Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering VMware vSphere Storage
Mastering VMware vSphere Storage

Monitor and optimize the storage capabilities of your vSphere environment

About This Book

  • Design a storage solution for your vSphere environment
  • Troubleshoot vSphere Storage performance problems
  • An advanced guide to vSphere Storage performance along with best practices to...
Java Message Service
Java Message Service
The Java Message Service (JMS) provides a way for the components of a distributed application to talk asynchronously, or for welding together legacy enterprise systems. Think of it as application-to-application e-mail. Unlike COM, JMS uses one or more JMS servers to handle the messages on a store-and-forward basis, so that the loss of one or more...
Solaris Operating Environment Boot Camp
Solaris Operating Environment Boot Camp
The aim of this book is not to be just another "Guide for System Administrators," but rather a workshop manual that describes the tasks that need to be performed to build a complex network using the standard components delivered with the system.

We present the chapters in the same chronological order that the system administrator...

Sams Teach Yourself Office Productivity All in One
Sams Teach Yourself Office Productivity All in One
Find all the answers to a Microsoft Office user's questions in one big, easy-to-use book. Sams Teach Yourself Office Productivity All in One is designed to teach the new computer user how to get the most out of an Office productivity suite. It does not assume the reader wants to learn how to use just one product,...
iPhone 3GS Portable Genius: Also covers iPhone 3G
iPhone 3GS Portable Genius: Also covers iPhone 3G
You don't have to be a genius to use an iPhone 3G. But if you want to get the very most out of yours, put this savvy Portable Genius guide to work and start ramping up the pace. Want to e-mail attachments twice as fast? Talk and browse at the same time? Quickly locate the nearest coffee shop? Sync your iPhone 3G with multiple computers? You'll find...
Designing for the Social Web
Designing for the Social Web
No matter what type of web site or application you’re building, social interaction among the people who use it will be key to its success. They will talk about it, invite their friends, complain, sing its high praises, and dissect it in countless ways. With the right design strategy you can use this social interaction...
Podcasting For Dummies
Podcasting For Dummies

Got something to say? It's easy with a podcast!

Subscribe to podcasts, put together your own, and build a fan base

Podcasting really is twenty-first century communication, and you can be a part of it! This book gives you the scoop on listening to, producing, and distributing podcasts, points you toward the best...

Doing Objects in Visual Basic 2005 (The Addison-Wesley Microsoft Technology Series)
Doing Objects in Visual Basic 2005 (The Addison-Wesley Microsoft Technology Series)
Welcome to the latest in the series of Doing Objects books. This series started in 1995 with Visual Basic 4.0, when VB could first do objects. At that time, little had been discussed about using object-oriented design and development techniques with Visual Basic. To help improve that situation, almost half of each book in the series was...
Go Standard Library Cookbook: Over 120 specific ways to make full use of the standard library components in Golang
Go Standard Library Cookbook: Over 120 specific ways to make full use of the standard library components in Golang

Implement solutions by leveraging the power of the GO standard library and reducing dependency on external crates

Key Features

  • Develop high quality, fast and portable applications by leveraging the power of Go Standard Library.
  • Practical recipes that will help you work...
AVIEN Malware Defense Guide for the Enterprise
AVIEN Malware Defense Guide for the Enterprise
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected...
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011). Each year DIMVA brings together international experts from academia, industry and government to present and discuss novel security research....

Dependency Injection in .NET Core 2.0: Make use of constructors, parameters, setters, and interface injection to write reusable and loosely-coupled code
Dependency Injection in .NET Core 2.0: Make use of constructors, parameters, setters, and interface injection to write reusable and loosely-coupled code

Inject dependencies and write highly maintainable and flexible code using the new .NET Core DI Engine

About This Book

  • Identify when to use the constructors, parameters, setters, or Interface Injection, for best results
  • Build dependencies not only for MVC within .NET but also for other...
unlimited object storage image
Result Page: 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy