Home | Amazing | Today | Tags | Publishers | Years | Search 
Virtualization Essentials
Virtualization Essentials

A full-color beginner's guide to the core concepts and skills of virtualization

Virtualization is the IT world's hottest trend in recent years, and many colleges do not yet have curricula in place to prepare students for this important area. This guide fills the need, with a learn-by-doing approach to mastering the...

Windows Server 2012 Hyper-V Installation and Configuration Guide
Windows Server 2012 Hyper-V Installation and Configuration Guide

Go-to guide for using Microsoft's updated Hyper-V as a virtualization solution

Windows Server 2012 Hyper-V offers greater scalability, new components, and more options than ever before for large enterprise systems and small/medium businesses. Windows Server 2012 Hyper-V Installation and Configuration Guide is...

Big Data For Dummies
Big Data For Dummies

Find the right big data solution for your business or organization

Big data management is one of the major challenges facing business, industry, and not-for-profit organizations. Data sets such as customer transactions for a mega-retailer, weather patterns monitored by meteorologists, or social network activity can quickly...

The Modern Web: Multi-Device Web Development with HTML5, CSS3, and JavaScript
The Modern Web: Multi-Device Web Development with HTML5, CSS3, and JavaScript

A Guide to Modern Web Development
 

Today's web technologies are evolving at near-light speed, bringing the promise of a seamless Internet ever closer to reality. When users can browse the Web on a three-inch phone screen as easily as on a fifty-inch HDTV, what's a developer to do?

...

Computer Science Programming Basics in Ruby
Computer Science Programming Basics in Ruby

If you know basic high-school math, you can quickly learn and apply the core concepts of computer science with this concise, hands-on book. Led by a team of experts, you’ll quickly understand the difference between computer science and computer programming, and you’ll learn how algorithms help you solve computing...

Microsoft System Center Virtual Machine Manager 2012 Cookbook
Microsoft System Center Virtual Machine Manager 2012 Cookbook

Over 60 recipes for the administration and management of Microsoft System Center Virtual Machine Manager 2012 SP1

Overview

  • Create, deploy, and manage Datacentres, Private and Hybrid Clouds with hybrid hypervisors by using VMM 2012 SP1, App Controller, and Operations Manager.
  • Integrate and...
GIS Applications in Agriculture, Volume Two: Nutrient Management for Energy Efficiency
GIS Applications in Agriculture, Volume Two: Nutrient Management for Energy Efficiency

We are entering a new era in production agronomics. Agricultural scientists the world over call for the development of techniques that simultaneously increase soil carbon storage and reduce agriculture’s energy use. In response, site-specific or precision agriculture has become the focus and direction for the three motivating forces...

Core Data: Data Storage and Management for iOS, OS X, and iCloud (Pragmatic Programmers)
Core Data: Data Storage and Management for iOS, OS X, and iCloud (Pragmatic Programmers)

Core Data is intricate, powerful, necessary - and this book is your guide to harnessing its power. Core Data is Apple's recommended way to persist data: it's easy to use, built-in, and integrated with iCloud. You'll learn fundamental Core Data principles such as thread and memory management, and you'll discover how to...

How to Cheat at Securing Your Network (How to Cheat)
How to Cheat at Securing Your Network (How to Cheat)

Most Systems Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and...

Securing SQL Server, Second Edition: Protecting Your Database from Attackers
Securing SQL Server, Second Edition: Protecting Your Database from Attackers

Securing SQL Server, Second Edition explores the potential attack vectors someone can use to break into your SQL Server database as well as how to protect your database from these attacks. Written by Denny Cherry, a Microsoft MVP for the SQL Server product, a Microsoft Certified Master for SQL Server 2008, and one of the biggest names...

Tools for Signal Compression: Applications to Speech and Audio Coding (ISTE)
Tools for Signal Compression: Applications to Speech and Audio Coding (ISTE)
In everyday life, we often come in contact with compressed signals: when using mobile telephones, mp3 players, digital cameras, or DVD players. The signals in each of these applications, telephone-band speech, high fidelity audio signal, and still or video images are not only sampled and quantized to put them into a form suitable for...
Windows Azure Mobile Services
Windows Azure Mobile Services

Windows Azure Mobile Services (WAMS) is a turn-key backend solution for applications, mobile or otherwise, to utilize structured storage in the cloud. It includes basic data access functionality and built-in authentication with Microsoft...

Result Page: 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy