Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Enterprise Messaging Using JMS and IBM WebSphere
Enterprise Messaging Using JMS and IBM WebSphere
The real-world guide to JMS messaging with IBM WebSphere technologiesThis book offers start-to-finish guidance for building reliable, high-performance JMS-based messaging infrastructure with IBM WebSphere technologies.IBM expert Kareem Yusuf systematically introduces the latest versions of JMS—both 1.1 and 1.02b. Once you've thoroughly...
Selective Sentinel Lymphadenectomy for Human Solid Cancer (Cancer Treatment and Research)
Selective Sentinel Lymphadenectomy for Human Solid Cancer (Cancer Treatment and Research)
Lymph node (LN) status is the most important prognostic indicator for the clinical outcome of patients in human solid cancer. Recent developments in sentinel lymph node (SLN) concept and technology have resulted in the application of this revolutionary approach to determine if cancer has metastasized to the regional nodal basin....
Beginning Mac OS X Snow Leopard Server: From Solo Install to Enterprise Integration
Beginning Mac OS X Snow Leopard Server: From Solo Install to Enterprise Integration

This book is intended for those who need to get things done with Mac OS X Server 10.6. As such, you can use this book two ways. Those new to Mac OS X Server can read straight through the entire book, and by the end should feel competent to administer any Mac server thrown their way. For those with some knowledge of Mac OS X Server, or perhaps...

RESTful Java with JAX-RS 2.0
RESTful Java with JAX-RS 2.0

Learn how to design and develop distributed web services in Java, using RESTful architectural principles and the JAX-RS 2.0 specification in Java EE 7. By focusing on implementation rather than theory, this hands-on reference demonstrates how easy it is to get started with services based on the REST architecture.

With...

Learning Puppet Security
Learning Puppet Security

Secure your IT environments with the powerful security tools of Puppet

About This Book

  • Pass a compliance audit by showing the concrete state of your systems using Puppet
  • Secure your Puppet server to minimize risks associated with misconfigured installations using the gdsoperations/auditd...
Programming Microsoft. NET XML Web services
Programming Microsoft. NET XML Web services

Get the in-depth reference and guidance you need to create and consume high-performance, cross-platform Web solutions in the Microsoft .NET environment. This exhaustive resource cuts to the heart of developing XML Web services and their clients—offering expert insights on the relevant standards, .NET classes, and key design and...

Web Security & Commerce (O'Reilly Nutshell)
Web Security & Commerce (O'Reilly Nutshell)
Attacks on government Web sites, break-ins at Internet service providers, electronic credit card fraud, invasion of
personal privacy by merchants as well as hackers - is this what the World Wide Web is really all about?

Web Security & Commerce cuts through the hype and the front page stories. It tells you what the real risks
...
Microsoft System Center 2012 Orchestrator Cookbook
Microsoft System Center 2012 Orchestrator Cookbook

Automate mission-critical tasks with this practical, real-world guide to System Center 2012 Orchestrator

Overview

  • Create powerful runbooks for the entire System Center 2012 product line
  • Master System Center 2012 to create advanced runbooks
  • Learn how to install System Center...
Network Security Technologies and Solutions (CCIE Professional Development Series)
Network Security Technologies and Solutions (CCIE Professional Development Series)
Yusuf Bhaiji, CCIE No. 9305 (R&S and Security), has been with Cisco for seven years and is currently the program manager for Cisco CCIE Security certification. He is also the CCIE Proctor in the Cisco Dubai Lab. Prior to this, he was technical lead for the Sydney TAC Security and VPN team at Cisco.
  • Filter traffic with access...
Network Security with OpenSSL
Network Security with OpenSSL
OpenSSL is a popular and effective open source version of SSL/TLS, the most widely used protocol for secure network communications. The only guide available on the subject, Network Security with OpenSSLdetails the challenges in securing network communications, and shows you how to use OpenSSL tools to best meet those challenges. Focused on the...
Novell GroupWise 7 Administrator Solutions Guide
Novell GroupWise 7 Administrator Solutions Guide

Novell GroupWise 7 Administrator Solutions Guide is the authoritative guide for successfully administrating and maintaining the newest release of Novell's communication and collaboration solution. Author Tay Kratzer, a Novell Premium Service-Primary Support Engineer, will provide you with insider...

VMware View Security Essentials
VMware View Security Essentials

Most people associate security with network security and focus on firewalls and network monitoring. However, there is more to security than that. Security starts with the establishment of a stable environment, protecting this environment not only from intrusion, but also from malicious intent. It is about tracking the issue and recovering...

Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy