Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Getting Started with Containerization: Reduce the operational burden on your system by automating and managing your containers
Getting Started with Containerization: Reduce the operational burden on your system by automating and managing your containers

Choose the smarter way to learn about containerizing your applications and running them in production.

Key Features

  • Deploy and manage highly scalable, containerized applications with Kubernetes
  • Build high-availability Kubernetes clusters
  • Secure your...
Content Networking Fundamentals
Content Networking Fundamentals

A comprehensive introduction to the theory and practical applications of content networking 

  • Get a strong introduction to the basic networking concepts necessary for content networking, including network address translation, IP multicast content delivery, quality of service, and...

sendmail Desktop Reference
sendmail Desktop Reference
The sendmail program is a Mail Transport Agent (MTA). It accepts mail from Mail User Agents
(MUAs), mail users (humans), and other MTAs. It then delivers that mail to Mail Delivery Agents
(MDAs) on the local machine, or transports that mail to another MTA at another machine. The behavior
of sendmail is determined by its command line
...
SQL Server 7 Backup & Recovery
SQL Server 7 Backup & Recovery
Protect your organization's most valuable asset--its data. Develop and implement a thorough data protection solution for your SQL Server 7 database environment. SQL Server 7 Backup & Recovery is your one-stop resource for planning, developing, implementing, and managing backup and restore procedures. Learn to execute data protection strategies,...
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks (Advances in Information Security)
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks (Advances in Information Security)
Localization is a critical process in mobile ad hoc networks and wireless sensor networks. Wireless sensor node or MANET devices need to know the network's location or its relative location, with respect to the rest of the network neighbors. However, due to the open spectrum nature of wireless communication, it is subject to attacks and intrusions....
Windows Vista®: Home Networking (Epg - Other)
Windows Vista®: Home Networking (Epg - Other)
With more than one Windows Vistabased PC in your home, and all of your digital memories, music and media, and other data stored on one computer, you know that its time to connect your home with a simple home network. Youll get the straightforward, approachable information you need (without the jargon!) to find what kind of network is right for you...
Spring Web Flow 2 Web Development
Spring Web Flow 2 Web Development

Many web applications need to take the user through a defined series of steps such as e-commerce checkouts or user registrations. Spring Web Flow works well for rich and flexible user interaction, additionally it helps you to describe the flow of websites in complex processes. Spring Web Flow 2 provides the perfect way to build these kinds of...

Active Directory: Designing, Deploying, and Running Active Directory, Fourth Edition
Active Directory: Designing, Deploying, and Running Active Directory, Fourth Edition

Active Directory is a common repository for information about objects that reside on the network, such as users, groups, computers, printers, applications, and files. The default Active Directory schema supports numerous attributes for each object class that can be used to store a variety of information. Access Control Lists (ACLs) are...

FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security

If you are responsible for meeting federal information security requirements such as FISMA, this book is all you need to know to get a system authorized. Now in the first full revision of FISMA since its inception in 2002, a new wave of stronger security measures are now available through the efforts of the Department of Defense,...

Appreneur: Secrets to Success in the App Store
Appreneur: Secrets to Success in the App Store

You are interested in making an app. You have read all of the stories of successful developers and appreneurs. You are determined to get a piece of the pie. The world of apps is the fastest growing market in the world today, and it is here to stay. The best part is you can get in on it! Now what if I told you that without the knowledge...

Wireless Security and Privacy: Best Practices and Design Techniques
Wireless Security and Privacy: Best Practices and Design Techniques

The trick to sound security is to begin early, know your threats,... design for security, and subject your design to thorough objective risk analyses and testing. This book will help."—From the Foreword by Gary McGraw, CTO of Cigital, and coauthor of Building Secure...

Grid Enabled Remote Instrumentation (Signals and Communication Technology)
Grid Enabled Remote Instrumentation (Signals and Communication Technology)
Grid architectures, which are viewed as tools for the integration of distributed resources, play a significant role as both managers of computational resources but also as aggregators of measurement instrumentation and pervasive large-scale data acquisition platforms.  The functionality of a grid architecture allows managing, maintaining, and...
unlimited object storage image
Result Page: 132 131 130 129 128 127 126 125 124 123 122 121 120 119 118 117 116 115 114 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy