Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
WildFly: New Features
WildFly: New Features

Get acquainted with the exciting new features that WildFly has to offer with this book and ebook

Overview

  • Learn about the latest WildFly components, including CLI management, classloading, and custom modules
  • Customize your web server and applications by managing logs, virtual hosts, and the...
Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters (Expert's Voice in Security)
Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters (Expert's Voice in Security)

"This book is a must have resource guide for anyone who wants to ...  implement TXT within their environments.  I wish we had this guide when our engineering teams were implementing TXT on our solution platforms!”  

John McAuley,EMC Corporation

"This book details innovative technology...

Yii Application Development Cookbook - Second Edition
Yii Application Development Cookbook - Second Edition

This book is the perfect way to add the capabilities of Yii to your PHP5 development skills. Dealing with practical solutions through real-life recipes and screenshots, it enables you to write applications more efficiently.

Overview

  • Learn how to use Yii even more efficiently
  • Full of...
Deploying Virtual Private Networks with Microsoft Windows Server 2003
Deploying Virtual Private Networks with Microsoft Windows Server 2003

Get in-depth technical guidance, Windows-specific best practices, and real-world troubleshooting tactics-direct from the Windows wireless product development team.

This is the essential reference for any IT professional deploying virtual private networks (VPNs) using Windows Server 2003 and Windows XP. The book thoroughly details how...

Oracle PL/SQL for DBAs
Oracle PL/SQL for DBAs

PL/SQL, Oracle's powerful procedural language, has been the cornerstone of Oracle application development for nearly 15 years. Although primarily a tool for developers, PL/SQL has also become an essential tool for database administration, as DBAs take increasing responsibility for site performance and as the lines between...

Wireless Security Handbook
Wireless Security Handbook
This book was written to give the reader a well-rounded understanding
of wireless network security. It looks at wireless from multiple perspectives,
ranging from auditor, to security architect, to hacker. This wide
scope benefits anyone who has to administer, secure, hack, or participate
on a wireless network. Going through this
...
802.11 WLANs and IP Networking: Security, QoS, and Mobility
802.11 WLANs and IP Networking: Security, QoS, and Mobility
Even after all the earthly riches are enjoyed there still remains in the heart a
longing for knowledge, true knowledge. It is this longing and the desire to bring
the knowledge to others that resulted in the revelation of this book.

“How do IEEE 802.11 wireless local area networks (WLANs) work together
with the
...
Escape From Excel Hell: Fixing Problems in Excel 2003, 2002 and 2000 (Mr. Spreadsheet's Bookshelf)
Escape From Excel Hell: Fixing Problems in Excel 2003, 2002 and 2000 (Mr. Spreadsheet's Bookshelf)
When Excel talks back to you, here's what to do

You try to open a spreadsheet and Excel won't let you, because there's a macro involved. You cannot convince the software that the macro is safe. You hurl something across the room.

Grab this book instead! You'll find more than 200 fixes for things...

Information Security : Principles and Practice
Information Security : Principles and Practice
Your expert guide to information security

As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not...

Professional Web 2.0 Programming (Wrox Professional Guides)
Professional Web 2.0 Programming (Wrox Professional Guides)
Web 2.0 architecture opens up an incredible number of options for flexible web design, creative reuse, and easier updates. Along with covering the key languages and techniques of Web 2.0, this unique book introduces you to all of the technologies that make up Web 2.0 at a professional level. Throughout the chapters, you'll find code for several...
Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
Over the last seven years, Internet Security Systems' (ISS) elite X-Force has discovered more high-risk vulnerabilities than all other research groups and vendors combined, including the vulnerability that led to the recent, widespread Zotob worm. For the first time ever, follow the X-Force team as they analyze potential vulnerabilities and...
Oracle Data Warehousing and Business Intelligence Solutions
Oracle Data Warehousing and Business Intelligence Solutions
Up-to-date, comprehensive coverage of the Oracle database and business intelligence tools

Written by a team of Oracle insiders, this authoritative book provides you with the most current coverage of the Oracle data warehousing platform as well as the full suite of business intelligence tools. You'll learn how to...

unlimited object storage image
Result Page: 388 387 386 385 384 383 382 381 380 379 378 377 376 375 374 373 372 371 370 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy