Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
x86 Instruction Set Architecture
x86 Instruction Set Architecture

The Instruction Set Architecture, or ISA, is defined as that part of the processor architecture related to programming, including the native data types, instructions, registers, addressing modes, memory architecture, interrupt and exception handling, and external IO. With the exception of some small deviations and differences in...

Cloud Computing Virtualization Specialist Complete Certification Kit - Study Guide Book and Online Course
Cloud Computing Virtualization Specialist Complete Certification Kit - Study Guide Book and Online Course
The opportunities provided by Cloud Computing solutions allowed for significant growth within an industry that continues to mature and develop at a rapid pace.

The primary goal of this book and course is to provide the quality education and support materials needed to enable the understanding and application of Cloud Computing in a wide-range...

Architecture and Methods for Flexible Content Management in Peer-to-Peer Systems
Architecture and Methods for Flexible Content Management in Peer-to-Peer Systems

At times when the IT manager’s best friend is systems consolidation (which is a euphemism for centralisation), it may come somewhat as a surprise for you that this book investigates decentralisation in the context of content management systems. It may seem quite obvious
that content will and should be managed by the party who
...

Introducing Windows Server 2012
Introducing Windows Server 2012
Windows Server 2012 is probably the most significant release of the Windows Server platform ever. With an innovative new user interface, powerful new management tools, enhanced Windows PowerShell support, and hundreds of new features in the areas of networking, storage, and virtualization, Windows Server 2012...
Software Networks: Virtualization, SDN, 5G and Security (Networks & Telecommunication: Advanced Networks)
Software Networks: Virtualization, SDN, 5G and Security (Networks & Telecommunication: Advanced Networks)

The goal of this book is to describe new concepts for Internet next generation. This architecture is based on virtual networking using Cloud and datacenters facilities. Main problems concern 1) the placement of virtual resources for opening a new network on the fly, and 2) the urbanisation of virtual resource implemented on physical network...

Cisco Secure Firewall Services Module (FWSM)
Cisco Secure Firewall Services Module (FWSM)

By definition, a firewall is a single device used to enforce security policies within a network or between networks by controlling traffic flows.

The Firewall Services Module (FWSM) is a very capable device that can be used to enforce those security policies. The FWSM was developed as a module or blade that resides in either
...

Microsoft Virtualization with Hyper-V: Manage Your Datacenter with Hyper-V, Virtual PC, Virtual Server, and Application Virtualization
Microsoft Virtualization with Hyper-V: Manage Your Datacenter with Hyper-V, Virtual PC, Virtual Server, and Application Virtualization

Implement a Hyper-V virtualization solution

Microsoft Virtualization with Hyper-V shows you how to deploy Microsoft's next-generation hypervisor-based server virtualization technology in a corporate environment. You'll get step-by-step guidelines for getting Hyper-V up and running, followed by best practices for...

Green IT: Reduce Your Information System's Environmental Impact While Adding to the Bottom Line
Green IT: Reduce Your Information System's Environmental Impact While Adding to the Bottom Line

Reduce the environmental and budgetary impact of your IT infrastructure

This groundbreaking work offers a complete roadmap for integrating environmentally sound techniques and technologies into your Information Systems architecture. Green IT explains how to adopt a business-driven green initiative and provides a...

Getting Started with Oracle VM VirtualBox
Getting Started with Oracle VM VirtualBox

Build your own virtual environment from scratch using VirtualBox

Overview

  • Learn how to install, configure, and manage VirtualBox
  • A step-by-step guide which will teach you how to build your own virtual environment from scratch
  • Discover advanced features of VirtualBox
  • ...
Mastering Windows Server 2016
Mastering Windows Server 2016
The IT pro's must-have guide to Windows Server 2016

Mastering Windows Server 2016 is a complete resource for IT professionals needing to get quickly up to date on the latest release. Designed to provide comprehensive information in the context of real-world usage, this book offers expert guidance through the new...

VMware VI and vSphere SDK: Managing the VMware Infrastructure and vSphere
VMware VI and vSphere SDK: Managing the VMware Infrastructure and vSphere
Virtualization is not a new concept, but it is changing the computing industry in a profound way. Server virtualization is now #1 on enterprises’ budget lists. According to analysts, it will continue to be the highest impact trend, changing infrastructure and operations through 2012.

Virtualization became popular for two reasons.
...
Disaster Recovery (EC-Council Disaster Recovery Professional)
Disaster Recovery (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

unlimited object storage image
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy