Home | Amazing | Today | Tags | Publishers | Years | Search 
Guerrilla Capacity Planning: A Tactical Approach to Planning for Highly Scalable Applications and Services
Guerrilla Capacity Planning: A Tactical Approach to Planning for Highly Scalable Applications and Services

In these days of shortened fiscal horizons and contracted time-to-market schedules, traditional approaches to capacity planning are often seen by management as tending to inflate their production schedules. Rather than giving up in the face of this kind of relentless pressure to get things done faster, Guerrilla Capacity Planning facilitates...

Designing Distributed Learning Environments with Intelligent Software Agents
Designing Distributed Learning Environments with Intelligent Software Agents
This book benefits the AI (artificial intelligence) and educational communities in their research and development, offering new and interesting research issues surrounding the development of distributed learning environments in the Semantic Web age.

With the rapid development of computer network and information technologies, especially
...
CCIE Practical Studies, Vol. 2 (CCIE Self-Study)
CCIE Practical Studies, Vol. 2 (CCIE Self-Study)

Gain hands-on experience for the CCIE Lab Exam with volume two of the best-selling CCIE Practical Studies title from Cisco Press

* Experience putting concepts into practice with lab scenarios that guide you in applying what you know
* Learn how to build a practice lab for your CCIE lab exam preparation
* Take five full-blown
...

CCSA NG: Check Point Certified Security Administrator Study Guide
CCSA NG: Check Point Certified Security Administrator Study Guide
Here’s the book you need to prepare for Check Point’s VPN-1/FireWall-1 Management I NG exam, #156-210. Written by a Check Point security expert who knows exactly what it takes to pass the test, this study guide provides:
  • Assessment testing to focus and direct your studies
  • In-depth...
CDMA Systems Capacity Engineering
CDMA Systems Capacity Engineering
The code division multiple access (CDMA) communication system is a wellestablished
technology in the sense that it is one of technically proven methods to
transmit voice information for multiple users via wireless communications during
the last decade. Further, CDMA is an emerging technology for next generation multimedia...
Steal This Computer Book 3: What They Won't Tell You About the Internet
Steal This Computer Book 3: What They Won't Tell You About the Internet
This offbeat, non-technical book looks at what hackers do, how they do it, and how you can protect yourself. This edition also covers rootkits, spyware, web bugs, identity theft, hacktivism, wireless hacking (wardriving), biometrics, and firewalls.

WARNING: This book is not to be used for hacking into government computers, shutting...

Novell's GroupWise 6.5 User's Handbook
Novell's GroupWise 6.5 User's Handbook

GroupWise allows corporate users to manage documents, share calendars, and control project workflow across network operating systems, including Novell NetWare, Windows NT, and Windows 2000.

Novell's GroupWise 6.5 User's Handbook helps users use the features of...

Network Tutorial
Network Tutorial
This text is written for those trying to get up to speed or stay current with the complex challenges of designing, constructing, maintaining, upgrading, and managing the network infrastructure.

Network Tutorial delivers insight and understanding about network technology to managers and executives trying to get up to speed or stay...

Computer Security Basics
Computer Security Basics

This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult.

The new edition builds on the well-established principles developed in the
...
Red Hat Linux 9 Professional Secrets
Red Hat Linux 9 Professional Secrets
This ultimate under-the-hood guide to Red Hat Linux 9 takes the reader beyond obvious information about this complicated OS, revealing hidden features, tricks and alternate methods not easily found elsewhere.

It takes an expert to unlock the deepest secrets of Red Hat Linux 9–to show you what’s really under the hood and how
...
Create Your Own Home Networks
Create Your Own Home Networks

You have a family computer for e-mail and browsing the Internet. Your son and daughter have their own computer for school work and your spouse has a laptop that he or she brings home from work every day. With your family spread out all over the house on their computers, wouldn't it be nice if you could make them all work...

Windows XP for Home Users, Service Pack 2 Edition
Windows XP for Home Users, Service Pack 2 Edition
Turn on your computer, and there it is--waiting for you to start using it. We're talking, of course, about Windows XP--the world's most ubiquitous operating system--and if you want to make the most of it, you need this thorough, practical guide from veteran author Michael Miller. In this thoroughly updated volume,...
Result Page: 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy