Poorly performing enterprise applications are the weakest links in a
corporation ’ s management chains, causing delays and disruptions of
critical business functions. In trying to strengthen the links, companies
spend dearly on applications tuning and sizing; unfortunately, the only
deliverables of many of such ventures...
The Windows 7, Enterprise Desktop Support Technician title of the Microsoft Official
Academic Course (MOAC) series includes two books: a textbook and a lab manual. The
exercises in the lab manual are designed either for a virtual machine environment or for
classroom use under the supervision of an instructor or lab aide. In an...
Every day we interact with thousands of consumer products. We not only expect them to perform their functions safely, reliably, and efficiently, but also to do it so seamlessly that we don’t even think about it. However, with the many factors involved in consumer product design, from the application of human factors and ergonomics...
When first thinking of putting together a compilation of writings on a particular topic, those that have
such a notion believe they will give meaning to a paradigm, influence a research area, or at a minimum
shed light exploring a critical phenomenon. Ultimately, the editors and authors hope that the exchange
for the reader - in...
Between the frequently recounted events of the Gold Rush and the Great Depression stretches a period of California history that is equally crucial but less often acknowledged. In his fresh, synthetic consideration of these in-between years, George L. Henderson points specifically to the take-off of California's rural juggernaut between...
As we look forward with confidence that this new edition significantly benefits
students and managers, we look back to how this book became a well established
core text in many business schools internationally and amongst a lot of
managers. It seems not that long ago when we embarked on this project, yet as
our publisher...
OpenVPN is one of the world's most popular packages for setting up a Virtual Private Network (VPN). OpenVPN provides an extensible VPN framework which has been designed to ease site-specific customization, such as providing the capability to distribute a customized installation package to clients, or supporting alternative authentication...
Both of the first author’s (Jon’s) parents were artists. They each could draw fantastical pictures that resembled real life, and were shocked to see that their son could barely muster up a stick figure. If you’ve always felt that your inner artist was best expressed through what you could build with the help of a computer...
Audio can affect the human brain in the most powerful and profound ways. Using Apple’s Core Audio, you can leverage all that power in your own Mac and iOS software, implementing features ranging from audio capture to real-time effects, MP3 playback to virtual instruments, web radio to VoIP support. The most sophisticated audio...
This is the definitive real-world guide to Microsoft System Center 2012, Microsoft’s newest and most powerful version of System Center. Authored by consultants who’ve deployed System Center in hundreds of enterprises and innovative smaller businesses, this book brings together up-to-the-minute tips, tricks, and...
Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...