 |
|
 Expert Oracle RAC 12c (The Expert's Voice)
Expert Oracle RAC 12c is a hands-on book helping you understand and implement Oracle Real Application Clusters (RAC), and to reduce the total-cost-of-ownership (TCO) of a RAC database. As a seasoned professional, you are probably aware of the importance of understanding the technical details behind the RAC stack. This book... |  |  Ontology Matching
Ontologies tend to be found everywhere. They are viewed as the silver bullet for many applications, such as database integration, peer-to-peer systems, e-commerce, semantic web services, or social networks. However, in open or evolving systems, such as the semantic web, different parties would, in general, adopt different ontologies. Thus,... |  |  Optimization and Security Challenges in Smart Power Grids (Energy Systems)
This book provides an overview of state-of-the-art research on “Systems and Optimization Aspects of Smart Grid Challenges.” The authors have compiled and integrated different aspects of applied systems optimization research to smart grids, and also describe some of its critical challenges and requirements.
The promise... |
|
 Amazon Web Services For Dummies
Create dynamic cloud-based websites with Amazon Web Services and this friendly guide!
As the largest cloud computing platform in the world, Amazon Web Services (AWS) provides one of the most popular web services options available. This easy-to-understand guide is the perfect introduction to the Amazon Web Services platform... |  |  Learn 2D Game Development with C# (Expert's Voice in Game Development)
2D games are hugely popular across a wide range of platforms and the ideal place to start if you’re new to game development. With Learn 2D Game Development with C#, you'll learn your way around the universal building blocks of game development, and how to put them together to create a real working game.
C# is... |  |  Troubleshooting Oracle Performance
Troubleshooting Oracle Performance, 2nd Edition is your systematic guide to diagnosing and resolving performance problems in database-backed applications involving Oracle's database engine. Christian Antognini brings a decade and a half experience to his topic. His first edition is one of the most well-respected books in its... |
|
 The Agile Culture: Leading through Trust and Ownership
Build Agile Cultures That Unleash Passion, Innovation, and Performance
What do you want? Delighted customers. How do you get them? By rapidly delivering innovative, exciting products and services your customers will love to use. How do you do this?... |  |  Learning PowerCLI
Automate your Vmware vSphere environment by learning how to install and use PowerCLI. This book takes a practical tutorial approach that will have you automating your daily routine tasks in no time.
Overview
-
Automate your VMware vSphere environment including hosts, clusters, storage, and vCenter Server...
|  |  Implementing Samba 4
Exploit the real power of Samba 4 Server by leveraging the benefits of an Active Directory Domain Controller
Overview
-
Understand the different roles that Samba 4 Server can play on the network
-
Implement Samba 4 as an Active Directory Domain Controller
-
Step-by-step and...
|
|
 Top Hedge Fund Investors: Stories, Strategies, and Advice
A professional's guide to the world of hedge fund investing
Throughout the financial crisis of 2008, many hedge funds suffered massive losses and were often blamed for the extreme market upheavals. In the wake of the crisis, hedge funds remain a source of fascination for the media, legislators, and ... |  |  RF Circuit Design Techniques for MF-UHF Applications
Magnetic resonance imaging, semiconductor processing, and RFID are some of the critical applications within the medium frequency (MF) to ultrahigh frequency (UHF) range that require RF designers to have a solid understanding of analytical and experimental RF techniques. Designers need to be able to design components and devices cost... |  |  What Every Engineer Should Know About Cyber Security and Digital Forensics
Long gone are the days where the security of your critical data could be
protected by security guards, cipher locks, and an ID badge worn by all
employees. As the computing paradigm is continually changing with shared
resources and mobility, firewalls and antivirus software are also not enough
to protect critical assets. This... |
|
Result Page: 70 69 68 67 66 65 64 63 62 61 60 59 58 57 |