Account
Orders
Advanced search
In 2004/5, over half of IT professionals will be looking at open source, most for the first time. This book provides key tools for System administrators, Network Administrators, IT project managers, and consultants who must evaluate and deploy open source software. This...
The purpose of this book is to provide tools to design and implement network-orientated applications in .NET. It is also a guide for software designers to choose the best and most efficient way to implement mission critical solutions.The book addresses real-world issues...
A resilient storage network is an environment where data is always available for the needs of the business. This book explains the components, as well as how to design and implement a resilient storage network for workgroup, departmental, and enterprise environments....
This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of...
This is a soup-to-nuts reference guide on all aspects of Web Services - where Web Services is a fast emerging set of Internet-specific middleware technology to further promote the growth of all aspects of e-business via standardization, collaboration and "franchising." ...
Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts ofWindows Server 2003 security and wants to leverage the operating system's security infrastructure components to build a more secure I.T. infrastructure. The primary...
This authoritative book teaches IT professionals responsible for Exchange messaging systems how to efficiently manage the program's many and complex system capabilities and features. Once you've designed and implemented a messaging system, the bulk of the day-to-day...
This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland...
Mission-Critical Microsoft Exchange 2003 provides a complete update of Cochran'sMission-Critical Microsoft Exchange 2000, and complements Tony Redmond's new book, the best-selling Microsoft Exchange Server 2003. This book includes many of the same high-availability...
There are three parts to tuning an Oracle database: data modeling, SQL code tuning and physical database configuration.A data model contains tables and relationships between tables. Tuning a data model involves normalization and de-normalization. Different approaches...
Managing Software Deliverables describes a set of proven processes for establishing an effective Software Program Management Office (SPMO) function in a corporate setting. Every business that has people performing Software Project Management (PM) activities has a need...
Integrating Wireless Devices in the Enterprise provides a solution that every enterprise can use, described in terms of scope, feasibility and return on investment, architecture, and data structures. The solution Wheeler offers here is scalable from a single handheld...
Debugging by Thinking: A Multi-Disciplinary Approach is the first book to apply the wisdom of six disciplines—logic, mathematics, psychology, safety analysis, computer science, and engineering—to the problem of debugging. It uses the methods of literary detectives such...
Providing thorough coverage of implementation, migration and management issues for Exchange 2000 and 2003, this book also describes the best practices of one of the largest Exchange consulting groups outside Microsoft. This revised edition features key updates based on...
OpenVMS System Management Guide, Second Edition, the most complete book on the topic, details for system administrators the tools, technologies, and techniques by which they can configure, maintain, and tune computers running Hewlett-Packard's high-performanceOpenVMS...
Clustered configuration first hit the scene nearly 20 years ago when Digital Equipment Corporation (DEC) introduced the VaxCluster. Until now, the topic of Real Application Clusters (RAC) implementation had never been fully explored. For the first time, Murali Vallath...
The model presented in this manual for the IT professional helps managers work with tech workers and their customers to make a clear and well-substantiated argument for IT service investments. In order to validate and fully explain this model, Wigodsky presents an...
Since the last publication of the Ernst and Young book on Tandem security in the early 90's, there has been no such book on the subject. We've taken on the task of supplying a new Handbook whose content provides current, generic information about securing HP NonStop...
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on...
Unlike so many books that focus on how to use Linux, Linux and the Unix Philosophy explores the "way of thinking that is Linux" and why Linux is a superior implementation of this highly capable operating system.This book is a revision and expansion of a computer science...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers