 for Linux®, UNIX®, and Windows® is a flexible, scalable, cost-effective, and easy-to-use enterprise database. Now, one book makes DB2 even easier. Understanding DB2 teaches DB2 V8.2 visually, step by step, with...

Running Mainframe z on Distributed Platforms: How to Create Robust Cost-Efficient Multiplatform z Environments
Running Mainframe z on Distributed Platforms: How to Create Robust Cost-Efficient Multiplatform z Environments

Running Mainframe z on Distributed Platforms reveals alternative techniques not covered by IBM for creatively adapting and enhancing multi-user IBM zPDT environments so that they are more friendly, stable, and reusable than those envisaged by IBM. The enhancement processes and methodologies taught in this book yield multiple...

InfoSecurity 2008 Threat Analysis
InfoSecurity 2008 Threat Analysis
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess...
Oracle Application Express Administration: For DBAs and Developers
Oracle Application Express Administration: For DBAs and Developers

Succeed in managing Oracle Application Express (APEX) environments. This book focuses on creating the right combination of scalability, high-availability, backup and recovery, integrity, and resource control. The book covers everything from simple to enterprise-class deployments, with emphasis on enterprise-level requirements and coverage of...

unlimited object storage image
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy