Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Analyzing Computer Systems Performance: With Perl: PDQ
Analyzing Computer Systems Performance: With Perl: PDQ

Analyzing computer system performance is often regarded by most system administrators, IT professionals and software engineers as a black art that is too time consuming to learn and apply. Finally, this book by acclaimed performance analyst Dr. Neil Gunther makes this subject understandable and applicable through programmatic examples. The means...

Microsoft  Windows PowerShell(TM) Step By Step
Microsoft Windows PowerShell(TM) Step By Step

Your hands-on, step-by-step guide to automating administration with Windows PowerShell.

Teach yourself the fundamentals of Windows PowerShell command line interface and scripting language. Written by a leading scripting expert, this tutorial delivers self-paced labs, timesaving tips, and hands-on sample scripts for automating Windows...

Groovy for Domain-Specific Languages
Groovy for Domain-Specific Languages

You may already be aware that the Java virtual machine runs on everything from the largest mainframe to the smallest microchip and supports almost every conceivable application. What you may not realize is that to develop software in some of these scenarios requires a targeted, single purpose language, a Domain Specific Language. The popular...

Time Series Analysis and Its Applications: With R Examples (Springer Texts in Statistics)
Time Series Analysis and Its Applications: With R Examples (Springer Texts in Statistics)

Time Series Analysis and Its Applications presents a balanced and comprehensive treatment of both time and frequency domain methods with accompanying theory. Numerous examples using nontrivial data illustrate solutions to problems such as discovering natural and anthropogenic climate change, evaluating pain perception...

Hack Proofing Sun Solaris 8
Hack Proofing Sun Solaris 8
Two of Sun Solaris's prime attractions are its reliability and the high availability of servers running it. These advantages can be, however, negated by carelessness. Forget to apply a patch, or neglect to synchronize your servers' system clocks, and someone who's paying more attention will exploit the holes you've left in your system. The authors...
High Performance Web Sites: Essential Knowledge for Front-End Engineers
High Performance Web Sites: Essential Knowledge for Front-End Engineers
Want your web site to display more quickly? This book presents 14 specific rules that will cut 25% to 50% off response time when users request a page. Author Steve Souders, in his job as Chief Performance Yahoo!, collected these best practices while optimizing some of the most-visited pages on the Web. Even sites that had already been highly...
Python: Visual QuickStart Guide
Python: Visual QuickStart Guide

Named after the Monty Python comedy troupe, Python is an interpreted, open-source, object-oriented programming language. It's also free and runs portably on Windows, Mac OS, Unix, and other operating systems. Python can be used for all manner of programming...

TcL Scripting for Cisco IOS (Networking Technology)
TcL Scripting for Cisco IOS (Networking Technology)

A guide to building and modifying Tcl scripts to automate network administration tasks

 

Streamline Cisco network administration and save time with Tcl scripting

Cisco networking professionals are under relentless pressure to...

Virtualization Security: Protecting Virtualized Environments
Virtualization Security: Protecting Virtualized Environments

Securing virtual environments for VMware, Citrix, and Microsoft hypervisors

Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the technologies, best practices,...

Advanced Ajax: Architecture and Best Practices
Advanced Ajax: Architecture and Best Practices
“I very much enjoyed how this book covers the full Ajax application lifecycle and not only coding techniques. Anyone who is looking to become a professional front-end developer will appreciate the architectural insight and best practices delivered by this book.”  — Andi Gutmans, Co-Founder & Co-Chief...
Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time
Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time
Apply a methodology and practical solutions for monitoring the behavior of the Internet of Things (IoT), industrial control systems (ICS), and other critical network devices with the inexpensive Raspberry Pi. With this book, you will master passive monitoring and detection of aberrant behavior, and learn how to generate early indications...
Game Character Development with Maya
Game Character Development with Maya

If you thought Angelina Jolie was responsible for Lara Croft's curves, think again! Long before the Hollywood actress brought the Tomb Raider heroine to life, Alias' 3D modeling software Maya was used to create the lovely Lara; Ms. Jolie simply filled in her curves! When you're ready to start creating equally compelling...

unlimited object storage image
Result Page: 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy