Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
IT Inventory and Resource Management with OCS Inventory NG 1.02
IT Inventory and Resource Management with OCS Inventory NG 1.02

OCS Inventory NG is a cross-platform, open-source inventory and asset management solution. It brings more than plentiful features to the table to satisfy the business needs of small-to-large organizations with up to tens of thousands of computers. However, to put this inventory solution to optimum use requires a lot of skill.

This...

Pro Spring Security
Pro Spring Security

Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications.

Pro Spring Security will be a reference and advanced tutorial
...

Maintaining and Troubleshooting Your 3D Printer
Maintaining and Troubleshooting Your 3D Printer

Maintaining and Troubleshooting Your 3D Printer by Charles Bell is your guide to keeping your 3D printer running through preventive maintenance, repair, and diagnosing and solving problems in 3D printing. If you’ve bought or built a 3D printer such as a MakerBot only to be confounded by jagged edges, corner lift, top layers...

Concurrent Patterns and Best Practices: Build scalable apps with patterns in multithreading, synchronization, and functional programming
Concurrent Patterns and Best Practices: Build scalable apps with patterns in multithreading, synchronization, and functional programming

A definitive guide to mastering and implementing concurrency patterns in your applications

Key Features

  • Build scalable apps with patterns in multithreading, synchronization, and functional programming
  • Explore the parallel programming and multithreading techniques to make...
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.
Key Features
  • Intelligence processes and procedures for response mechanisms
  • Master F3EAD to drive processes based on intelligence
  • Threat modeling and intelligent frameworks
  • ...
MySQL, Second Edition
MySQL, Second Edition

In the second edition of MySQL Paul DuBois provides an updated, comprehensive guide to one of the most popular relational database systems.

MySQL is the most popular open source database server in the world, with more than 2...

Geek House: 10 Hardware Hacking Projects for Around Home (ExtremeTech)
Geek House: 10 Hardware Hacking Projects for Around Home (ExtremeTech)
* From the garage to the living room, Geek House provides hackers with 10 PC-based hardware hacking projects that are not for the faint of heart!
* Taking the DIY mentality to a whole new level, this book teaches techies how to hack, customize, and modify everything-from their sprinkler systems to the temperature of their barbecues
...
Android Recipes: A Problem-Solution Approach
Android Recipes: A Problem-Solution Approach

Android continues to be one of the leading mobile OS and development platforms driving today's mobile innovations and the apps ecosystem. Android appears complex, but offers a variety of organized development kits to those coming into Android with differing programming language skill sets.

Android Recipes: A
...

Transportation Management with SAP TM 9: A Hands-on Guide to Configuring, Implementing, and Optimizing SAP TM
Transportation Management with SAP TM 9: A Hands-on Guide to Configuring, Implementing, and Optimizing SAP TM

The implementation of a TMS solution is a highly complex and mission critical project. If executed correctly a good TMS can deliver a number of benefits to the organization in terms of optimization, greater efficiency, reduced errors and improved revenue through accurate invoicing. However a number of projects fail to realize these...

Expert MySQL (Expert's Voice in Databases)
Expert MySQL (Expert's Voice in Databases)

Expert MySQL is the leading reference for learning, understanding, and extending the MySQL server. It unlocks the full promise of open source by showing how to modify the code, create your own storage engine, build your own authentication plugins, and even add your own functions and commands to the SQL language. No other book...

Using Kindle Fire HD
Using Kindle Fire HD

Learn how to use your Kindle Fire with ease and no jargon. Clear, concise, short and to the point... Using Kindle Fire HD, is the essential guide to getting around Amazon’s tablet/e-book reader. This book explores setting up your new Kindle and registering; navigating around the interface and what all the buttons, lists and icons are...

Practical SharePoint 2013 Enterprise Content Management
Practical SharePoint 2013 Enterprise Content Management

Practical SharePoint 2013 Enterprise Content Management is the first book to guide you through planning and designing each phase of your information life cycle with SharePoint 2013. Author and SharePoint expert Steve Goodyear walks you through how to analyze and plan enterprise content management (ECM) solutions for an effective and...

unlimited object storage image
Result Page: 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy